Loading...

The Grafana MCP server provides a secure interface to manage Grafana instances and related ecosystems, offering read and write access to dashboards, datasources, alerts, and more.
Boost this tool
Subscribe to listing upgrades or segmented pushes.
The Grafana MCP server provides a secure interface to manage Grafana instances and related ecosystems, offering read and write access to dashboards, datasources, alerts, and more.
The Grafana MCP server's safety depends heavily on configuration. When used with strict RBAC and only necessary tools enabled, it can be relatively safe. However, enabling admin tools or granting broad permissions significantly increases the risk of unintended or malicious actions.
Performance depends on the complexity of the queries and the size of the dashboards. Large dashboards can consume significant context window space and processing time.
Cost depends on the number of API calls and the resources consumed by the Grafana instance. Consider optimizing queries and limiting the scope of operations.
{
"mcpServers": {
"grafana": {
"command": "mcp-grafana",
"args": [],
"env": {
"GRAFANA_URL": "http://localhost:3000",
"GRAFANA_USERNAME": "<your username>",
"GRAFANA_PASSWORD": "<your password>",
"GRAFANA_ORG_ID": "2"
}
}
}
}GRAFANA_URLGRAFANA_API_KEYGOBINsearch_dashboardsFind dashboards based on title or other metadata.
Read-only operation, no side effects.
get_dashboard_by_uidRetrieve full dashboard details using its unique identifier.
Read-only operation, but large dashboards can consume significant context window space.
update_or_create_a_dashboardModify existing dashboards or create new ones.
Requires full dashboard JSON, potentially leading to unintended modifications or corruption.
query_prometheusExecute PromQL queries against Prometheus datasources.
Read-only operation, but poorly crafted queries can impact performance.
list_usersView all users in an organization in Grafana.
Read-only operation, but exposes user information.
delete_alert_rulesRemove alert rules by UID.
Destructive operation that can disrupt monitoring and alerting.
get_panel_imageRender a Grafana dashboard panel or full dashboard as a PNG image.
Requires Grafana Image Renderer, potential for resource exhaustion if abused.
API Key
hybrid
datasources:*dashboards:*folders:*teams:*The Grafana MCP server's safety depends heavily on configuration. When used with strict RBAC and only necessary tools enabled, it can be relatively safe. However, enabling admin tools or granting broad permissions significantly increases the risk of unintended or malicious actions.
Autonomy is highly dependent on the enabled tools and configured RBAC permissions. Exercise caution when granting broad access.
Production Tip
Implement robust error handling and logging to track actions performed by the MCP server.
It provides a programmatic interface to manage Grafana instances and related ecosystems.
API keys are the primary authentication method.
Use the `--enable-tools` and `--disable-tools` flags when starting the server.
Refer to the RBAC Permissions section in the README for a detailed list.
Use `get_dashboard_summary` and `get_dashboard_property` instead of `get_dashboard_by_uid` when possible.
Enabling all tools increases the attack surface and should be avoided in production environments.
Check the Grafana server logs and the MCP server logs for error messages.