loading…
Search for a command to run...
loading…
A Model Context Protocol server that provides AI agents with controlled read access to Datalust Seq instances for log analysis and monitoring. It enables agents
A Model Context Protocol server that provides AI agents with controlled read access to Datalust Seq instances for log analysis and monitoring. It enables agents to search events, execute data queries, and retrieve information about signals, dashboards, and alerts.
Standalone MCP server that gives AI agents controlled API access to a user-owned Datalust Seq instance.
Required configuration:
SEQ_URLSEQ_API_KEYSEQ_URL accepts either:
/api):http://localhost:10150https://seq.example.comhttp://localhost:10150/apihttps://seq.example.com/apiseq_connection_test: validates Seq connectivity and API reachability, and reports the resolved root /health URL used for the check.seq_starter_help: lists the compact starter alias tools.seq_starter_overview: quick health, user, diagnostics, signals, and workspace summary.seq_starter_events_search: common event search by filter/signal/time range.seq_starter_event_by_id: fetch one event by id.seq_starter_data_query: run a q query using GET or POST.seq_starter_signals_list / seq_starter_signal_by_id: signal discovery helpers.seq_starter_dashboards_list: list dashboards.seq_starter_alerts_list: list alerts.seq_starter_events_stream: bounded live-tail style stream call.seq_api_catalog: returns the full official Seq route/verb/permission catalog.seq_api_live_links: discovers live name -> route links from your Seq instance.seq_api_request: generic verb/path invoker for any Seq API route.seq_<verb>_<route>: auto-generated tool per official route+verb (from docs).Scope note:
seq_starter_* tools are focused on common read workflows.seq_api_request and seq_<verb>_<route> expose the broader HTTP API surface from the Seq endpoint catalog, including non-GET routes.Use least privilege based on the exact tools/workflows your MCP client will call.
Authoritative Datalust references:
Recommended permission profiles:
seq_starter_*, seq_connection_test, read-only queries): enable Read; disable Ingest, Write, Project, Organization, System.seq_api_request and seq_<verb>_<route>): required permissions depend on the specific route+verb; check seq_api_catalog or the official endpoint table before granting.Permission guidance for this project:
| Permission | Needed now | Why |
|---|---|---|
Read |
Yes | Required by starter query/retrieval workflows. |
Ingest |
Usually No | Needed only when calling ingestion routes such as ingest/* or api/events/raw when API-key-for-writing is required. |
Write |
Maybe | Needed for write routes (for example signals, dashboards, alerts, permalinks, SQL queries). |
Project |
Maybe | Needed for project-scoped administration and some settings/index routes. |
Organization |
Maybe | Needed for organization/user-management routes. |
System |
Maybe | Needed for system administration routes (for example apps, feeds, backups, updates). |
Starter endpoint mapping in current implementation:
GET /health: public endpoint.GET /api/events/resources: public endpoint.GET /api/events: Read permission demand.GET /api/events/{id}: Read permission demand.GET /api/data: Read permission demand.The server authenticates to Seq using the X-Seq-ApiKey header.
Tool failures are returned as structured MCP error responses (isError: true) instead of crashing the server process.
Current graceful handling includes:
401 Unauthorized: returns guidance to verify SEQ_API_KEY and SEQ_URL.403 Forbidden: returns a permission-denied response with route-derived permission hints when available.Health check behavior:
seq_connection_test always probes the Seq host root at /health.SEQ_URL is configured as either http://host:port or http://host:port/api, the health check resolves to http://host:port/health.Node.js requirement: LTS (see .nvmrc).
npm install
npm run build
Windows PowerShell:
$env:SEQ_URL = "http://localhost:10150"
$env:SEQ_API_KEY = "your-key"
node dist/index.js
Docker Hub documentation assets in this repo:
Build image:
docker build -t mcp/seq-otel .
Run via Docker Compose (recommended for MCP stdio):
PowerShell:
./scripts/run-mcp-compose.ps1 -SeqUrl "http://localhost:10150" -SeqApiKey "<YOUR_SEQ_API_KEY>" -Build
Bash:
./scripts/run-mcp-compose.sh --seq-url "http://localhost:10150" --seq-api-key "<YOUR_SEQ_API_KEY>" --build
Compose run behavior:
.env..env is missing, scripts create a generic template .env automatically.SEQ_URL and SEQ_API_KEY are resolved via script args, existing environment variables, or a populated .env file.MCP_IMAGE_TAG is optional; when empty, Compose uses an untagged image reference (mcp/seq-otel).-ContainerName (PowerShell) or --container-name (Bash).SEQ_API_KEY via environment variables or .env instead of CLI args.Or use helper scripts:
PowerShell:
./scripts/build-image.ps1
Bash:
./scripts/build-image.sh
Build and push to registry (pullable by other Docker hosts):
PowerShell:
./scripts/build-image.ps1 -Registry ghcr.io/mclifeleader -Tag v0.3.1 -Push
Bash:
./scripts/build-image.sh --registry ghcr.io/mclifeleader --tag v0.3.1 --push
The build scripts apply :latest by default alongside any explicit version tag. To disable this behavior, pass an empty latest-tag value (PowerShell: -LatestTag ""; Bash: --latest-tag "").
Build and export tar (loadable with docker load):
PowerShell:
./scripts/build-image.ps1 -SaveTar ./mcp-seq-otel.tar
Bash:
./scripts/build-image.sh --save-tar ./mcp-seq-otel.tar
Run against local Seq:
docker run --rm -i \
-e SEQ_URL=http://host.docker.internal:10150 \
-e SEQ_API_KEY=your-key \
mcp/seq-otel
Run against FQDN Seq:
docker run --rm -i \
-e SEQ_URL=https://seq.example.com \
-e SEQ_API_KEY=your-key \
mcp/seq-otel
Run with Podman:
podman build -t mcp/seq-otel .
podman run --rm -i \
-e SEQ_URL=https://seq.example.com \
-e SEQ_API_KEY=your-key \
mcp/seq-otel
The container startup contract requires both variables to be present:
SEQ_URLSEQ_API_KEYIf either is missing, the container exits immediately with a clear startup error.
Assumes the image already exists (mcp/seq-otel).
{
"mcpServers": {
"seq-otel": {
"type": "stdio",
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"SEQ_URL=http://host.docker.internal:10150",
"-e",
"SEQ_API_KEY=<YOUR_SEQ_API_KEY>",
"mcp/seq-otel"
]
}
}
}
This repo includes a catalog-ready server definition in:
catalog/server.yamlcatalog/tools.jsonassets/seq-otel-icon.svgcatalog/server.yaml declares:
SEQ_URL as a required user parameter (mapped via config.env)SEQ_API_KEY as a required secret (mapped via config.secrets)These files follow the Docker MCP registry server format, so they can be used in
catalog generation/import workflows (for example via docker/mcp-registry tools).
Submission checklist for Docker MCP Registry:
docs/docker-mcp-registry-submission.mdUse a command-based MCP client entry that launches the container with stdin/stdout attached.
{
"mcpServers": {
"seq-otel": {
"type": "stdio",
"command": "docker",
"args": [
"run",
"--rm",
"-i",
"-e",
"SEQ_URL=https://seq.example.com",
"-e",
"SEQ_API_KEY=<YOUR_SEQ_API_KEY>",
"mcp/seq-otel"
]
}
}
}
Core standalone server scaffold is implemented and buildable.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"seq-mcp": {
"command": "npx",
"args": []
}
}
}