Grafana MCP server
An MCP server giving access to Grafana dashboards, data and more. Connect your AI agents to Grafana with enterprise-grade governance, observability, and control through MintMCP Gateway.
Tools included with Grafana MCP
add_activity_to_incident
Add a note (userNote activity) to an existing incident's timeline using its ID. The note body can include URLs which ...
alerting_manage_routing
Manage Grafana alerting routing configuration, including notification policies, contact points and time intervals. N...
alerting_manage_rules
Manage Grafana alert rules with full CRUD capabilities and filtering. When to use: - Understanding why an alert is o...
create_annotation
Create a new annotation on a dashboard or panel. Set format to 'graphite' and provide 'what' for Graphite-format anno...
create_folder
Create a Grafana folder. Provide a title and optional UID. Returns the created folder.
create_incident
Create a new Grafana incident. Requires title, severity, and room prefix. Allows setting status and labels. This tool...
find_error_pattern_logs
Searches Loki logs for elevated error patterns compared to the last day's average, waits for the analysis to complete...
find_slow_requests
Searches relevant Tempo datasources for slow requests, waits for the analysis to complete, and returns the results.
generate_deeplink
Generate deeplink URLs for Grafana resources. Supports dashboards (requires dashboardUid), panels (requires dashboard...
get_alert_group
Get a specific alert group from Grafana OnCall by its ID. Returns the full alert group details.
get_annotation_tags
Returns annotation tags with optional filtering by tag name. Only the provided filters are applied.
get_annotations
Fetch Grafana annotations using filters such as dashboard UID, time range and tags.
get_assertions
Get assertion summary for a given entity with its type, name, env, site, namespace, and a time range
get_current_oncall_users
Get the list of users currently on-call for a specific Grafana OnCall schedule ID. Returns the schedule ID, name, and...
get_dashboard_by_uid
Retrieves the complete dashboard, including panels, variables, and settings, for a specific dashboard identified by i...
get_dashboard_panel_queries
Retrieve panel queries from a Grafana dashboard. Supports all datasource types (Prometheus, Loki, CloudWatch, SQL, et...
get_dashboard_property
Get specific parts of a dashboard using JSONPath expressions to minimize context window usage. Common paths: '$.title...
get_dashboard_summary
Get a compact summary of a dashboard including title, panel count, panel types, variables, and other metadata wit...
get_datasource
Retrieves detailed information about a specific datasource by UID or name. Returns the full datasource model, includi...
get_incident
Get a single incident by ID. Returns the full incident details including title, status, severity, labels, timestamps,...
Showing 20 of 50 tools
Works with every major client
Why MintMCP gateway
Centralized governance
Unified authentication, audit logging, and rate control for all Grafana MCP connections.
One-click deployment
Instantly enable Grafana MCP for AI teams via MintMCP's standardized gateway without manual server setup.
OAuth + SSO enforcement
Automatic enterprise authentication wrapping for Grafana MCP endpoints.
Host stdio servers on MintMCP instead of running locally
Containerized servers become accessible to clients like ChatGPT without local installations. Better risk management and security posture without requiring users to run servers on their machines.
Observability and control
Real-time dashboards for monitoring usage, detecting anomalies, and maintaining SLA compliance.
Enterprise hardening
High availability, security, and compliance alignment transform MCP from developer utility to production-grade infrastructure.
Supports shared and per-user auth
Flexibility to configure service accounts at the admin level or enable individual OAuth flows. Secrets remain protected while users gain access, with centralized revocation capabilities.
Granular tool access control
Configure tool access by role. For example, enable read-only operations and exclude write tools like create and delete.
FAQs
Yes. MintMCP Gateway is SOC 2 compliant and uses OAuth-based authentication for all Grafana MCP interactions.