- Generate a Chronosphere API token, either through a personal access token or a service account.
-
Use OAuth. To use the Chronosphere MCP server with OAuth,
your MCP client must support OAuth.
OAuth authentication with the Chronosphere MCP server has been tested with the following MCP clients only.
Prerequisites
If you’re authenticating your MCP client with a Chronosphere API token, use one of the following options to generate one:- Personal access: Create a personal access token to authenticate your user account with Chronosphere. When you authenticate with a personal access token, Chronosphere Observability Platform associates the actions you take with your identity and respects the permissions granted to your user account’s team.
- Programmatic access: Create an unrestricted service account to create a persistent identity for a service or agent that you want to authenticate with your MCP client. You must have administrative access to create a service account.
Authenticating using Claude Code
To authenticate with the Chronosphere MCP server from Claude Code, add the MCP server as a remote HTTP server.-
From within Claude Code, run the following command:
Replace the following:
TENANT: The name of your Observability Platform tenant.API_TOKEN: The API token generated from your service account. Chronosphere recommends storing your API token in a separate file or Kubernetes Secret and calling it using an environment variable, such as$API_TOKEN.
To authenticate using OAuth instead of a Chronosphere API token, omit the--headerflag. You can also use the/mcpcommand to authenticate with OAuth authentication. -
Test your connection with the Chronosphere MCP server:
Authenticating using Cursor
To authenticate with the Chronosphere MCP server from Cursor, modify themcp.json
file to include the Chronosphere MCP server remote endpoint.
-
From within Cursor,
access the
mcp.jsonfile. -
Add the following configuration to the
mcp.jsonfile:Replace the following:TENANT: The name of your Observability Platform tenant.API_TOKEN: The API token generated from your service account. Chronosphere recommends storing your API token in a separate file or Kubernetes Secret and calling it using an environment variable, such as$API_TOKEN.
To authenticate using OAuth instead of a Chronosphere API token, omit theheaderssection from the configuration. -
Save and close the
mcp.jsonfile. - Refresh the MCP server settings in Cursor.