cmehdiha/enterprise-cloudwatch-mcp
If you are the rightful owner of enterprise-cloudwatch-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The Enterprise CloudWatch MCP Server V2 package provides a robust solution for secure cross-account CloudWatch access through natural language commands, integrating seamlessly with AWS Identity Center and Kiro IDE.
Enterprise CloudWatch MCP Server V2 - Deployment Package
🎯 Overview
This package contains the Enterprise CloudWatch MCP Server V2 that integrates with AWS Identity Center for secure cross-account CloudWatch access through Kiro IDE using natural language commands.
📦 Package Contents
Core Files
enterprise-cloudwatch-mcp-server.py- Main MCP server with CloudWatch integrationconfig-template.json- Configuration template (needs customization)setup-identity-center.py- Identity Center discovery and setup scriptdeploy-server.py- Automated deployment scripttest-connection.py- Connection and functionality testing
Documentation
SETUP-GUIDE.md- Complete setup instructionsIDENTITY-CENTER-GUIDE.md- Identity Center configuration guideDEMO-COMMANDS.md- Available commands and demo scriptTROUBLESHOOTING.md- Common issues and solutions
Kiro Integration
kiro-mcp-config.json- Kiro MCP configuration templatesetup-kiro.py- Automated Kiro configuration script
🚀 Quick Start
Step 1: Configure Identity Center
# 1. Run the discovery script to find your Identity Center details
python setup-identity-center.py
# 2. Follow the prompts to configure your Identity Center instance
# This will update config-template.json with your specific settings
Step 2: Deploy the MCP Server
# Deploy to AWS using your configured settings
python deploy-server.py
Step 3: Configure Kiro
# Set up Kiro MCP integration
python setup-kiro.py
Step 4: Test the Setup
# Test the complete integration
python test-connection.py
🔧 Configuration Requirements
You will need to provide:
- Identity Center Instance ARN (discovered automatically)
- AWS Account ID (your primary account)
- User Email (your Identity Center user)
- Target Account IDs (accounts you want to access)
📋 Prerequisites
- AWS CLI configured with appropriate permissions
- Python 3.8+ with boto3, requests
- Kiro IDE installed
- AWS Identity Center access
🎭 Demo Commands
Once configured, you can use these natural language commands in Kiro:
Health & Status
- "Check server health"
- "What's my user info?"
CloudWatch Logs
- "List my log groups"
- "Search logs in [log-group-name] for errors"
- "Show recent logs from [log-group-name]"
Cross-Account Access
- "List log groups in account [account-id]"
- "Search logs in account [account-id] for [pattern]"
CloudWatch Metrics & Alarms
- "List CloudWatch metrics"
- "Show alarms in ALARM state"
- "List metrics for AWS/Lambda"
🔐 Security Features
- ✅ AWS Identity Center integration
- ✅ Multi-tenant support with user isolation
- ✅ Audit trails for all operations
- ✅ Permission set propagation
- ✅ Secure credential handling
📞 Support
For issues or questions:
- Check
TROUBLESHOOTING.md - Run
python test-connection.pyfor diagnostics - Review CloudTrail logs for audit information
🎉 Ready to Deploy
This package is production-ready and includes:
- Complete automation scripts
- Comprehensive documentation
- Testing and validation tools
- Security best practices
- Multi-account support
Start with the SETUP-GUIDE.md for detailed instructions.