Skip to main content
The incident.io MCP server lets you connect any AI assistant that supports the Model Context Protocol directly to your incident data. Query incidents, analyse alerts, check who’s on call, manage escalations, and run deep operational analysis — all from your existing AI tools.
Already using the incident.io desktop app? You already have full access to everything on this page and more. The desktop app includes a local MCP server that provides all the tools described here, plus rich investigation file access, incident pinning, and the ability to post findings directly to incident channels. No additional setup is needed — if you’ve installed the desktop app, you’re set.The remote MCP server described here is for people who want to connect without installing the desktop app — for example, using Claude.ai in a browser, ChatGPT, or plugging incident.io into automated agent pipelines.

What you can do

Incident analysis and reporting

Ask questions across your entire incident history without manual data gathering:
  • “How many P1 incidents did we have this quarter, and which teams were most affected?”
  • “What’s the trend in overnight responder workload by alert source?”
  • “Show me the top 10 highest-workload incidents this month”
The incident_stats tool supports 10 grouping dimensions (severity, status, type, mode, alert source, custom fields, roles, time periods) with workload breakdowns showing where responder time is spent — during working hours, late evening, or overnight.

Alert and noise analysis

Understand where alert noise is coming from and which areas generate the most on-call work:
  • “Which alerts result in actual incidents vs noise?”
  • “Break down alert volume and workload by team and service”
  • “What proportion of our pages happen overnight, and what triggers them?”
You can analyse alerts by source, priority, time period, and whether they resulted in incidents. Combined with incident stats grouped by team, service, or any custom field, you can trace the full path from alert noise through to responder cost — and identify the highest-ROI improvements to make.

On-call and escalation management

Check schedules, respond to pages, and analyse paging patterns:
  • “Who’s on call for the platform team right now?”
  • “What’s our ack rate by escalation path this month?”
  • “Acknowledge the page for INC-456”

Incident management

Create and update incidents, manage follow-ups, and access investigation data:
  • “Create a P2 incident for the payments API degradation”
  • “Update INC-123 to resolved”
  • “What are the outstanding follow-ups from last week’s incidents?”

Deep investigation

For any specific incident, access AI investigation findings, post-mortem documents, and full status update history:
  • “Show me INC-123 with the investigation findings and post-mortem”
  • “What was the root cause of our most recent major incident?”

Telemetry and observability

Query logs, metrics, traces, and dashboards across all the observability platforms you’ve connected via AI SRE — including Datadog, Grafana, Splunk, Honeycomb, Elasticsearch, GCP Cloud Logging, and more. This works for any debugging scenario, not just active incidents. Use it to investigate production issues, check service health, run ad-hoc queries, or pull data for reports:
  • “What are the error rates for the payments service over the last hour?”
  • “Show me the logs around the time of INC-123”
  • “Query the CPU and memory dashboards for the worker pods”
  • “Are there any anomalies in the checkout service latency this week?”
  • “Pull the Datadog traces for requests over 5 seconds”
The AI agent plans queries across your datasources, handles pagination and time ranges, and synthesises the results. It can search dashboards by name, query metrics with the right labels, and correlate signals across multiple platforms — saving you from switching between tabs and writing queries manually.

Setup

The remote MCP server is available at https://mcp.incident.io/mcp. There are two ways to authenticate, depending on your use case.

For interactive use (OAuth)

If you’re a human connecting via an AI assistant like Claude, ChatGPT, or Cursor, you’ll authenticate with your incident.io account via OAuth. The MCP client handles the flow — you just approve access in your browser when prompted. Actions are attributed to your user account, and you see the same data you’d see in the dashboard.
  1. Open Claude Desktop and go to Settings → Integrations → Add integration.
  2. Enter the server URL: https://mcp.incident.io/mcp
  3. Claude will redirect you to incident.io to authorise access.
  4. Once authorised, the incident.io tools will appear in Claude’s tool list.

For automated systems (API keys)

If you’re connecting programmatic agents, custom workflows, or automation pipelines, use an API key. API keys authenticate as a service actor rather than a specific user, and don’t expire until deleted.
  1. Go to Settings → API keys in your incident.io dashboard.
  2. Create a new API key with the scopes you need.
  3. Pass it as a Bearer token in the Authorization header when connecting your MCP client to https://mcp.incident.io/mcp.
For example, to test connectivity:
curl -X POST https://mcp.incident.io/mcp \
  -H "Authorization: Bearer your-api-key" \
  -H "Content-Type: application/json" \
  -d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
This is ideal for integrating incident.io into your own agents, n8n workflows, Dust, or custom automation pipelines.

Getting the most out of it

Read the configuration first

Before filtering or grouping, ask the tools for your organisation’s configuration — it lists your severity levels, custom fields, roles, and other values you’ll need:
  • Use the resource_show tool with resource: "organisation", or
  • Read the config://organisation resource directly (if your client supports MCP resources)

Use includes for deeper analysis

When investigating an incident, always request the investigation and post-mortem data:
incident_show(id: "INC-123", include: ["investigation", "postmortem"])
Without these, you only get the basic metadata. With them, you get the AI’s analysis of what happened, the team’s written post-mortem, and all the evidence gathered during investigation.

Start with stats, then drill in

For analytical questions, follow the stats → list → show pattern:
  1. incident_stats to get the shape (counts, workload, trends)
  2. incident_list to browse the interesting groups
  3. incident_show to get full details on specific incidents
This is much more efficient than paginating through individual incidents.

Send feedback

If you hit friction or wish a tool worked differently, use the feedback tool to let us know. Your AI assistant will prompt you about this after completing tasks — approve the feedback to help us prioritise improvements.

Available tools

ToolDescription
incident_showFull incident details with optional investigation, post-mortem, and update history
incident_listSearch and browse incidents with filters, sortable by workload
incident_createCreate a new incident
incident_updateUpdate incident fields (status, severity, roles, custom fields)
incident_statsAggregate counts and workload by 10+ dimensions
incident_update_listFull status update history for an incident
alert_listSearch and browse alerts
alert_showFull alert details with linked incidents
alert_source_listList configured alert sources
alert_statsAlert counts with workload from linked incidents
escalation_listSearch escalations (pages)
escalation_showFull escalation details with transition history
escalation_respondAcknowledge or decline a page
escalation_statsPaging counts by path, priority, time of day
escalation_path_listList escalation paths
escalation_path_showWho would be paged at each level
schedule_listList on-call schedules
schedule_showSchedule details with current and upcoming shifts
follow_up_listList post-incident follow-ups
follow_up_createCreate a follow-up on an incident
catalog_type_listList catalog types (Service, Team, etc.)
catalog_entry_listBrowse entries in a catalog type
catalog_entry_showFull catalog entry with all attributes
askAI agent for on-call queries, schedule management, and general questions
ask_incidentAI agent for incident investigation and management actions
ask_telemetryAI agent for querying logs, metrics, traces, and dashboards
resource_showRead organisation config, analysis playbook, or telemetry datasources
feedbackSubmit feedback about the tools