MCP servers

Preview
This feature is in Preview.

Astro provides experimental Model Context Protocol (MCP) servers that allow AI models and agents to securely access your Astro and Airflow resources. Connect to MCP servers natively or by using the mcp-remote module in compatible AI clients.

For enhanced agent capabilities such as Dag authoring, testing, and debugging, see the Astronomer AI Agent tooling repository.

MCP servers

Astro provides two experimental MCP servers:

  • Astro Registry MCP server (astro-registry) is a remote MCP server for accessing the Astro Registry.
  • Astro Cloud MCP server (astro-cloud) is an authenticated remote MCP server for discovering and managing your Astro resources, including Deployments, Workspaces, and environment variables. The Astro Cloud MCP server follows the authenticated remote MCP specification, with the server centrally hosted and managed by Astronomer.

Setup Instructions

If you experience any issues, try restarting your client or disabling and re-enabling the Astro MCP server connection.
  1. Open Windsurf settings with CTRL/CMD + ,.
  2. Navigate to Cascade > Manage plugins.
  3. Select View raw config.
  4. Add the following configuration. Only include the astro-cloud section if you’re using the authenticated Astro Cloud MCP server.
    1{
    2 "mcpServers": {
    3 "astro-registry": {
    4 "command": "npx",
    5 "args": [
    6 "-y",
    7 "mcp-remote",
    8 "https://api.astronomer.io/registryV2/v1alpha1/mcp"
    9 ]
    10 },
    11 "astro-cloud": {
    12 "command": "npx",
    13 "args": [
    14 "-y",
    15 "mcp-remote",
    16 "https://api.astronomer.io/v1alpha1/mcp?organizationId=<MY_ORGANIZATION_ID>",
    17 "--header",
    18 "Authorization: Bearer ${AUTH_TOKEN}"
    19 ],
    20 "env": {
    21 "AUTH_TOKEN": "<MY_AUTH_TOKEN>"
    22 }
    23 }
    24 }
    25}
  5. (If using Astro Cloud MCP) Find your Astro Organization ID in the Astro UI. Enter the ID as <MY_ORGANIZATION_ID> in the URL of the configuration above.
  6. (If using Astro Cloud MCP) Create a Workspace or Organization token in the Astro UI. Enter the token as <MY_AUTH_TOKEN> in the "env" section of the configuration above.
  7. Click Save to save your configuration and check the Plugins section to verify that your servers are connected.

Airflow MCP Plugin

The Airflow MCP Plugin (astro-airflow-mcp) is an open-source package that installs directly into an Airflow Deployment and exposes an MCP endpoint on the webserver. This gives AI tools direct access to Airflow’s REST API — Dags, task logs, connections, variables, and more — without running a separate server.

Unlike the Astro Cloud MCP server (which manages Astro-level resources like Deployments and Workspaces), the Airflow MCP Plugin provides Airflow-level access for a single Deployment: listing Dags, viewing task logs, inspecting connections, diagnosing failures, and more.

The plugin auto-detects the installed Airflow version and registers the appropriate integration:

  • Airflow 3.x: Mounts as a FastAPI app on the API server.
  • Airflow 2.x (2.4 or later): Registers as a Flask blueprint on the webserver.

Prerequisites

  • An Airflow Deployment on Astro. The plugin supports Airflow 3.x (Runtime 3.1 or later) and Airflow 2.x (2.4 or later).
  • A Deployment API token with a role that allows POST requests (required by the MCP protocol). See Configure authentication for role options.

Install the plugin

Add astro-airflow-mcp to your Astro project’s requirements.txt:

astro-airflow-mcp

Deploy the change. The package auto-registers as an Airflow plugin — no Dockerfile changes or additional configuration needed.

Set environment variables

After deploying, set the following environment variable on your Deployment to block write operations:

$astro deployment variable create --deployment-id <DEPLOYMENT_ID> AF_READ_ONLY=true
VariableRequiredDescription
AF_READ_ONLYRecommendedBlocks all write operations (trigger, pause, clear, delete) at the MCP server level, regardless of the token’s permissions. Set to true for safe read-only access.
In plugin mode, the MCP server always runs in stateless HTTP mode, so Claude Code and other MCP clients work without additional configuration. The FASTMCP_STATELESS_HTTP environment variable applies only when running the MCP server as a standalone process.

Configure authentication

The MCP protocol uses POST requests for all operations, including read-only ones. Your Deployment API token does not need write permissions for read-only MCP access: authorization is still based on the underlying Airflow permissions, so a custom role with read permissions such as *.get is sufficient. The important exception is WORKSPACE_MEMBER, which Astro’s auth proxy blocks from making the POST requests the MCP protocol requires.

Option A: Use a built-in role

Create a Deployment API token with one of the following roles:

  • DEPLOYMENT_ADMIN — Full access (works but overprivileged)
  • WORKSPACE_OPERATOR or WORKSPACE_AUTHOR — Moderate privilege

WORKSPACE_MEMBER does not work with the MCP plugin. Astro’s auth proxy blocks POST requests for this role, which prevents the MCP protocol handshake from completing.

For least-privilege access, create a custom Deployment role that includes only read permissions. This ensures the token can use all MCP read tools but cannot modify any Airflow resources.

  1. In the Astro UI, go to Organization Settings > Access Management > Roles > + Add Role.

  2. Set the Scope to Deployment.

  3. Name the role MCP_VIEWER with a description like “Read-only access for Airflow MCP plugin.”

  4. Select all deployment.airflow.*.get permissions. See Custom role permissions reference for the full list. The role should include these 28 permissions:

    PermissionPurpose
    deployment.getGet Deployment information
    deployment.airflow.adminMenu.getView Admin menu (gates Airflow config API)
    deployment.airflow.astronomer.getView Astronomer menu
    deployment.airflow.auditLog.getView audit logs
    deployment.airflow.browseMenu.getView Browse menu
    deployment.airflow.clusterActivity.getView cluster activity and DAG stats
    deployment.airflow.configMenu.getView Config menu
    deployment.airflow.connection.getView connections
    deployment.airflow.customMenu.getView custom plugin menus
    deployment.airflow.dag.getView Dags
    deployment.airflow.dagCode.getView DAG source code
    deployment.airflow.dagDependencies.getView DAG dependencies
    deployment.airflow.dagRun.getView DAG runs
    deployment.airflow.datasets.getView assets and datasets
    deployment.airflow.docs.getView documentation links
    deployment.airflow.importError.getView import errors
    deployment.airflow.job.getView scheduler jobs
    deployment.airflow.plugin.getView plugins
    deployment.airflow.pool.getView pools
    deployment.airflow.provider.getView providers
    deployment.airflow.slaMiss.getView SLA misses
    deployment.airflow.taskInstance.getView task instances
    deployment.airflow.taskLog.getView task logs
    deployment.airflow.taskReschedule.getView task reschedules
    deployment.airflow.trigger.getView triggers
    deployment.airflow.variable.getView variables
    deployment.airflow.website.getAccess the Airflow UI
    deployment.airflow.xcom.getView XCom data
  5. Click Create role.

Then create a Deployment API token with the new role:

$astro deployment token create \
> --deployment-id <DEPLOYMENT_ID> \
> --name "mcp-viewer" \
> --role MCP_VIEWER

Connect your MCP client

After the plugin is deployed and a token is created, the MCP endpoint is available at:

https://<DEPLOYMENT_WEBSERVER_URL>/mcp/v1/

You can find your Deployment’s webserver URL in the Astro UI on the Deployment’s overview page.

$claude mcp add -t http -s user \
> -H "Authorization: Bearer <TOKEN>" \
> -- airflow \
> "https://<DEPLOYMENT_WEBSERVER_URL>/mcp/v1/"

Use -t http, not -t sse. The MCP endpoint returns SSE-formatted responses, but the correct Claude Code transport type is http. Using -t sse causes the connection to fail.

Troubleshooting

SymptomCauseFix
Failed to connect with -t sseWrong transport typeUse -t http instead of -t sse in Claude Code
401 Unauthorized on MCP endpointMissing or expired tokenRegenerate the Deployment API token
403 Forbidden on some read toolsIncomplete role permissionsEnsure the role includes all deployment.airflow.*.get permissions listed above
403 on get_airflow_config or list_dag_warningsAirflow Admin RBAC requiredA small number of Airflow API endpoints require the Admin role regardless of Astro permissions. Most MCP tools work without Admin access.
WORKSPACE_MEMBER token failsPOST blocked by Astro auth proxyUse a higher-privilege role or create a custom MCP_VIEWER role
404 on MCP endpoint right after a deployPlugin loads per-worker, rolling restart in progressWait for the rollout to settle, then retry. The first MCP call per worker also adds a small one-time latency while the FastMCP lifespan warms up.