MCP servers
Preview
This feature is in Preview.Astro provides experimental Model Context Protocol (MCP) servers that allow AI models and agents to securely access your Astro and Airflow resources. Connect to MCP servers natively or by using the mcp-remote module in compatible AI clients.
For enhanced agent capabilities such as Dag authoring, testing, and debugging, see the Astronomer AI Agent tooling repository.
MCP servers
Astro provides two experimental MCP servers:
- Astro Registry MCP server (
astro-registry) is a remote MCP server for accessing the Astro Registry. - Astro Cloud MCP server (
astro-cloud) is an authenticated remote MCP server for discovering and managing your Astro resources, including Deployments, Workspaces, and environment variables. The Astro Cloud MCP server follows the authenticated remote MCP specification, with the server centrally hosted and managed by Astronomer.
Setup Instructions
Windsurf
Cursor
Claude Code
- Open Windsurf settings with
CTRL/CMD + ,. - Navigate to
Cascade>Manage plugins. - Select
View raw config. - Add the following configuration. Only include the
astro-cloudsection if you’re using the authenticated Astro Cloud MCP server. - (If using Astro Cloud MCP) Find your Astro Organization ID in the Astro UI. Enter the ID as
<MY_ORGANIZATION_ID>in the URL of the configuration above. - (If using Astro Cloud MCP) Create a Workspace or Organization token in the Astro UI. Enter the token as
<MY_AUTH_TOKEN>in the"env"section of the configuration above. - Click
Saveto save your configuration and check thePluginssection to verify that your servers are connected.
Airflow MCP Plugin
The Airflow MCP Plugin (astro-airflow-mcp) is an open-source package that installs directly into an Airflow Deployment and exposes an MCP endpoint on the webserver. This gives AI tools direct access to Airflow’s REST API — Dags, task logs, connections, variables, and more — without running a separate server.
Unlike the Astro Cloud MCP server (which manages Astro-level resources like Deployments and Workspaces), the Airflow MCP Plugin provides Airflow-level access for a single Deployment: listing Dags, viewing task logs, inspecting connections, diagnosing failures, and more.
The plugin auto-detects the installed Airflow version and registers the appropriate integration:
- Airflow 3.x: Mounts as a FastAPI app on the API server.
- Airflow 2.x (2.4 or later): Registers as a Flask blueprint on the webserver.
Prerequisites
- An Airflow Deployment on Astro. The plugin supports Airflow 3.x (Runtime 3.1 or later) and Airflow 2.x (2.4 or later).
- A Deployment API token with a role that allows POST requests (required by the MCP protocol). See Configure authentication for role options.
Install the plugin
Add astro-airflow-mcp to your Astro project’s requirements.txt:
Deploy the change. The package auto-registers as an Airflow plugin — no Dockerfile changes or additional configuration needed.
Set environment variables
After deploying, set the following environment variable on your Deployment to block write operations:
FASTMCP_STATELESS_HTTP environment variable applies only when running the MCP server as a standalone process.Configure authentication
The MCP protocol uses POST requests for all operations, including read-only ones. Your Deployment API token does not need write permissions for read-only MCP access: authorization is still based on the underlying Airflow permissions, so a custom role with read permissions such as *.get is sufficient. The important exception is WORKSPACE_MEMBER, which Astro’s auth proxy blocks from making the POST requests the MCP protocol requires.
Option A: Use a built-in role
Create a Deployment API token with one of the following roles:
- DEPLOYMENT_ADMIN — Full access (works but overprivileged)
- WORKSPACE_OPERATOR or WORKSPACE_AUTHOR — Moderate privilege
WORKSPACE_MEMBER does not work with the MCP plugin. Astro’s auth proxy blocks POST requests for this role, which prevents the MCP protocol handshake from completing.
Option B: Create a custom MCP_VIEWER role (recommended)
For least-privilege access, create a custom Deployment role that includes only read permissions. This ensures the token can use all MCP read tools but cannot modify any Airflow resources.
-
In the Astro UI, go to Organization Settings > Access Management > Roles > + Add Role.
-
Set the Scope to Deployment.
-
Name the role
MCP_VIEWERwith a description like “Read-only access for Airflow MCP plugin.” -
Select all
deployment.airflow.*.getpermissions. See Custom role permissions reference for the full list. The role should include these 28 permissions: -
Click Create role.
Then create a Deployment API token with the new role:
Connect your MCP client
After the plugin is deployed and a token is created, the MCP endpoint is available at:
You can find your Deployment’s webserver URL in the Astro UI on the Deployment’s overview page.
Claude Code
Cursor
VS Code / Other Clients
Use -t http, not -t sse. The MCP endpoint returns SSE-formatted responses, but the correct Claude Code transport type is http. Using -t sse causes the connection to fail.