Skip to content

MCP Interface (AI Integration)

DATAZONE Control provides an MCP (Model Context Protocol) interface that allows AI assistants like Claude Code, Claude Desktop, or Cursor to directly access the platform.

Overview

The Model Context Protocol (MCP) is an open standard by Anthropic that enables AI assistants to access external tools and data sources. With the DATAZONE MCP integration, you can:

  • Ask questions: "Which servers have critical alerts?"
  • Analyze hosts: "Analyze the status of srv-web-01"
  • Generate reports: "Create a security report for customer XY"
  • Execute actions: "Trigger an update on all Linux servers"

MCP Tokens

Creating a Token

  1. Navigate to Settings > MCP Tokens
  2. Click Create Token
  3. Enter a descriptive name (e.g., "Claude Code Florian")
  4. Select the permission scope:
    • Read: Query hosts, alerts, compliance, dashboard
    • Read + Write: Additionally execute scripts, create tasks, trigger updates
    • Admin: Full access including user management and settings
  5. Optional: Set an expiration date (30 days, 90 days, 1 year)
  6. Important: Copy the displayed token immediately — it is only shown once!

Security

  • Tokens are stored as SHA-256 hashes (never in plain text)
  • Each token inherits the permissions of its creator
  • Expired tokens are automatically deactivated
  • Rate limiting protects against abuse (60/30/20 requests per minute depending on scope)

Client Configuration

Claude Code (VSCode)

Create .vscode/mcp.json in your project:

json
{
  "servers": {
    "datazone": {
      "type": "sse",
      "url": "http://control.datazone.de:8080/mcp/sse"
    }
  }
}

Claude Desktop

Add to your Claude Desktop configuration:

json
{
  "mcpServers": {
    "datazone": {
      "url": "http://control.datazone.de:8080/mcp/sse",
      "transport": "sse"
    }
  }
}

Available Tools

Read Tools (Read Scope)

ToolDescription
list_hostsList all hosts, optionally filter by module
get_hostGet host details
get_alertsGet security alerts from Wazuh
get_complianceGet SCA compliance scores
get_dashboardDashboard statistics
get_customersCustomer list
get_groupsHost groups
get_audit_logAudit log entries
search_hostsSearch hosts by name/IP
get_update_statusPending updates overview
analyze_hostSmart Tool: Combined host analysis (details + alerts + compliance)
get_problemsSmart Tool: All current problems at a glance
get_windows_updatesGlobal Windows update overview with approval status
list_schedulesList update/script/playbook schedules

Search Tools (Read Scope)

Search across all host detail data across all modules:

ToolDescriptionExample
search_softwareSearch installed software on Windows hostssearch_software("Chrome")
search_hardwareSearch hardware info: CPU, RAM, GPU, serial numbersearch_hardware("Xeon")
search_disksSearch disks by usage or mount pointsearch_disks(min_usage=90)
search_servicesSearch Windows, Linux, and OPNsense servicessearch_services("nginx")
search_portsSearch open ports on Linux/PVE/PBSsearch_ports(port=443)
search_networkSearch network interfaces: IP, MAC, namesearch_network("10.100.")
search_dockerSearch Docker containers on Linux hostssearch_docker("postgres")
search_vmsSearch virtual machines on PVE hostssearch_vms("windows")
search_updatesSearch pending updates (Linux + Windows)search_updates("kernel")
search_cronSearch cron jobs on Linux/PVE/PBSsearch_cron("backup")
search_sshSearch active SSH sessionssearch_ssh("root")
search_backupsSearch backups on PVE + PBSsearch_backups("failed")
search_vpnSearch VPN tunnels on OPNsense firewallssearch_vpn("wireguard")

Write Tools (Read-Write Scope)

ToolDescription
execute_scriptExecute script on hosts
create_taskCreate agent task (update, reboot, etc.)
trigger_updateTrigger system update
execute_checkExecute compliance check
create_tunnelCreate SSH tunnel
execute_playbookExecute playbook
generate_reportGenerate security or infrastructure report

Admin Tools

ToolDescription
manage_usersManage users (list, create, delete)
update_settingsChange system settings

Prompt Templates

MCP Prompts are pre-built workflows that the AI assistant can execute:

PromptDescription
security-reportComprehensive security report with alerts, compliance, and recommendations
infrastructure-summaryInfrastructure status overview across all modules
incident-responseGuided incident response workflow

Examples

Query Hosts

"Show me all Linux servers and their status"
→ Claude uses list_hosts(module="linux")

Identify Problems

"Are there any critical problems right now?"
→ Claude uses get_problems()

Analyze Host

"Analyze the server fw-main"
→ Claude uses analyze_host("fw-main")

Security Report

"Create a security report"
→ Claude uses the security-report prompt and calls multiple tools

Search Infrastructure

"Which servers have Google Chrome installed?"
→ Claude uses search_software("Chrome")

"Which server has 128 GB RAM?"
→ Claude uses search_hardware("128")

"Where are disks more than 90% full?"
→ Claude uses search_disks(min_usage=90)

"Which hosts have port 443 open?"
→ Claude uses search_ports(port=443)

"Which servers run the Docker container nginx?"
→ Claude uses search_docker("nginx")

"Show all running VMs"
→ Claude uses search_vms("running")

"Which hosts have pending security updates?"
→ Claude uses search_updates("security")

"Who is currently logged in via SSH?"
→ Claude uses search_ssh("")

"Show all VPN tunnels"
→ Claude uses search_vpn("")

DATAZONE Control Documentation