Cloud Horizons
Open navigation

Docs · MCP server

Cloud Horizons MCP private preview

The Cloud Horizons MCP private preview currently exposes anomalies.recent for authenticated tenant cost anomaly reads. Broader inventory, forecast, policy, and lifecycle tools stay out of discovery until their handlers are production-backed.

CLIENTS CLOUD HORIZON MCP BACKEND DATA Claude / GPT agent runs anomaly checks IDE / CLI tools cursor, claude-code Platform scripts curl, n8n, Slack bot Internal portal backstage, retool cloud-horizons.com/api/mcp tools/ tools/list tools/call anomalies.recent hashed API key auth · tenant scoped AWS Cost Data synced Cost Explorer API Key Table hashed tokens Anomaly Store D1 cost tables Future Tools hidden until live

Cloud Horizons sits between your agents and the underlying cost data. Your agent never holds cloud credentials, only an MCP token scoped to the tool it needs.

Current preview endpoint

Use the JSON-RPC endpoint at /api/mcp/v1. Tokens are checked against stored API-key hashes and tenant scope before tool discovery or execution.

Quick start

Authenticate with a stored Cloud Horizons API key, list the tool catalog, then call anomalies.recent through JSON-RPC.

1. List implemented tools

$ curl https://cloud-horizons.com/api/mcp/v1 \
  -H "Authorization: Bearer $TOKEN" \
  -H "Content-Type: application/json" \
  -d '{"jsonrpc":"2.0","id":1,"method":"tools/list","params":{}}'

2. Call recent anomalies

$ curl https://cloud-horizons.com/api/mcp/v1 \
  -H "Authorization: Bearer $TOKEN" \
  -H "Content-Type: application/json" \
  -d '{"jsonrpc":"2.0","id":2,"method":"tools/call","params":{"name":"anomalies.recent","arguments":{"days":7,"severity":"critical"}}}'

3. Or wire it as an MCP server

{
  "mcpServers": {
    "cloud-horizon": {
      "url": "https://cloud-horizons.com/api/mcp/v1",
      "headers": { "Authorization": "Bearer $TOKEN" }
    }
  }
}

Tool catalog

One tool is advertised in private preview. Additional tools return only when backed by production handlers.

anomalies.recent

Recomputes and lists AWS cost anomalies for the authenticated tenant from synced cost data.


              anomalies.recent({ days: 7, severity: "critical" })
            

Auth model

  • Bearer tokens, scoped per agent. Each token carries a list of allowed tools and a list of allowed accounts. Revoke from the dashboard at any time.
  • Read-only by default. The preview MCP surface only exposes anomaly reads.
  • Per-token rate limits. Default is 60 requests per minute.

Audit and observability

  • Every call audit-logged. Token, tool, arguments, result digest, latency, and cost-impact summary stored for 18 months.
  • Webhook stream. Subscribe to call.completed and anomaly.detected events.
  • SOC 2 readiness mapping available. Cloud Horizons does not claim a current SOC 2 report.

Get the MCP token

Request private-preview access for the scoped MCP token.

Connect AWS cost data first. Broader inventory, forecast, lifecycle, and policy tools will appear in discovery only after their backend handlers are live.