MCP Hub
Back to servers

bzm-mcp

MCP Server for AI-driven BlazeMeter performance testing

Stars
23
Forks
2
Updated
Jan 8, 2026
Validated
Jan 9, 2026

GitHub Downloads (all assets, all releases) GHCR Pulls

BlazeMeter MCP Server

The BlazeMeter MCP Server connects AI tools directly to BlazeMeter's cloud-based performance testing platform. This gives AI agents, assistants, and chatbots the ability to manage complete load testing workflows from creation to execution and reporting. All through natural language interactions.

[!NOTE] For detailed documentation including use cases, available tools, integration points, and troubleshooting, see the BlazeMeter MCP Server documentation.


Prerequisites

  • BlazeMeter API credentials (API Key ID and Secret)
  • Comply Blazemeter AI Consent
  • Compatible MCP host (VS Code, Claude Desktop, Cursor, Windsurf, etc.)
  • Docker (only for Docker-based deployment)
  • uv and Python 3.11+ (only for installation from source code distribution)

Setup

Get BlazeMeter API Credentials

Follow the BlazeMeter API Keys guide to obtain your API keys as JSON.

[!IMPORTANT] When downloading your API keys from BlazeMeter, save the api-keys.json file in the same folder where you'll place the MCP binary.

Quick Setup with CLI Tool

The easiest way to configure your MCP client is using our interactive CLI tool:

  1. Download the appropriate binary for your operating system from the Releases page

[!NOTE] Choose the binary that matches your OS (Windows, macOS, Linux)

  1. Place the binary in the same folder as your api-keys.json file
  2. Execute or Double-click the binary to launch the interactive configuration tool
  3. The tool automatically generates the JSON configuration file for you

[!IMPORTANT] For macOS: You may encounter a security alert saying "Apple could not verify 'bzm-mcp-darwin' is free of malware." To resolve this:

  1. Go to System SettingsPrivacy & SecuritySecurity
  2. Look for the blocked application and click "Allow Anyway"
  3. Try running the binary again

CLI Demo


Manual Client Configuration (Binary Installation)

  1. Download the binary for your operating system from the Releases page
  2. Configure your MCP client with the following settings:
{
  "mcpServers": {
    "BlazeMeter MCP": {
      "command": "/path/to/bzm-mcp-binary",
      "args": ["--mcp"],
      "env": {
        "BLAZEMETER_API_KEY": "/path/to/your/api-key.json"
      }
    }
  }
}

Manual Client Configuration (From Remote Source Code)

  1. Prerequisites: uv and Python 3.11+
  2. Configure your MCP client with the following settings:
{
  "mcpServers": {
    "BlazeMeter MCP": {
      "command": "uvx",
      "args": [
        "--from", "git+https://github.com/Blazemeter/bzm-mcp.git@v1.0.1",
        "-q", "bzm-mcp", "--mcp"
      ],
      "env": {
        "BLAZEMETER_API_KEY": "/path/to/your/api-key.json"
      }
    }
  }
}

[!NOTE] uvx installs and runs the package and its dependencies in a temporary environment. You can change to any version that has been released or any branch you want. Package support for uvx command is supported from version 1.0.1 onwards. For more details on the uv/uvx arguments used, please refer to the official uv documentation.


Docker MCP Client Configuration

{
  "mcpServers": {
    "Docker BlazeMeter MCP": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "--mount",
        "type=bind,source=/path/to/your/test/files,target=/home/bzm-mcp/working_directory/",
        "-e",
        "API_KEY_ID=your_api_key_id",
        "-e",
        "API_KEY_SECRET=your_api_key_secret",
        "-e",
        "SOURCE_WORKING_DIRECTORY=/path/to/your/test/files",
        "ghcr.io/blazemeter/bzm-mcp:latest"
      ]
    }
  }
}

[!IMPORTANT] For Windows OS, paths must use backslashes (\) and be properly escaped as double backslashes (\\) in the JSON configuration. E.g.: C:\\User\\Desktop\\mcp_test_folder

[!NOTE] In order to obtain the API_KEY_ID andAPI_KEY_SECRET refere to BlazeMeter API keys


Custom CA Certificates (Corporate Environments) for Docker

When you need this:

  • Your organization uses self-signed certificates
  • You're behind a corporate proxy with SSL inspection
  • You have a custom Certificate Authority (CA)
  • You encounter SSL certificate verification errors when running tests

Required Configuration:

When using custom CA certificate bundles, you must configure both:

  1. Certificate Volume Mount: Mount your custom CA certificate bundle into the container
  2. SSL_CERT_FILE Environment Variable: Explicitly set the SSL_CERT_FILE environment variable to point to the certificate location inside the container
Example Configuration
{
  "mcpServers": {
    "Docker BlazeMeter MCP": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "--mount",
        "type=bind,source=/path/to/your/test/files,target=/home/bzm-mcp/working_directory/",
        "-v",
        "/path/to/your/ca-bundle.crt:/etc/ssl/certs/custom-ca-bundle.crt",
        "-e",
        "SSL_CERT_FILE=/etc/ssl/certs/custom-ca-bundle.crt",
        "-e",
        "API_KEY_ID=your_api_key_id",
        "-e",
        "API_KEY_SECRET=your_api_key_secret",
        "-e",
        "SOURCE_WORKING_DIRECTORY=/path/to/your/test/files",
        "ghcr.io/blazemeter/bzm-mcp:latest"
      ]
    }
  }
}

Replace:

  • /path/to/your/ca-bundle.crt with your host system's CA certificate file path
  • The container path /etc/ssl/certs/custom-ca-bundle.crt can be any path you prefer (just ensure it matches SSL_CERT_FILE)

The SSL_CERT_FILE environment variable must be set to point to your custom CA certificate bundle. The httpx library automatically respects the SSL_CERT_FILE environment variable for SSL certificate verification.


License

This project is licensed under the Apache License, Version 2.0. Please refer to LICENSE for the full terms.


Support

Reviews

No reviews yet

Sign in to write a review