MCP Hub
Back to servers

SQL Sentinel MCP Server

SQL Server monitoring and diagnostics for AI agents using Extended Events. No ODBC drivers required.

Updated
Feb 25, 2026

SQL Sentinel MCP Server

NuGet Docker License: MIT

A production-ready MCP (Model Context Protocol) server for SQL Server monitoring, diagnostics, and database operations. Built with .NET 9 and Microsoft.Data.SqlClient for native SQL Server connectivity — no ODBC drivers required.

Features

  • Session Management — Create, start, stop, drop, and list Extended Events sessions
  • Smart Filtering — Filter by application, database, user, duration, host, and text patterns
  • Query Fingerprinting — Normalize and group similar queries differing only in literal values
  • Sequence Analysis — Trace execution order with timing gaps and cumulative duration
  • Deadlock Detection — Capture and analyze XML deadlock reports with victim/process details
  • Blocking Analysis — Monitor blocked process events with wait resource and SQL text
  • Wait Stats — Query sys.dm_os_wait_stats directly, categorized by type (CPU, I/O, Lock, Memory, etc.)
  • Health Check — Comprehensive server diagnostic: slow queries, deadlocks, blocking, wait stats, and insights
  • Real-Time Streaming — Stream captured events for a specified duration
  • Production-Safe — Auto-excludes noise (sp_reset_connection, SET statements, trace queries)
  • Database Operations — List tables, describe schemas, query data, insert, update, and drop tables
  • AI-Optimized — Structured JSON output with optional Markdown formatting

Requirements

  • SQL Server 2012+ with Extended Events enabled (default)
  • Required permissions:
    GRANT ALTER ANY EVENT SESSION TO [your_login];
    GRANT VIEW SERVER STATE TO [your_login];
    
  • For blocked process detection:
    EXEC sp_configure 'show advanced options', 1;
    RECONFIGURE;
    EXEC sp_configure 'blocked process threshold', 5;
    RECONFIGURE;
    

Installation

Option 1: Docker (Recommended)

No .NET SDK required. Works on any system with Docker installed.

docker pull ghcr.io/tkmawarire/sql-sentinel-mcp:latest

Claude Desktop (claude_desktop_config.json)

{
  "mcpServers": {
    "sql-sentinel": {
      "command": "docker",
      "args": ["run", "-i", "--rm", "--network", "host",
               "-e", "SQL_SENTINEL_CONNECTION_STRING=Server=localhost;Database=master;User Id=sa;Password=YourPassword;TrustServerCertificate=true",
               "ghcr.io/tkmawarire/sql-sentinel-mcp:latest"]
    }
  }
}

Claude Code

claude mcp add sql-sentinel \
  -e SQL_SENTINEL_CONNECTION_STRING="Server=localhost;Database=master;User Id=sa;Password=YourPassword;TrustServerCertificate=true" \
  -- docker run -i --rm --network host \
  -e SQL_SENTINEL_CONNECTION_STRING \
  ghcr.io/tkmawarire/sql-sentinel-mcp:latest

Network access: The -i flag is required for stdio transport. Use --network host so the container can reach SQL Server on your host machine. For remote SQL Server, omit --network host and use the accessible hostname in your connection string.

Connection string: Set SQL_SENTINEL_CONNECTION_STRING via -e. All tools read the connection string from this environment variable.

Option 2: .NET Global Tool (NuGet)

Requires .NET 9 SDK or later.

dotnet tool install -g Neofenyx.SqlSentinel.Mcp
{
  "mcpServers": {
    "sql-sentinel": {
      "command": "sql-sentinel-mcp",
      "env": {
        "SQL_SENTINEL_CONNECTION_STRING": "Server=localhost;Database=master;User Id=sa;Password=YourPassword;TrustServerCertificate=true"
      }
    }
  }
}

Option 3: Build from Source

git clone https://github.com/tkmawarire/sql-sentinel.git
cd sql-sentinel
dotnet build

Run directly:

dotnet run --project SqlServer.Profiler.Mcp/

Or publish a self-contained single binary:

# Windows
dotnet publish SqlServer.Profiler.Mcp/ -c Release -r win-x64 --self-contained

# Linux
dotnet publish SqlServer.Profiler.Mcp/ -c Release -r linux-x64 --self-contained

# macOS (Apple Silicon)
dotnet publish SqlServer.Profiler.Mcp/ -c Release -r osx-arm64 --self-contained

# macOS (Intel)
dotnet publish SqlServer.Profiler.Mcp/ -c Release -r osx-x64 --self-contained

Output will be in bin/Release/net9.0/{runtime}/publish/

Connection Strings

All tools read the connection string from the SQL_SENTINEL_CONNECTION_STRING environment variable. Set it once before starting the server:

export SQL_SENTINEL_CONNECTION_STRING="Server=localhost;Database=master;User Id=sa;Password=YourPassword;TrustServerCertificate=false;Encrypt=true"

SQL Authentication:

Server=localhost;Database=master;User Id=sa;Password=YourPassword;TrustServerCertificate=false;Encrypt=true

Windows Authentication:

Server=localhost;Database=master;Integrated Security=true;TrustServerCertificate=false;Encrypt=true

Note: Only use TrustServerCertificate=true in development environments with self-signed certificates. For production, always use TrustServerCertificate=false with a valid SSL certificate.

Azure SQL:

Server=yourserver.database.windows.net;Database=yourdb;User Id=user;Password=password;Encrypt=true

MCP Tools Reference

Session Lifecycle

ToolDescription
sqlsentinel_create_sessionCreate an Extended Events session with filters (not started)
sqlsentinel_start_sessionStart capturing events for an existing session
sqlsentinel_stop_sessionStop capturing; events are retained
sqlsentinel_drop_sessionDrop session and discard all events
sqlsentinel_list_sessionsList all MCP-created sessions with state and buffer usage
sqlsentinel_quick_captureCreate and start a session in one step

Event Retrieval

ToolDescription
sqlsentinel_get_eventsRetrieve captured events with filtering, sorting, and deduplication
sqlsentinel_get_statsAggregate statistics grouped by fingerprint, database, app, or login
sqlsentinel_analyze_sequenceAnalyze query execution sequence with timing and gaps
sqlsentinel_get_connection_infoList databases, applications, logins, sessions, and blocking info
sqlsentinel_stream_eventsReal-time event capture for a specified duration (1–300s)

Diagnostics

ToolDescription
sqlsentinel_get_deadlocksRetrieve deadlock events with victim, processes, locks, and SQL text
sqlsentinel_get_blockingRetrieve blocked process events with wait resources and SQL text
sqlsentinel_get_wait_statsQuery sys.dm_os_wait_stats categorized by type (no session required)
sqlsentinel_health_checkComprehensive report: slow queries, deadlocks, blocking, wait stats, insights

Permissions

ToolDescription
sqlsentinel_check_permissionsCheck current login permissions and blocked process threshold config
sqlsentinel_grant_permissionsGrant required permissions to a login (requires sysadmin)

Database Operations

ToolDescription
sqlsentinel_list_tablesList all user tables in the database (schema-qualified)
sqlsentinel_describe_tableDetailed table schema: columns, indexes, constraints, foreign keys
sqlsentinel_create_tableCreate a new table via CREATE TABLE statement
sqlsentinel_insert_dataInsert data via INSERT statement
sqlsentinel_read_dataExecute SELECT queries and return results
sqlsentinel_update_dataUpdate data via UPDATE statement
sqlsentinel_drop_tableDrop a table via DROP TABLE statement

Usage Examples

Quick Debug Session

Agent: sqlsentinel_quick_capture(
    sessionName: "debug_api",
    applications: "MyWebApp",
    minDurationMs: 100
)

// User triggers the slow operation

Agent: sqlsentinel_get_events(
    sessionName: "debug_api",
    sortBy: "DurationDesc",
    limit: 20
)

Agent: sqlsentinel_drop_session(sessionName: "debug_api")

Find N+1 Queries

Agent: sqlsentinel_quick_capture(
    sessionName: "n_plus_one_check",
    databases: "OrdersDB"
)

// User loads a page

Agent: sqlsentinel_get_stats(
    sessionName: "n_plus_one_check",
    groupBy: "QueryFingerprint"
)

// Look for queries with high execution counts

Trace Specific Operation

Agent: sqlsentinel_analyze_sequence(
    sessionName: "my_session",
    correlationId: "order-12345",
    responseFormat: "Markdown"
)

Deadlock Detection

Agent: sqlsentinel_quick_capture(
    sessionName: "deadlock_monitor",
    eventTypes: "Deadlock"
)

// Wait for deadlocks to occur

Agent: sqlsentinel_get_deadlocks(
    sessionName: "deadlock_monitor",
    responseFormat: "Markdown"
)

Blocking Analysis

Agent: sqlsentinel_quick_capture(
    sessionName: "blocking_check",
    eventTypes: "BlockedProcess"
)

// Requires: sp_configure 'blocked process threshold', 5

Agent: sqlsentinel_get_blocking(
    sessionName: "blocking_check",
    responseFormat: "Markdown"
)

Server Health Check

Agent: sqlsentinel_health_check(
    sessionName: "my_session",
    slowQueryThresholdMs: 1000,
    responseFormat: "Markdown"
)

Database Operations

Agent: sqlsentinel_list_tables()

Agent: sqlsentinel_describe_table(
    name: "dbo.Products"
)

Agent: sqlsentinel_read_data(
    sql: "SELECT TOP 10 * FROM dbo.Products ORDER BY CreatedDate DESC"
)

Wait Stats (No Session Required)

Agent: sqlsentinel_get_wait_stats(
    topN: 20,
    responseFormat: "Markdown"
)

Query Fingerprinting

Queries are normalized to group similar ones:

-- These become one fingerprint:
SELECT * FROM Users WHERE id = 123
SELECT * FROM Users WHERE id = 456

-- Fingerprint: abc123:SELECT * FROM Users WHERE id = ?
-- Execution count: 2

Noise Filtering

Default excluded patterns (when excludeNoise=true):

  • sp_reset_connection — Connection pool reset
  • SET TRANSACTION ISOLATION LEVEL — Session setup
  • SET NOCOUNT, SET ANSI_* — Client configuration
  • sp_trace_*, fn_trace_* — Trace system queries

Supported Event Types

SqlBatchCompleted, RpcCompleted, SqlStatementCompleted, SpStatementCompleted, Attention, ErrorReported, Deadlock, BlockedProcess, LoginEvent, SchemaChange, Recompile, AutoStats

Project Structure

sql-profiler-mcp/
├── .github/
│   └── workflows/
│       ├── docker.yml                     # Build & push multi-arch Docker images
│       └── publish-mcp-registry.yml       # Publish NuGet + MCP registry
├── .mcp/
│   └── server.json                        # MCP manifest (NuGet + OCI packages)
├── SqlServer.Profiler.Mcp/                # Main MCP server (stdio transport)
│   ├── SqlServer.Profiler.Mcp.csproj
│   ├── Program.cs                         # Entry point, DI setup, MCP config
│   ├── Models/
│   │   ├── ProfilerModels.cs              # Records, enums, data models
│   │   └── DbOperationResult.cs           # Result model for CRUD operations
│   ├── Services/
│   │   ├── ProfilerService.cs             # Core Extended Events logic
│   │   ├── QueryFingerprintService.cs     # SQL normalization & fingerprinting
│   │   ├── WaitStatsService.cs            # DMV-based wait stats analysis
│   │   ├── SessionConfigStore.cs          # In-memory session config storage
│   │   └── EventStreamingService.cs       # Real-time event streaming
│   ├── Utilities/
│   │   └── SqlInputValidator.cs           # SQL input validation & escaping
│   └── Tools/
│       ├── SessionManagementTools.cs      # Session lifecycle tools (6)
│       ├── EventRetrievalTools.cs         # Event retrieval tools (5)
│       ├── DiagnosticTools.cs             # Diagnostic tools (4)
│       ├── PermissionTools.cs             # Permission tools (2)
│       └── DatabaseTools.cs               # Database CRUD tools (7)
├── SqlServer.Profiler.Mcp.Api/            # Debug REST API (Swagger on port 5100)
│   ├── SqlServer.Profiler.Mcp.Api.csproj
│   ├── Program.cs
│   ├── Controllers/
│   │   └── ProfilerController.cs
│   ├── Models/
│   │   └── RequestModels.cs
│   └── appsettings.json
├── SqlServer.Profiler.Mcp.Cli/            # Debug CLI (REPL + script mode)
│   ├── SqlServer.Profiler.Mcp.Cli.csproj
│   └── Program.cs
├── SqlServer.Profiler.Mcp.Tests/          # xUnit tests for core MCP library (228 tests)
│   └── ...
├── SqlServer.Profiler.Mcp.Api.Tests/      # xUnit tests for API project (29 tests)
│   └── ...
├── Dockerfile                             # Multi-stage build (bookworm-slim)
├── .dockerignore
├── SqlServer.Profiler.Mcp.slnx           # Solution file
├── CLAUDE.md
├── CONTRIBUTING.md
└── README.md

Development

Prerequisites

  • .NET 9 SDK
  • SQL Server 2012+ instance (local, Docker, or remote)
  • Docker (optional, for container builds)

Clone & Build

git clone https://github.com/tkmawarire/sql-sentinel.git
cd sql-sentinel
dotnet restore
dotnet build

Running the MCP Server Locally

dotnet run --project SqlServer.Profiler.Mcp/

The server communicates over stdio using the MCP protocol. Connect it to an MCP client (Claude Desktop, Claude Code, etc.) for interactive use.

Using the Debug API

The API project provides a REST wrapper around all MCP tools with Swagger UI for manual testing.

dotnet run --project SqlServer.Profiler.Mcp.Api/
  • Swagger UI: http://localhost:5100/
  • Configure the connection string via environment variable SQL_SENTINEL_CONNECTION_STRING

Using the Debug CLI

The CLI project provides an interactive REPL and script mode for testing tools directly.

# Interactive REPL mode
dotnet run --project SqlServer.Profiler.Mcp.Cli/

# List all available tools
dotnet run --project SqlServer.Profiler.Mcp.Cli/ list

# Get help for a specific tool
dotnet run --project SqlServer.Profiler.Mcp.Cli/ help sqlsentinel_quick_capture

# Execute a single tool
dotnet run --project SqlServer.Profiler.Mcp.Cli/ call sqlsentinel_list_sessions

Set the SQL_SENTINEL_CONNECTION_STRING environment variable before running.

Docker Build

docker build -t sql-sentinel-mcp:test .
docker run -i --rm --network host sql-sentinel-mcp:test

Architecture

Key Patterns

  • Dependency injection via Microsoft.Extensions.Hosting
  • stdio transport — stdout is reserved for MCP protocol; all logging goes to stderr
  • Tool auto-discovery — MCP tools are discovered from the assembly via WithToolsFromAssembly()
  • XE session prefix — All created sessions are prefixed with mcp_sentinel_
  • Two event shapes — Standard events (query, login, recompile) with typed fields, and XML-payload events (deadlock, blocking) parsed from Extended Events XML

Adding a New MCP Tool

  1. Create a public static method in the appropriate file under Tools/ (or create a new file)
  2. Decorate with [McpServerTool(Name = "sqlsentinel_your_tool")] and [Description("...")]
  3. Add parameters with [Description("...")] attributes — they become the tool's input schema
  4. Inject services via method parameters (e.g., IProfilerService, IWaitStatsService)
  5. Return a string (JSON or Markdown) — the framework handles MCP response wrapping
[McpServerTool(Name = "sqlsentinel_example")]
[Description("Description shown to AI agents")]
public static async Task<string> Example(
    IProfilerService profilerService,
    [Description("Optional filter")] string? filter = null)
{
    var connectionString = ConnectionStringResolver.Resolve();
    // Implementation
    return JsonSerializer.Serialize(result);
}

Troubleshooting

"Permission denied" creating session

GRANT ALTER ANY EVENT SESSION TO [your_login];
GRANT VIEW SERVER STATE TO [your_login];

"Login failed"

  • Check connection string credentials
  • For Windows auth, ensure process runs under correct user
  • For Azure SQL, ensure firewall allows your IP

No events captured

  1. Verify session is RUNNING (sqlsentinel_list_sessions)
  2. Check filters aren't too restrictive
  3. Verify target database/app is generating queries
  4. Check minDurationMs isn't filtering everything

No deadlock events

  • Ensure session was created with eventTypes: "Deadlock"
  • Deadlocks must actually occur while the session is running

No blocking events

  • Ensure blocked process threshold is configured: sp_configure 'blocked process threshold', 5
  • Ensure session was created with eventTypes: "BlockedProcess"
  • Blocking must exceed the configured threshold (seconds)

Timeout reading events

Large ring buffers with many events can be slow to parse. Use:

  • Time filters to narrow the window
  • Increase command timeout in code if needed

Security Notes

  • The SQL_SENTINEL_CONNECTION_STRING environment variable contains credentials — secure appropriately
  • Don't leave sessions running indefinitely on production
  • Query text may contain sensitive data
  • Grant minimum required permissions

Contributing

See CONTRIBUTING.md for guidelines on submitting issues and pull requests.

License

MIT

Reviews

No reviews yet

Sign in to write a review