/mcp prefix and provide read-only access to webhook server data.
MCP endpoints are functionally equivalent to standard log viewer endpoints but optimized for AI agent access with automatic discovery and structured metadata.
Base URL
All MCP endpoints use the following base URL:Security Considerations
Data Exposure
MCP endpoints expose:- GitHub webhook payloads and processing logs
- Personal access tokens (if not masked)
- User information and repository details
- System performance and error data
Available Endpoints
Health Check
Endpoint:GET /mcp/webhook_server/healthcheck
Description: Server health status check for monitoring and uptime verification.
Use Case: AI agents can verify server availability before querying logs.
Parameters: None
Response:
Get Log Entries
Endpoint:GET /mcp/logs/api/entries
Description: Retrieve and filter webhook processing logs with advanced pagination and search capabilities.
Use Case: AI agents query historical logs for debugging, analysis, and reporting.
Query Parameters:
| Parameter | Type | Required | Description | Example |
|---|---|---|---|---|
hook_id | string | No | GitHub webhook delivery ID | f4b3c2d1-a9b8-4c5d-9e8f-1a2b3c4d5e6f |
pr_number | integer | No | Pull request number | 42 |
repository | string | No | Repository name (owner/repo) | myakove/github-webhook-server |
event_type | string | No | GitHub webhook event type | pull_request, push, issues |
github_user | string | No | GitHub username | myakove |
level | string | No | Log level filter | DEBUG, INFO, WARNING, ERROR |
start_time | string | No | Start time (ISO 8601) | 2024-01-15T10:00:00Z |
end_time | string | No | End time (ISO 8601) | 2024-01-15T18:00:00Z |
search | string | No | Text search (case-insensitive) | rate limit |
limit | integer | No | Max entries (1-10000) | 100 (default) |
offset | integer | No | Pagination offset | 0 (default) |
Recent Errors
Recent Errors
PR Workflow Analysis
PR Workflow Analysis
User Activity Audit
User Activity Audit
Webhook Delivery Debugging
Webhook Delivery Debugging
Export Logs
Endpoint:GET /mcp/logs/api/export
Description: Export filtered webhook logs to downloadable JSON files for offline analysis.
Use Case: AI agents can export large datasets for batch processing, compliance reporting, or long-term archival.
Query Parameters:
Same as /mcp/logs/api/entries plus:
| Parameter | Type | Required | Description | Default |
|---|---|---|---|---|
format_type | string | No | Export format (currently json only) | json |
limit | integer | No | Max entries to export (1-100000) | 10000 |
Content-Type: application/jsonContent-Disposition: attachment; filename="logs_export_YYYY-MM-DD_HH-MM-SS.json"Transfer-Encoding: chunked
- Large exports (>10000 entries) may take several minutes
- Memory usage optimized through streaming
- Use specific filters to reduce export size
Get PR Flow Data
Endpoint:GET /mcp/logs/api/pr-flow/{identifier}
Description: Get PR workflow visualization data for process analysis and debugging.
Use Case: AI agents analyze PR processing workflows, identify bottlenecks, and track lifecycle stages.
Path Parameters:
| Parameter | Type | Required | Description | Example |
|---|---|---|---|---|
identifier | string | Yes | Hook ID or PR number | f4b3c2d1-a9b8-4c5d or 123 |
Get Workflow Steps
Endpoint:GET /mcp/logs/api/workflow-steps/{identifier}
Description: Retrieve detailed timeline and execution data for individual workflow steps.
Use Case: AI agents perform granular analysis of step-by-step execution, timing, and failures.
Path Parameters:
| Parameter | Type | Required | Description | Example |
|---|---|---|---|---|
identifier | string | Yes | Hook ID | f4b3c2d1-a9b8-4c5d-9e8f-1a2b3c4d5e6f |
security- Authentication, signature validationdata_processing- Payload parsing, validationapi_call- GitHub API requests, external service callsanalysis- PR analysis, file processingbuild_system- Container builds, compilationnotification- Slack, email notificationsstorage- Database operations, file I/Ointegration- External system integration
pending- Queued but not startedin_progress- Currently executingcompleted- Finished successfullyfailed- Encountered an errorskipped- Bypassed due to conditionstimeout- Exceeded maximum execution timeretrying- Being retried after failure
Comparison with Standard Endpoints
MCP endpoints are mounted under/mcp prefix but functionally equivalent to standard endpoints:
| Standard Endpoint | MCP Endpoint | Difference |
|---|---|---|
/logs/api/entries | /mcp/logs/api/entries | AI-optimized metadata |
/logs/api/export | /mcp/logs/api/export | Same functionality |
/logs/api/pr-flow/{id} | /mcp/logs/api/pr-flow/{id} | Same functionality |
| N/A | /mcp/logs/api/workflow-steps/{id} | MCP-specific |
/webhook_server/healthcheck | /mcp/webhook_server/healthcheck | Same functionality |
- Automatic Discovery: MCP endpoints support automatic discovery by AI agents
- Metadata: MCP responses include additional metadata for AI processing
- No Web UI: MCP endpoints return only JSON (no HTML pages)
- No Static Files: CSS/JavaScript assets not served via MCP
- Security Isolation: Webhook processing endpoint NOT exposed via MCP
Error Responses
All MCP endpoints return standard HTTP error codes:400 Bad Request
- Invalid query parameter format
- Missing required path parameter
- Invalid limit value (exceeds maximum)
404 Not Found
- Hook ID not found in logs
- PR number doesn’t exist
- Workflow data incomplete or corrupted
500 Internal Server Error
- Log file permissions issues
- Disk I/O errors
- Memory exhaustion
- Log parsing errors
503 Service Unavailable
- Server still starting up
- MCP server disabled (
ENABLE_MCP_SERVER=false) - Session manager initialization failure
Rate Limiting
MCP endpoints have no built-in rate limiting. Implement rate limiting at the reverse proxy or firewall level: nginx rate limiting:Performance Optimization
Query Optimization
Fast queries (use specific identifiers):hook_id- Direct lookuppr_number+repository- Indexed search
searchwithout other filters - Text search across all logs- Wide time ranges without filters - Large dataset processing
Pagination Best Practices
Memory Efficiency
- Streaming architecture handles large datasets efficiently
- Use
limitparameter to control memory usage - Export endpoint streams data (no memory spikes)
Security Best Practices
Network Isolation
Deploy MCP endpoints only on trusted networks (VPN, internal network)
Reverse Proxy
Use authenticated reverse proxy for any external access
Firewall Rules
Restrict access to authorized IP ranges only
Monitoring
Monitor and audit all MCP endpoint access
Next Steps
MCP Overview
Learn about MCP integration features and setup
Log Viewer Security
Comprehensive security measures for MCP endpoints
Log Viewer
Web-based log viewer features and usage
Configuration
Server configuration and environment variables