Setup guide
This guide walks you through connecting every provider. You don't need all 13 — start with the two or three you care about most, and add more later.
What you'll need before starting
python3 --versionInstallation
Install the package and run the setup wizard. The wizard walks you through each provider interactively.
Install from PyPI
pip install finops-mcp[pdf,snowflake,keyring]
Run the setup wizard
# Interactive — walks through each provider, skip any you don't need
Verify everything is configured
✓ aws configured
✓ datadog configured
– azure not configured
AI client setup
Add the MCP server to your AI client's config. You only need to do this once.
Claude Desktop
Edit ~/Library/Application Support/Claude/claude_desktop_config.json
"mcpServers": {
"finops": {
"command": "finops-mcp"
}
}
}
Cursor
Settings → MCP → Add server, or edit ~/.cursor/mcp.json
"mcpServers": {
"finops": { "command": "finops-mcp" }
}
}
Windsurf
Edit ~/.codeium/windsurf/mcp_config.json
"mcpServers": {
"finops": { "command": "finops-mcp" }
}
}
OpenAI Codex / other MCP clients
Run the server manually and point your client at the stdio transport.
Cloud Providers
AWS
Connects to Cost Explorer for spend data, and CloudWatch for rightsizing metrics. Supports IAM keys, IAM Identity Center SSO, and cross-account role assumption.
Required IAM permissions
ce:GetSavingsPlansUtilization
ce:GetSavingsPlansCoverage
ce:GetReservationUtilization
ce:GetReservationCoverage
sts:GetCallerIdentity
cloudwatch:GetMetricStatistics # rightsizing only
ec2:DescribeInstances # rightsizing only
Attach the AWS managed policy ReadOnlyAccess as a quick alternative — it covers all of the above.
Create an IAM user with the permissions above, or use an existing SSO role.
Enter your Access Key ID and Secret Access Key when prompted. For SSO, enter your profile name.
Manual env vars (alternative to wizard)
AWS_SECRET_ACCESS_KEY=your-secret
AWS_DEFAULT_REGION=us-east-1 # CE requires us-east-1
Azure
Connects to Azure Cost Management API. Supports Service Principal (recommended for automation) and device code flow (interactive login).
Required Azure role
Create a Service Principal: az ad sp create-for-rbac --name finops-mcp --role "Cost Management Reader" --scopes /subscriptions/YOUR_SUB_ID
Enter Tenant ID, Client ID, Client Secret, and Subscription ID when prompted.
Manual env vars
AZURE_CLIENT_ID=your-client-id
AZURE_CLIENT_SECRET=your-client-secret
AZURE_SUBSCRIPTION_ID=your-subscription-id
GCP
Primary path: BigQuery billing export (recommended — richer data). Fallback: Cloud Billing API. Both use a service account JSON key stored encrypted in your vault.
Required IAM roles
Create a service account in GCP Console → IAM → Service Accounts. Assign roles above. Download the JSON key file.
(Recommended) Enable billing export to BigQuery: Billing → Billing export → BigQuery export.
Paste the path to your JSON key file and your GCP Project ID when prompted.
Manual env vars
GCP_PROJECT_ID=my-project-123
GCP_BIGQUERY_DATASET=billing_export # if using BQ export
SaaS Tools
Datadog
Real cost data via the Usage Metering API v2. Returns host counts, APM hosts, log ingestion, and dollar amounts where available. Supports EU site.
Go to Organization Settings → API Keys → New Key. Name it finops-mcp.
Go to Organization Settings → Application Keys → New Key.
DD_APP_KEY=your-app-key
DD_SITE=datadoghq.com # or datadoghq.eu
Snowflake
Queries ACCOUNT_USAGE.METERING_HISTORY for real credit consumption. Set your contract credit price to convert to USD.
Required privilege
Create a read-only role and user: GRANT IMPORTED PRIVILEGES ON DATABASE SNOWFLAKE TO ROLE finops_role;
SNOWFLAKE_USER=finops_user
SNOWFLAKE_PASSWORD=your-password
SNOWFLAKE_WAREHOUSE=COMPUTE_WH
SNOWFLAKE_CREDIT_PRICE=3.00 # your contract rate per credit
GitHub
Returns paid Actions minutes used and Copilot seat counts. Requires org-level access.
Go to Settings → Developer settings → Personal access tokens → Fine-grained tokens. Select your org. Set permissions: read:billing, read:org.
GITHUB_ORG=your-org-name
Stripe
Returns actual fees paid to Stripe via the Balance Transactions API. Use a restricted key — no write permissions needed.
Go to Stripe Dashboard → Developers → API Keys → Create restricted key. Enable: Balance → Read only.
Twilio
Paginated usage records with real billing amounts. Uses your main Account SID and Auth Token.
Find your Account SID and Auth Token on the Twilio Console homepage.
TWILIO_AUTH_TOKEN=your-auth-token
MongoDB Atlas
Invoice API with line-item breakdown. Uses Digest Auth with an org-level API key.
Go to Atlas → Access Manager → Organization Access → API Keys → Create API Key. Role: Organization Billing Viewer.
MONGODB_ATLAS_PRIVATE_KEY=your-private-key
MONGODB_ATLAS_ORG_ID=your-org-id
Cloudflare
Billing history and active subscriptions via the Cloudflare API.
Go to Cloudflare Dashboard → My Profile → API Tokens → Create Token. Use the "Read billing info" template.
CLOUDFLARE_ACCOUNT_ID=your-account-id
Vercel
Invoice API — requires a Vercel Enterprise plan. Returns invoices with line items. Returns a descriptive message if no invoice data is available.
Go to Vercel Dashboard → Settings → Tokens → Create. Scope: Full Account.
VERCEL_TEAM_ID=team_xxxxxxx # optional, for team accounts
PagerDuty
Returns seat count and user data. For actual dollar amounts, use the Invoice email parser — PagerDuty doesn't expose billing amounts via API.
Go to My Profile → User Settings → Create API User Token. Read-only access is sufficient.
New Relic
Returns data ingest (GB) and full platform user counts. Set your contract ingest price to convert to USD.
Go to New Relic → API Keys → Create key. Type: User key.
NEW_RELIC_ACCOUNT_ID=1234567
NEW_RELIC_INGEST_PRICE_PER_GB=0.35 # your contract rate
📧 Invoice email parsing
For vendors with no billing API (PagerDuty, New Relic, GitHub Enterprise, etc.), nable can connect to your billing inbox via IMAP, parse PDF and HTML invoices, and extract real dollar amounts automatically.
Enable IMAP access on your mailbox (Gmail: Settings → See all settings → Forwarding and POP/IMAP).
If using Gmail, create an App Password (requires 2FA): Google Account → Security → App passwords.
FINOPS_IMAP_PORT=993
FINOPS_IMAP_USER=billing@yourcompany.com
FINOPS_IMAP_PASSWORD=your-app-password
Alerts & Automation
Slack alerts
Sends anomaly alerts and daily digests to a Slack channel. Uses an incoming webhook — no bot scopes needed.
Go to api.slack.com/apps → Create app → Incoming Webhooks → Add webhook to workspace. Select your #finops channel.
Copy the webhook URL and add to your env:
Microsoft Teams alerts
Sends anomaly alerts and daily digests via an Incoming Webhook connector.
In Teams, go to your channel → ⋯ → Connectors → Incoming Webhook → Configure. Copy the webhook URL.
Weekly email digest
Sends a standalone HTML email every Monday at 09:00 UTC with last week's spend, anomalies, and rightsizing recommendations. No AI client session required — fires from the scheduler.
FINOPS_SMTP_PORT=587
FINOPS_SMTP_USER=you@yourcompany.com
FINOPS_SMTP_PASSWORD=your-app-password
FINOPS_DIGEST_TO=team@yourcompany.com
FINOPS_WEEKLY_CRON="0 9 * * 1" # optional — default Mon 09:00 UTC
Auto-ticketing
When a high or medium-severity anomaly is detected, nable automatically creates a ticket in your tracker. Configure one or more — the first configured is used by default.
Jira
Create an API token at id.atlassian.com → Security → API tokens.
JIRA_EMAIL=you@yourcompany.com
JIRA_API_TOKEN=your-api-token
JIRA_PROJECT_KEY=FINOPS
Linear
Create an API key at Linear → Settings → API → Personal API keys.
LINEAR_TEAM_ID=your-team-id
GitHub Issues
Needs a fine-grained token with issues: write on the target repo.
GITHUB_ISSUES_REPO=yourorg/finops-alerts
All environment variables
Full reference. The wizard sets these for you — use this table if you're deploying in CI/CD or Docker.
| Variable | Provider | Required |
|---|---|---|
| AWS_ACCESS_KEY_ID | AWS | Required |
| AWS_SECRET_ACCESS_KEY | AWS | Required |
| AWS_DEFAULT_REGION | AWS | Optional |
| AZURE_TENANT_ID | Azure | Required |
| AZURE_CLIENT_ID | Azure | Required |
| AZURE_CLIENT_SECRET | Azure | Required |
| AZURE_SUBSCRIPTION_ID | Azure | Required |
| GOOGLE_APPLICATION_CREDENTIALS | GCP | Required |
| GCP_PROJECT_ID | GCP | Required |
| GCP_BIGQUERY_DATASET | GCP | Optional |
| DD_API_KEY | Datadog | Required |
| DD_APP_KEY | Datadog | Required |
| DD_SITE | Datadog | Optional |
| SNOWFLAKE_ACCOUNT | Snowflake | Required |
| SNOWFLAKE_CREDIT_PRICE | Snowflake | Optional |
| GITHUB_TOKEN | GitHub | Required |
| STRIPE_API_KEY | Stripe | Required |
| SLACK_WEBHOOK_URL | Slack | Optional |
| TEAMS_WEBHOOK_URL | Teams | Optional |
| FINOPS_DIGEST_TO | Optional | |
| JIRA_URL | Jira | Optional |
| LINEAR_API_KEY | Linear | Optional |
| GITHUB_ISSUES_REPO | GitHub Issues | Optional |
Troubleshooting
"Cost Explorer must be enabled"
Go to AWS Console → Billing → Cost Explorer → Enable Cost Explorer. Takes up to 24 hours. This is required even if you have an active account.
MCP server not showing in Claude / Cursor
Fully quit and reopen the app after editing the config file — most clients only read config at startup. Run finops-mcp manually in terminal to confirm there are no Python errors.
Credentials not persisting after restart
Install the keyring extra: pip install finops-mcp[keyring]. Without it, credentials fall back to a local encrypted file. Re-run finops setup after installing.
Snowflake: "Object does not exist"
The user needs IMPORTED PRIVILEGES ON DATABASE SNOWFLAKE granted to their role. Run as ACCOUNTADMIN: GRANT IMPORTED PRIVILEGES ON DATABASE SNOWFLAKE TO ROLE your_role;