MCP Server Policy

PAGERDUTY MCP POLICY

Enforce policies on every tool call to the PagerDuty MCP Server. 62 tools listed, categorised, and ready for rules.

pagerduty-mcp 42 read 20 write 62 tools total
pagerduty incident-management on-call alerting

GET STARTED

Download this policy scaffold and add your rules. Intercept enforces them on every tool call before it reaches PagerDuty.

terminal

# Download policy scaffold

curl -o pagerduty.yaml https://raw.githubusercontent.com/policylayer/intercept/main/policies/pagerduty.yaml

# Run with Intercept

intercept --policy pagerduty.yaml -- npx -y @pagerduty-mcp

Server documentation: https://github.com/PagerDuty/pagerduty-mcp-server

READ TOOLS

42

get_log_entry

get_log_entry Retrieve a specific log entry

get_status_page_post

get_status_page_post Retrieve a specific status page post

list_status_page_post_updates

list_status_page_post_updates List updates for a status page post

WRITE TOOLS

19

DESTRUCTIVE TOOLS

3

POLICY YAML

This scaffold lists every tool with empty rules. Add conditions — rate limits, argument validation, deny rules — then deploy with Intercept.

pagerduty.yaml
version: "1"
description: "Policy for pagerduty-mcp"
default: "allow"
tools:
    get_alert_grouping_setting:
        rules: []
    list_alert_grouping_settings:
        rules: []
    get_change_event:
        rules: []
    list_change_events:
        rules: []
    list_incident_change_events:
        rules: []
    list_service_change_events:
        rules: []
    get_event_orchestration:
        rules: []
    get_event_orchestration_global:
        rules: []
    get_event_orchestration_router:
        rules: []
    get_event_orchestration_service:
        rules: []
    list_event_orchestrations:
        rules: []
    list_escalation_policies:
        rules: []
    get_escalation_policy:
        rules: []
    get_alert_from_incident:
        rules: []
    get_incident:
        rules: []
    get_outlier_incident:
        rules: []
    get_past_incidents:
        rules: []
    get_related_incidents:
        rules: []
    list_alerts_from_incident:
        rules: []
    list_incident_notes:
        rules: []
    list_incidents:
        rules: []
    get_incident_workflow:
        rules: []
    list_incident_workflows:
        rules: []
    get_log_entry:
        rules: []
    list_log_entries:
        rules: []
    get_team:
        rules: []
    list_team_members:
        rules: []
    list_teams:
        rules: []
    get_user_data:
        rules: []
    list_users:
        rules: []
    list_oncalls:
        rules: []
    get_schedule:
        rules: []
    list_schedule_users:
        rules: []
    list_schedules:
        rules: []
    get_service:
        rules: []
    list_services:
        rules: []
    get_status_page_post:
        rules: []
    list_status_page_impacts:
        rules: []
    list_status_page_post_updates:
        rules: []
    list_status_page_severities:
        rules: []
    list_status_page_statuses:
        rules: []
    list_status_pages:
        rules: []
    create_alert_grouping_setting:
        rules: []
    update_alert_grouping_setting:
        rules: []
    update_event_orchestration_router:
        rules: []
    append_event_orchestration_router_rule:
        rules: []
    add_note_to_incident:
        rules: []
    add_responders:
        rules: []
    create_incident:
        rules: []
    manage_incidents:
        rules: []
    start_incident_workflow:
        rules: []
    add_team_member:
        rules: []
    create_team:
        rules: []
    update_team:
        rules: []
    create_schedule_override:
        rules: []
    create_schedule:
        rules: []
    update_schedule:
        rules: []
    create_service:
        rules: []
    update_service:
        rules: []
    create_status_page_post:
        rules: []
    create_status_page_post_update:
        rules: []
    delete_alert_grouping_setting:
        rules: []
    delete_team:
        rules: []
    remove_team_member:
        rules: []

FREQUENTLY ASKED QUESTIONS

What tools does the PagerDuty MCP server expose?

The PagerDuty MCP Server exposes 62 tools across 3 categories: Read, Write, Destructive. Each tool can be individually controlled with Intercept policies.

How do I enforce policies on PagerDuty?

Download the policy scaffold, add rules (rate limits, argument validation, deny rules), then run Intercept as a proxy in front of the PagerDuty MCP server. Every tool call is evaluated against your YAML policy before execution.

Is the PagerDuty policy free to use?

Yes. All Intercept policies are open source under the Apache 2.0 licence. Download, modify, and deploy without restrictions.

ENFORCE POLICIES ON PAGERDUTY

Open source. One binary. Zero dependencies.