20 tools from the Elasticsearch MCP Server, categorised by risk level.
View the Elasticsearch policy →analyze_text Analyse text using a specified analyser 2/5 get_alias Get alias info for a specific index 2/5 get_cluster_health Get cluster health status 2/5 get_cluster_stats Get high-level cluster statistics 2/5 get_data_stream Get info about data streams 2/5 get_document Get a document by ID 2/5 get_index Get index mappings, settings, and aliases 2/5 list_aliases List all index aliases 2/5 list_indices List all Elasticsearch indices 2/5 search_documents Search for documents in an index 2/5 The Elasticsearch MCP server exposes 20 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Elasticsearch server.
Elasticsearch tools are categorised as Read (10), Write (4), Destructive (5), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept