16 tools from the Kibana MCP Server, categorised by risk level.
View the Kibana policy →analyze_deletion_impact Analyze the impact of deleting or modifying a saved object (what will be affected) analyze_object_dependencies Analyze dependency tree for a Kibana saved object (Dashboard, Visualization, etc.) check_dashboard_health Perform health check on a Dashboard to detect broken references, performance issues, etc. get_available_spaces Get all available Kibana spaces with current context get_kibana_api_detail Get details for a specific Kibana API endpoint get_status Get Kibana server status with multi-space support list_all_kibana_api_paths List all Kibana API endpoints as a resource list scan_all_dashboards_health Scan health status of all Dashboards in a space (returns summary report) search_kibana_api_paths Search Kibana API endpoints by keyword vl_get_saved_object Get a single Kibana saved object by type and ID. This is a universal tool that can retrieve any type of saved object (dashboard, visualization, ind... vl_search_saved_objects Search for Kibana saved objects using Elasticsearch query syntax. This is a universal tool that can search across all saved object types (dashboard... vl_bulk_update_saved_objects Update multiple Kibana saved objects in a single operation. Each object can be of different types and will be partially updated (only specified att... 2/5 vl_create_saved_object Create a new Kibana saved object (dashboard, visualization, index-pattern, search, config, lens, map, tag, canvas-workpad, canvas-element, etc.). T... 2/5 vl_update_saved_object Update a single Kibana saved object by type and ID. This performs a partial update - only the specified attributes will be changed, other attribute... 2/5 The Kibana MCP server exposes 16 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Kibana server.
Kibana tools are categorised as Read (11), Write (3), Destructive (1), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept