Simplifyd Cloud

MCP Server

Use the Simplifyd Cloud MCP Server to manage your infrastructure with natural language from any AI-powered IDE or assistant.

The Simplifyd Cloud MCP Server is a Model Context Protocol (MCP) server that enables natural language interaction with your Simplifyd Cloud workspaces, projects, services, and deployments.

With it, you can ask your AI assistant to deploy a service, manage environment variables, scale a container, check deployment logs, and much more — without leaving your editor.

The MCP server is open-source and lives in the mcp/ directory of the cloud monorepo.

Understanding MCP and the Simplifyd Cloud MCP Server

The Model Context Protocol (MCP) defines a standard for how AI applications (hosts) can interact with external tools and data sources through a client–server architecture.

  • Hosts: Applications such as Claude Code, Cursor, VS Code, or Claude Desktop that connect to MCP servers.
  • Clients: The layer within hosts that maintains one-to-one connections with individual MCP servers.
  • Servers: Standalone programs (like the Simplifyd Cloud MCP Server) that expose tools and workflows to AI assistants.

The Simplifyd Cloud MCP Server acts as the server in this architecture, translating natural language requests from your AI assistant into authenticated REST API calls against the Simplifyd Cloud API.

Prerequisites

  • Go 1.23+ to build the server binary, or a pre-built binary from the releases page
  • A Simplifyd Cloud account — sign up at cloud.simplifyd.com
  • A valid API token (or your account credentials to authenticate interactively)

Build

Clone the monorepo and build the binary:

git clone https://github.com/simplifyd-com/cloud
cd cloud/mcp
go build -o cloud-mcp .

Note the full path to the cloud-mcp binary — you will need it when configuring your MCP client below.

Installation

Run the following command to register the server with Claude Code:

claude mcp add simplifyd-cloud /path/to/cloud/mcp/cloud-mcp \
  -e SIMPLIFYD_API_TOKEN=<your-token>

Replace /path/to/cloud/mcp/cloud-mcp with the actual path to the binary you built.

To verify the server is running:

claude mcp list

Create or edit ~/.cursor/mcp.json:

{
  "mcpServers": {
    "simplifyd-cloud": {
      "command": "/path/to/cloud/mcp/cloud-mcp",
      "env": {
        "SIMPLIFYD_API_TOKEN": "<your-token>"
      }
    }
  }
}

Restart Cursor after saving the file.

Create or edit .vscode/mcp.json in your workspace (or the global user settings):

{
  "servers": {
    "simplifyd-cloud": {
      "type": "stdio",
      "command": "/path/to/cloud/mcp/cloud-mcp",
      "env": {
        "SIMPLIFYD_API_TOKEN": "<your-token>"
      }
    }
  }
}

Edit ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
  "mcpServers": {
    "simplifyd-cloud": {
      "command": "/path/to/cloud/mcp/cloud-mcp",
      "env": {
        "SIMPLIFYD_API_TOKEN": "<your-token>"
      }
    }
  }
}

Restart Claude Desktop after saving.

Obtaining a token

You can get your API token from any of these sources:

  • Login tool — omit SIMPLIFYD_API_TOKEN from the config and use the login MCP tool on first use. The server will save the token to ~/.simplifyd/config.json and reuse it automatically.
  • Dashboard — go to Project Settings → Tokens, create a token scoped to your environment, and copy it.
  • CLI — run edge token create --name "MCP" and copy the output.

Example usage

Once the server is connected, you can interact with your infrastructure in plain English. Below are some examples.

Deploy a Docker service:

"Create a service called api using the nginx:latest image in my production environment and deploy it."

Check deployment status:

"What's the status of the latest deployment for the api service?"

Tail deployment logs:

"Show me the logs for the last deployment of api in the staging environment."

Manage environment variables:

"Set DATABASE_URL and REDIS_URL on the api service in production."

Scale a service:

"Scale the api service to 3 replicas and give it 2 vCPUs."

Add a public URL:

"Add an HTTPS ingress on port 8080 for the api service."

Invite a team member:

"Add alice@example.com to my acme workspace."

Check billing:

"How much have I spent this month in the acme workspace?"

Available MCP tools

The server exposes 45 tools grouped by resource type.

Authentication

ToolDescription
loginLog in with your email and password. Saves the session token to ~/.simplifyd/config.json.
get-meReturn the profile of the currently authenticated user.

Workspaces

ToolDescription
list-workspacesList all workspaces accessible to the authenticated user.
get-workspaceGet details of a specific workspace including wallet balance and projects.
create-workspaceCreate a new workspace.
update-workspaceUpdate the display name of an existing workspace.
get-workspace-usageGet current-month billing usage (CPU, memory, data costs).
get-workspace-transactionsList billing transactions (credits and debits).
list-workspace-membersList all members of a workspace.
add-workspace-memberInvite a user by email address.
remove-workspace-memberRemove a member from a workspace.
fund-workspaceInitiate a wallet top-up via Paystack, Stripe, or bank transfer.

Projects

ToolDescription
list-projectsList all projects in a workspace.
get-projectGet details of a specific project.
create-projectCreate a new project inside a workspace.
update-projectRename an existing project.

Environments

ToolDescription
list-environmentsList all environments in a project.
get-environmentGet environment details including services and variables.
create-environmentCreate a new environment inside a project.
update-environmentRename an existing environment.
list-env-variablesList all shared environment variables.
create-env-variableCreate a new shared environment variable.
update-env-variableUpdate the value of an existing variable.
delete-env-variableDelete a shared environment variable.

Services

ToolDescription
get-serviceGet full service details: status, config, variables, ingress rules.
create-serviceCreate a Docker container or PostgreSQL database service.
update-serviceUpdate service name, vCPUs, memory, or replica count.
delete-serviceDelete a service and all its resources.
list-service-variablesList environment variables set on a service.
add-service-variableAdd a single environment variable to a service.
set-service-variablesBulk-set environment variables on a service.
delete-service-variableDelete a specific service environment variable.
add-service-ingressCreate an HTTP/gRPC ingress rule (public URL via Cloudflare DNS).
delete-service-ingressRemove an ingress rule by FQDN.
add-tcp-proxyExpose a service port externally via TCP proxy.
add-shared-variableLink a shared environment variable into a specific service.

Deployments

ToolDescription
list-deploymentsList all deployments for a service, most recent first.
get-deploymentGet deployment details: status, resource allocation, timestamps.
deploy-serviceDeploy a service, optionally specifying a new image or resource limits.
redeploy-serviceRedeploy the active deployment (useful after config or variable changes).
undeploy-serviceStop and remove the active deployment without deleting the service.
get-deployment-logsFetch logs for a specific deployment.

API Tokens

ToolDescription
list-tokensList all API tokens for a project.
create-tokenCreate a new project token scoped to a specific environment.
delete-tokenRevoke a project API token.

Security considerations

The MCP server uses your API token to make real changes to your infrastructure. Take the following precautions.

  • Review AI actions before they execute. Most MCP clients show you the tool call and its arguments before running. Read them carefully, especially for destructive operations like delete-service or undeploy-service.
  • Use scoped tokens. Create a dedicated token with access to only the environments the AI assistant needs. Avoid using your personal JWT from edge auth login.
  • Restrict to non-production environments when experimenting. Give the AI access to a staging or dev environment first until you are confident in its behaviour.
  • Do not share your ~/.simplifyd/config.json. It contains your authentication token in plain text.
  • Rotate tokens regularly. If you suspect a token has been compromised, revoke it immediately from the dashboard or with edge token delete <slug>.

Feature requests

The MCP server is open source. If a tool or workflow is missing, open an issue or pull request in the cloud monorepo.