Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready Elastic Cloud MCP server with 50 extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across Elastic Cloud — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your Elastic Cloud MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every Elastic Cloud tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every Elastic Cloud call.
Tools Discovery →A Elastic Cloud MCP server lets AI agents read and write Elastic Cloud data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's Elastic Cloud MCP server ships with 50 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Cursor, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from Elastic Cloud's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Get the current account information.
Update the current account trust settings.
Create a new Elastic Cloud deployment.
Get a list of all deployments in the Elastic Cloud organization.
Get detailed information about a specific deployment.
Search for deployments using Elasticsearch-style queries.
Update an existing Elastic Cloud deployment.
Get the tags associated with a deployment.
Set tags on a deployment (replaces all existing tags).
Create a new custom extension (plugin or bundle).
Get a list of all custom extensions (plugins and bundles).
Get details of a specific extension.
Update an extension's metadata.
Delete a custom extension.
Get the keystore items for an Elasticsearch resource.
Add or remove items from the Elasticsearch keystore.
Get a list of all organizations the current user belongs to.
Get details of a specific organization.
Get a list of all members in an organization.
Remove one or more members from an organization.
Send invitations to join an organization.
Get a list of pending invitations for an organization.
Get the certificate-based remote clusters configured for an Elasticsearch resource.
Configure certificate-based remote clusters for an Elasticsearch resource.
Add role assignments to a user.
Remove role assignments from a user.
Create a new traffic filter ruleset.
Get a list of all traffic filter rulesets.
Get details of a specific traffic filter ruleset.
Update an existing traffic filter ruleset.
Delete a traffic filter ruleset.
Link a traffic filter ruleset to a deployment.
Unlink a traffic filter ruleset from a deployment.
Link a snapshot repository from a source deployment.
Get a list of available deployment templates for a specific region.
Get information about an Elasticsearch resource within a deployment.
Get information about a Kibana resource within a deployment.
Get the upgrade readiness status for a deployment.
Get the trusted environments for the organization.
Get the snapshot repositories attached to an Elasticsearch resource.
Get a list of available Elastic Stack versions.
Get the deployments associated with a traffic filter ruleset.
Get the traffic filter rulesets associated with a specific deployment.
Remove a snapshot repository from an Elasticsearch resource.
Shut down an Elastic Cloud deployment and all its resources.
Restore a previously shut down Elastic Cloud deployment.
Start all instances of a deployment resource.
Stop all instances of a deployment resource.
Cancel the pending plan for a deployment resource.
Restart the Elasticsearch resource within a deployment.
One endpoint. Any framework. Your agent is talking to Elastic Cloud in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.