Tracecat

ClickHouse MCP server

Run SQL queries against your ClickHouse security data lake from your AI agents.

SIEM / datalake
stdio
Official docs

About

Connect Tracecat to ClickHouse to run SQL queries across your security data lake for SOC analysts and detection engineers pivoting from an alert to weeks of historical events. You can list databases and tables to find the right log source for an investigation. From there, run read-only SQL queries, use the embedded chDB engine for local analysis, and bring the results back into a Tracecat case with confidence.

Setup

  1. 1

    Create a service user

    The ClickHouse MCP server authenticates to your ClickHouse cluster with a host, port, username, and password (or TLS client certificate). For HTTP and SSE transports, a static bearer token or OAuth provider protects the MCP endpoint itself.

  2. 2

    Select the ClickHouse tile in the Tracecat MCP catalog

    Open the MCP catalog in your workspace, select the ClickHouse tile, and enter your username and password.

  3. 3

    Enable ClickHouse in your agent

    In your ai.agent action or Agents tools tab, select ClickHouse from the MCP integrations dropdown.

Tools

run_queryExecute a SQL query against ClickHouse. Runs in read-only mode by default.
list_databasesList all databases on the connected ClickHouse cluster.
list_tablesList tables in a database with pagination and filtering options.
run_chdb_select_queryRun a SELECT query using the embedded chDB engine for local analysis.

Deploy the ClickHouse MCP server in minutes

Connect your security agents to 50+ hosted MCP servers.

Self-host free