GitHub - redis/mcp-redis: The official Redis MCP Server is a natural language interface designed for agentic applications to manage and search data in Redis efficiently (original) (raw)

Redis MCP Server

Integration PyPI - Version Python Version MIT licensed Verified on MseeP Docker Image Version codecov

Discord Twitch YouTube Twitter Stack Exchange questions

Overview

The Redis MCP Server is a natural language interface designed for agentic applications to efficiently manage and search data in Redis. It integrates seamlessly with MCP (Model Content Protocol) clients, enabling AI-driven workflows to interact with structured and unstructured data in Redis. Using this MCP Server, you can ask questions like:

Table of Contents

Features

Tools

This MCP Server provides tools to manage the data stored in Redis.

Additional tools.

Installation

The Redis MCP Server is available as a PyPI package and as direct installation from the GitHub repository.

Configuring the latest Redis MCP Server version from PyPI, as an example, can be done importing the following JSON configuration in the desired framework or tool. The uvx command will download the server on the fly (if not cached already), create a temporary environment, and then run it.

{
  "mcpServers": {
    "RedisMCPServer": {
      "command": "uvx",
      "args": [
        "--from",
        "redis-mcp-server@latest",
        "redis-mcp-server",
        "--url",
        "\"redis://localhost:6379/0\""
      ]
    }
  }
}

URL specification

The format to specify the --url argument follows the redis and rediss schemes:

redis://user:secret@localhost:6379/0?foo=bar&qux=baz

As an example, you can easily connect to a localhost server with:

Where 0 is the logical database you'd like to connect to.

For an encrypted connection to the database (e.g., connecting to a Redis Cloud database), you'd use the rediss scheme.

rediss://user:secret@localhost:6379/0?foo=bar&qux=baz

To verify the server's identity, specify ssl_ca_certs.

rediss://user:secret@hostname:port?ssl_cert_reqs=required&ssl_ca_certs=path_to_the_certificate

For an unverified connection, set ssl_cert_reqs to none

rediss://user:secret@hostname:port?ssl_cert_reqs=none

Configure your connection using the available options in the section "Available CLI Options".

Testing the PyPI package

You can install the package as follows:

pip install redis-mcp-server

And start it using uv the package in your environment.

uv python install 3.14 uv sync uv run redis-mcp-server --url redis://localhost:6379/0

However, starting the MCP Server is most useful when delegate to the framework or tool where this MCP Server is configured.

From GitHub

You can configure the desired Redis MCP Server version with uvx, which allows you to run it directly from GitHub (from a branch, or use a tagged release).

It is recommended to use a tagged release, the main branch is under active development and may contain breaking changes.

As an example, you can execute the following command to run the 0.2.0 release:

uvx --from git+https://github.com/redis/mcp-redis.git@0.2.0 redis-mcp-server --url redis://localhost:6379/0

Check the release notes for the latest version in the Releases section. Additional examples are provided below.

Run with Redis URI

uvx --from git+https://github.com/redis/mcp-redis.git redis-mcp-server --url redis://localhost:6379/0

Run with Redis URI and SSL

uvx --from git+https://github.com/redis/mcp-redis.git redis-mcp-server --url "rediss://:@:?ssl_cert_reqs=required&ssl_ca_certs="

Run with individual parameters

uvx --from git+https://github.com/redis/mcp-redis.git redis-mcp-server --host localhost --port 6379 --password mypassword

See all options

uvx --from git+https://github.com/redis/mcp-redis.git redis-mcp-server --help

Development Installation

For development or if you prefer to clone the repository:

Clone the repository

git clone https://github.com/redis/mcp-redis.git cd mcp-redis

Install dependencies using uv

uv venv source .venv/bin/activate uv sync

Run with CLI interface

uv run redis-mcp-server --help

Or run the main file directly (uses environment variables)

uv run src/main.py

Once you cloned the repository, installed the dependencies and verified you can run the server, you can configure Claude Desktop or any other MCP Client to use this MCP Server running the main file directly (it uses environment variables). This is usually preferred for development. The following example is for Claude Desktop, but the same applies to any other MCP Client.

  1. Specify your Redis credentials and TLS configuration
  2. Retrieve your uv command full path (e.g. which uv)
  3. Edit the claude_desktop_config.json configuration file
    • on a MacOS, at ~/Library/Application\ Support/Claude/

{ "mcpServers": { "redis": { "command": "", "args": [ "--directory", "", "run", "src/main.py" ], "env": { "REDIS_HOST": "", "REDIS_PORT": "", "REDIS_PWD": "", "REDIS_SSL": True|False, "REDIS_SSL_CA_PATH": "", "REDIS_CLUSTER_MODE": True|False } } } }

You can troubleshoot problems by tailing the log file.

tail -f ~/Library/Logs/Claude/mcp-server-redis.log

With Docker

You can use a dockerized deployment of this server. You can either build your own image or use the official Redis MCP Docker image.

If you'd like to build your own image, the Redis MCP Server provides a Dockerfile. Build this server's image with:

docker build -t mcp-redis .

Finally, configure the client to create the container at start-up. An example for Claude Desktop is provided below. Edit the claude_desktop_config.json and add:

{ "mcpServers": { "redis": { "command": "docker", "args": ["run", "--rm", "--name", "redis-mcp-server", "-i", "-e", "REDIS_HOST=", "-e", "REDIS_PORT=", "-e", "REDIS_USERNAME=", "-e", "REDIS_PWD=", "mcp-redis"] } } }

To use the official Redis MCP Docker image, just replace your image name (mcp-redis in the example above) with mcp/redis.

Configuration

The Redis MCP Server can be configured in two ways: via command line arguments or via environment variables. The precedence is: command line arguments > environment variables > default values.

Redis ACL

You can configure Redis ACL to restrict the access to the Redis database. For example, to create a read-only user:

127.0.0.1:6379> ACL SETUSER readonlyuser on >mypassword ~* +@read -@write

Configure the user via command line arguments or environment variables.

Configuration via command line arguments

When using the CLI interface, you can configure the server with command line arguments:

Basic Redis connection

uvx --from redis-mcp-server@latest redis-mcp-server
--host localhost
--port 6379
--password mypassword

Using Redis URI (simpler)

uvx --from redis-mcp-server@latest redis-mcp-server
--url redis://user:pass@localhost:6379/0

SSL connection

uvx --from redis-mcp-server@latest redis-mcp-server
--url rediss://user:pass@redis.example.com:6379/0

See all available options

uvx --from redis-mcp-server@latest redis-mcp-server --help

Available CLI Options:

Configuration via Environment Variables

If desired, you can use environment variables. Defaults are provided for all variables.

Name Description Default Value
REDIS_HOST Redis IP or hostname "127.0.0.1"
REDIS_PORT Redis port 6379
REDIS_DB Database 0
REDIS_USERNAME Default database username "default"
REDIS_PWD Default database password ""
REDIS_SSL Enables or disables SSL/TLS False
REDIS_SSL_CA_PATH CA certificate for verifying server None
REDIS_SSL_KEYFILE Client's private key file for client authentication None
REDIS_SSL_CERTFILE Client's certificate file for client authentication None
REDIS_SSL_CERT_REQS Whether the client should verify the server's certificate "required"
REDIS_SSL_CA_CERTS Path to the trusted CA certificates file None
REDIS_CLUSTER_MODE Enable Redis Cluster mode False

EntraID Authentication for Azure Managed Redis

The Redis MCP Server supports EntraID (Azure Active Directory) authentication for Azure Managed Redis, enabling OAuth-based authentication with automatic token management.

Authentication Providers

Service Principal Authentication - Application-based authentication using client credentials:

export REDIS_ENTRAID_AUTH_FLOW=service_principal export REDIS_ENTRAID_CLIENT_ID=your-client-id export REDIS_ENTRAID_CLIENT_SECRET=your-client-secret export REDIS_ENTRAID_TENANT_ID=your-tenant-id

Managed Identity Authentication - For Azure-hosted applications:

System-assigned managed identity

export REDIS_ENTRAID_AUTH_FLOW=managed_identity export REDIS_ENTRAID_IDENTITY_TYPE=system_assigned

User-assigned managed identity

export REDIS_ENTRAID_AUTH_FLOW=managed_identity export REDIS_ENTRAID_IDENTITY_TYPE=user_assigned export REDIS_ENTRAID_USER_ASSIGNED_CLIENT_ID=your-identity-client-id

Default Azure Credential - Automatic credential discovery (recommended for development):

export REDIS_ENTRAID_AUTH_FLOW=default_credential export REDIS_ENTRAID_SCOPES=https://redis.azure.com/.default

EntraID Configuration Variables

Name Description Default Value
REDIS_ENTRAID_AUTH_FLOW Authentication flow type None (EntraID disabled)
REDIS_ENTRAID_CLIENT_ID Service Principal client ID None
REDIS_ENTRAID_CLIENT_SECRET Service Principal client secret None
REDIS_ENTRAID_TENANT_ID Azure tenant ID None
REDIS_ENTRAID_IDENTITY_TYPE Managed identity type "system_assigned"
REDIS_ENTRAID_USER_ASSIGNED_CLIENT_ID User-assigned managed identity client ID None
REDIS_ENTRAID_SCOPES OAuth scopes for Default Azure Credential "https://redis.azure.com/.default"
REDIS_ENTRAID_RESOURCE Azure Redis resource identifier "https://redis.azure.com/"

Key Features

Example Configuration

For local development with Azure CLI:

Login with Azure CLI

az login

Configure MCP server

export REDIS_ENTRAID_AUTH_FLOW=default_credential export REDIS_URL=redis://your-azure-redis.redis.cache.windows.net:6379

For production with Service Principal:

export REDIS_ENTRAID_AUTH_FLOW=service_principal export REDIS_ENTRAID_CLIENT_ID=your-app-client-id export REDIS_ENTRAID_CLIENT_SECRET=your-app-secret export REDIS_ENTRAID_TENANT_ID=your-tenant-id export REDIS_URL=redis://your-azure-redis.redis.cache.windows.net:6379

For Azure-hosted applications with Managed Identity:

export REDIS_ENTRAID_AUTH_FLOW=managed_identity export REDIS_ENTRAID_IDENTITY_TYPE=system_assigned export REDIS_URL=redis://your-azure-redis.redis.cache.windows.net:6379

There are several ways to set environment variables:

  1. Using a .env File: Place a .env file in your project directory with key-value pairs for each environment variable. Tools like python-dotenv, pipenv, and uv can automatically load these variables when running your application. This is a convenient and secure way to manage configuration, as it keeps sensitive data out of your shell history and version control (if .env is in .gitignore). For example, create a .env file with the following content from the .env.example file provided in the repository:

Then edit the .env file to set your Redis configuration:

OR,

  1. Setting Variables in the Shell: You can export environment variables directly in your shell before running your application. For example:

export REDIS_HOST=your_redis_host export REDIS_PORT=6379

Other variables will be set similarly...

This method is useful for temporary overrides or quick testing.

Logging

The server uses Python's standard logging and is configured at startup. By default it logs at WARNING and above. You can change verbosity with the MCP_REDIS_LOG_LEVEL environment variable.

Handler behavior

Examples

See normal lifecycle messages

MCP_REDIS_LOG_LEVEL=INFO uv run src/main.py

Very verbose for debugging

MCP_REDIS_LOG_LEVEL=DEBUG uvx --from redis-mcp-server@latest redis-mcp-server --url redis://localhost:6379/0

In MCP client configs that support env, add it alongside your Redis settings. For example:

{ "mcpServers": { "redis": { "command": "uvx", "args": ["--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://localhost:6379/0"], "env": { "REDIS_HOST": "localhost", "REDIS_PORT": "6379", "MCP_REDIS_LOG_LEVEL": "INFO" } } } }

Integrations

Integrating this MCP Server to development frameworks like OpenAI Agents SDK, or with tools like Claude Desktop, VS Code, or Augment is described in the following sections.

OpenAI Agents SDK

Integrate this MCP Server with the OpenAI Agents SDK. Read the documents to learn more about the integration of the SDK with MCP.

Install the Python SDK.

pip install openai-agents

Configure the OpenAI token:

export OPENAI_API_KEY="<openai_token>"

And run the application.

python3.14 redis_assistant.py

You can troubleshoot your agent workflows using the OpenAI dashboard.

Augment

The preferred way of configuring the Redis MCP Server in Augment is to use the Easy MCP feature.

You can also configure the Redis MCP Server in Augment manually by importing the server via JSON:

{ "mcpServers": { "Redis MCP Server": { "command": "uvx", "args": [ "--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://localhost:6379/0" ] } } }

Claude Desktop

The simplest way to configure MCP clients is using uvx. Add the following JSON to your claude_desktop_config.json, remember to provide the full path to uvx.

Basic Redis connection:

{ "mcpServers": { "redis-mcp-server": { "type": "stdio", "command": "/Users/mortensi/.local/bin/uvx", "args": [ "--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://localhost:6379/0" ] } } }

Azure Managed Redis with EntraID authentication:

{ "mcpServers": { "redis-mcp-server": { "type": "stdio", "command": "/Users/mortensi/.local/bin/uvx", "args": [ "--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://your-azure-redis.redis.cache.windows.net:6379" ], "env": { "REDIS_ENTRAID_AUTH_FLOW": "default_credential", "REDIS_ENTRAID_SCOPES": "https://redis.azure.com/.default" } } } }

VS Code with GitHub Copilot

To use the Redis MCP Server with VS Code, you must nable the agent mode tools. Add the following to your settings.json:

{ "chat.agent.enabled": true }

You can start the GitHub desired version of the Redis MCP server using uvx by adding the following JSON to your mcp.json file:

"servers": { "redis": { "type": "stdio", "command": "uvx", "args": [ "--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://localhost:6379/0" ] }, }

Suppressing uvx Installation Messages

If you want to suppress uvx installation messages that may appear as warnings in MCP client logs, use the -qq flag:

"servers": { "redis": { "type": "stdio", "command": "uvx", "args": [ "-qq", "--from", "redis-mcp-server@latest", "redis-mcp-server", "--url", "redis://localhost:6379/0" ] }, }

The -qq flag enables silent mode, which suppresses "Installed X packages" messages that uvx writes to stderr during package installation.

Alternatively, you can start the server using uv and configure your mcp.json. This is usually desired for development.

// mcp.json { "servers": { "redis": { "type": "stdio", "command": "", "args": [ "--directory", "", "run", "src/main.py" ], "env": { "REDIS_HOST": "", "REDIS_PORT": "", "REDIS_USERNAME": "", "REDIS_PWD": "", } } } }

For more information, see the VS Code documentation.

Tip: You can prompt Copilot chat to use the Redis MCP tools by including #redis in your message.

Note: Starting with VS Code v1.102, MCP servers are now stored in a dedicated mcp.json file instead of settings.json.

Testing

You can use the MCP Inspector for visual debugging of this MCP Server.

npx @modelcontextprotocol/inspector uv run src/main.py

Example Use Cases

Contributing

  1. Fork the repo
  2. Create a new branch (feature-branch)
  3. Commit your changes
  4. Push to your branch and submit a PR!

License

This project is licensed under the MIT License.

Badges

Redis Server MCP server

Contact

For questions or support, reach out via GitHub Issues.

Alternatively, you can join the Redis Discord server and ask in the #redis-mcp-server channel.