AI for DevOps: GitHub, Cloudflare and Sentry in One Agent
MCP Playground
MCP Playground
๐ TL;DR
- Three official MCP servers: GitHub (
api.githubcopilot.com/mcp/), Cloudflare (mcp.cloudflare.com/mcp), Sentry (mcp.sentry.dev/mcp) - One agent that correlates a Sentry error โ finds the GitHub commit that caused it โ confirms the Cloudflare deployment
- Token requirements: GitHub PAT (repo scope) ยท Cloudflare API token ยท Sentry auth token
- Start from the Sentry Error Triage template and add GitHub + Cloudflare as extra servers
The DevOps incident loop is always the same: a Sentry alert fires, you open GitHub to find the offending commit, you check Cloudflare to see what deployed and when, then you create a ticket. Four tabs, fifteen minutes, before you have even started the fix.
This guide shows you how to collapse that loop into a single AI agent using the official MCP servers from GitHub, Cloudflare and Sentry.
What You Can Do With This Stack
Error-to-commit tracing
"What new Sentry errors appeared after the last deploy, and which GitHub commit is most likely responsible?"
Deployment verification
"What changed in the last Cloudflare Worker deployment and are there new Sentry errors since it went live?"
PR review assist
"Summarise open PRs in repo X, flag any that touch files related to existing Sentry issues."
Cloudflare health check
"List Cloudflare Worker routes that might be misconfigured and check for error rate spikes in the last hour."
Incident summary
"Summarise the incident: what broke in Sentry, what the last GitHub commits were, what changed on Cloudflare."
Release diff
"Compare commits between the last two GitHub release tags and check if any Sentry issues opened in that window."
The Three Official MCP Servers
| Tool | MCP Server URL | Transport | Token |
|---|---|---|---|
| GitHub | https://api.githubcopilot.com/mcp/ | HTTP | Personal access token (repo scope) |
| Cloudflare | https://mcp.cloudflare.com/mcp | HTTP | Cloudflare API token |
| Sentry | https://mcp.sentry.dev/mcp | HTTP | Auth token (Settings โ Auth Tokens) |
Step 1 โ Get Your Three Tokens
GitHub fine-grained personal access token
- Go to GitHub โ Settings โ Developer settings โ Personal access tokens โ Fine-grained tokens โ Generate new token
- Set repository access to the repos you want the agent to read
- Under Permissions add: Contents (read), Pull requests (read), Issues (read) โ add write to these if you want the agent to create issues or comment on PRs
- Copy the token โ it begins with
github_pat_
Classic personal access tokens (prefix ghp_) also work with the GitHub MCP server, but fine-grained tokens are recommended because you can scope them to specific repositories.
Cloudflare API token
- In Cloudflare go to My Profile โ API Tokens โ Create Token
- Use the Edit Cloudflare Workers template, or create a custom token with Workers Scripts:Read, Account:Read and Zone:Read at minimum
- Copy the token
Sentry auth token
- In Sentry go to Settings โ Auth Tokens โ Create New Token
- Select scopes:
project:read,event:read,org:read - Copy the token
Step 2 โ Connect in Agent Studio
Start from the Sentry template, then add GitHub and Cloudflare
The Sentry Error Triage template has the Sentry server pre-wired. Open it, paste your Sentry token, then click + Add Server twice to add GitHub and Cloudflare.
Use Sentry Error Triage Template โTo wire all three from scratch in MCP Agent Studio:
- Click + Add Server โ
https://api.githubcopilot.com/mcp/, select HTTP, paste GitHub token - Add second server โ
https://mcp.cloudflare.com/mcp, select HTTP, paste Cloudflare token - Add third server โ
https://mcp.sentry.dev/mcp, select HTTP, paste Sentry token - Choose a model โ Claude Sonnet 4.6 handles multi-step incident chains (Sentry โ GitHub diff โ Cloudflare deployment) well; DeepSeek V4 Pro is a strong cheaper choice for structured lookups
The Incident Workflow in Practice
YOU
"What new errors appeared in Sentry in the last hour and which is the most critical?"
AGENT
Queries Sentry, returns a ranked list of new issues with affected users and severity.
YOU
"Walk me through issue PROJ-1234 โ what broke and which commit likely caused it?"
AGENT
Pulls the Sentry stack trace, cross-references the file path with recent GitHub commits, returns the most likely offending commit with author and diff summary.
YOU
"What Cloudflare Worker deployment happened around that commit time?"
AGENT
Lists Cloudflare Worker deployment history, confirms which Workers version went live and what routes it affects.
That entire chain โ from "what broke" to "here is the commit and the deployment" โ runs in under 60 seconds with no tab switching.
Which Model to Use
- Claude Sonnet 4.6 โ best for incident chains that require reading a Sentry stack trace, reasoning about file paths and cross-referencing with GitHub diffs. The reasoning quality on complex error analysis is noticeably better than cheaper models.
- DeepSeek V4 Pro โ strong for structured queries: listing PRs, listing Cloudflare Worker routes, checking deployment history. Significantly cheaper than Sonnet for these lookups.
- Claude Haiku 4.5 โ fast for quick single-server Sentry or GitHub queries when you need a rapid answer during an incident.
Set up your DevOps agent in minutes
GitHub ยท Cloudflare ยท Sentry โ official MCP servers ยท No local install ยท Free credits on sign-up
Frequently Asked Questions
Related Guides
Written by MCP Playground
15+ years in product development. AI enthusiast building developer tools that make complex technologies accessible to everyone.
Related Resources
Test any MCP server with 30+ AI models โ free
Connect any MCP endpoint and chat with Claude, GPT-5, Gemini, DeepSeek and more. Watch every tool call live.
โฆ Free credits on sign-up ยท no credit card needed