Amazon Aurora Postgres MCP Server
AWS Labs postgres MCP Server
An AWS Labs Model Context Protocol (MCP) server for Aurora Postgres
Features
Natural language to Postgres SQL query
- Converting human-readable questions and commands into structured Postgres-compatible SQL queries and executing them against the configured Aurora Postgres database.
Prerequisites
- Install
uvfrom Astral or the GitHub README - Install Python using
uv python install 3.10 - This MCP server can only be run locally on the same host as your LLM client.
- Docker runtime
- Set up AWS credentials with access to AWS services
- You need an AWS account with appropriate permissions
- Configure AWS credentials with
aws configureor environment variables
Installation
| Cursor | VS Code |
|---|---|
Configure the MCP server in your MCP client configuration (e.g., for Amazon Q Developer CLI, edit ~/.aws/amazonq/mcp.json):
{
"mcpServers": {
"awslabs.postgres-mcp-server": {
"command": "uvx",
"args": [
"awslabs.postgres-mcp-server@latest",
"--allow_write_query"
],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1",
"FASTMCP_LOG_LEVEL": "ERROR"
},
"disabled": false,
"autoApprove": []
}
}
}
Windows Installation
For Windows users, the MCP server configuration format is slightly different:
{
"mcpServers": {
"awslabs.postgres-mcp-server": {
"disabled": false,
"timeout": 60,
"type": "stdio",
"command": "uv",
"args": [
"tool",
"run",
"--from",
"awslabs.postgres-mcp-server@latest",
"awslabs.postgres-mcp-server.exe"
],
"env": {
"FASTMCP_LOG_LEVEL": "ERROR",
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1"
}
}
}
}
Build and install docker image locally on the same host of your LLM client
- 'git clone https://github.com/awslabs/mcp.git'
- Go to sub-directory 'src/postgres-mcp-server/'
- Run 'docker build -t awslabs/postgres-mcp-server:latest .'
Add or update your LLM client's config with following:
Option 1: Using RDS Data API Connection (for Aurora Postgres)
{
"mcpServers": {
"awslabs.postgres-mcp-server": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e", "AWS_ACCESS_KEY_ID=[your data]",
"-e", "AWS_SECRET_ACCESS_KEY=[your data]",
"-e", "AWS_REGION=[your data]",
"awslabs/postgres-mcp-server:latest",
"--allow_write_query"
]
}
}
}
NOTE: the MCP config example include --allow_write_query illustrate how to enable write queries. If you want to disable write queries, remove --allow_write_query option.
Support for Database Cluster Creation
You can use the following LLM prompt to create a new Aurora PostgreSQL cluster:
Create an Aurora PostgreSQL cluster named 'mycluster' in us-west-2 region
Connection Methods
The MCP server supports connecting to multiple database endpoints using different connection methods via LLM prompts.
Database Types
- APG: Amazon Aurora PostgreSQL
- RPG: Amazon RDS for PostgreSQL
Example Prompts
Connect using RDS Data API:
Connect to database named postgres in Aurora PostgreSQL cluster 'my-cluster' with database_type as APG, using rdsapi as connection method in us-west-2 region
Connect using pgwire (Aurora PostgreSQL):
Connect to database named postgres with database endpoint as my-apg17-instance-1.ctgfg6yyo9df.us-west-2.rds.amazonaws.com with database_type as APG, using pgwire as connection method in us-west-2 region
Connect using pgwire (RDS PostgreSQL):
Connect to database named postgres with database endpoint as test-apg17-instance-1.ctgfg6yyo9df.us-west-2.rds.amazonaws.com with database_type as RPG, using pgwire as connection method in us-west-2 region
Supported Connection Methods
| Method | Description | Supported Database Types |
|---|---|---|
pgwire | Connect to PostgreSQL instance directly using the PostgreSQL wire protocol. Requires proper VPC security group configuration for direct database connectivity. | APG, RPG |
pgwire_iam | Same as pgwire, but uses IAM authentication. Requires IAM authentication to be enabled on the Aurora PostgreSQL cluster. | APG only |
rdsapi | Connect to Aurora PostgreSQL using the RDS Data API. Requires the RDS Data API to be enabled on the cluster. | APG only |
Prerequisites by Connection Method
pgwire / pgwire_iam
- VPC security group must allow inbound connections from your MCP server to the database
- For
pgwire_iam: IAM authentication must be enabled on the Aurora PostgreSQL cluster
rdsapi
- RDS Data API must be enabled on the Aurora PostgreSQL cluster
- Appropriate IAM permissions for Data API access
AWS Authentication
The MCP server uses the AWS profile specified in the AWS_PROFILE environment variable. If not provided, it defaults to the "default" profile in your AWS configuration file.
"env": {
"AWS_PROFILE": "your-aws-profile"
}
Make sure the AWS profile has permissions to access the RDS data API, and the secret from AWS Secrets Manager. The MCP server creates a boto3 session using the specified profile to authenticate with AWS services. Your AWS IAM credentials remain on your local machine and are strictly used for accessing AWS services.