vmware-aria
This server provides AI-assisted monitoring, capacity planning, and operational insights for VMware Aria Operations (vRealize Operations) through 18 tools covering resources, alerts, capacity, anomaly detection, and platform health.
Resource Management
List resources by kind (VMs, hosts, clusters, datastores, datacenters) with optional filtering
Get detailed resource info including health, risk, and efficiency badges
Fetch time-series metrics (CPU, memory, disk, network) with configurable time range and rollup
Get health badge scores (0–100) and identify top consumers for a given metric
Alert Management
List active alerts filtered by criticality (INFORMATION, WARNING, IMMEDIATE, CRITICAL) or resource
View full alert details including symptoms and recommendations
Acknowledge alerts (mark as seen) or cancel/dismiss them
List alert definitions (templates defining triggering conditions)
Capacity Planning
Get capacity overview and recommendations for a cluster
Determine remaining capacity (CPU, memory, disk, network) before hitting limits
Predict time until capacity exhaustion based on usage trends
Get rightsizing recommendations to fix over- or under-provisioned VMs
Anomaly Detection
List ML-detected metric anomalies for any resource
Get risk badge scores (0–100) predicting likelihood of future performance or availability issues
Platform Health
Check overall Aria Operations platform health (services and nodes)
List collector groups and member statuses to diagnose missing metrics or stale data
Provides tools for interacting with VMware Aria Operations to perform resource monitoring, alert management, capacity planning, and platform health checks.
VMware Aria Operations MCP Skill
Author: Wei Zhou, VMware by Broadcom — wei-wz.zhou@broadcom.com This is a community-driven project by a VMware engineer, not an official VMware product. For official VMware developer tools see developer.broadcom.com.
AI-assisted monitoring and capacity planning for VMware Aria Operations (vRealize Operations) via the Model Context Protocol (MCP).
Overview
vmware-aria exposes 18 MCP tools for interacting with Aria Operations through natural language AI agents (Claude Code, Cursor, Goose, etc.):
Category | Tools | Type |
Resources | list, get, metrics, health badge, top consumers | Read-only (5) |
Alerts | list, get, acknowledge, cancel, definitions | Read + 2 Write (5) |
Capacity | overview, remaining, time-remaining, rightsizing | Read-only (4) |
Anomaly | list anomalies, risk badge | Read-only (2) |
Health | platform health, collector groups | Read-only (2) |
Total: 18 tools — 16 read-only, 2 write (acknowledge/cancel alerts)
Quick Start
# Install
uv tool install vmware-aria
# Configure
mkdir -p ~/.vmware-aria
cat > ~/.vmware-aria/config.yaml << 'EOF'
targets:
prod:
host: aria-ops.example.com
username: admin
port: 443
verify_ssl: true
auth_source: LOCAL
default_target: prod
EOF
# Set password (never in config.yaml)
echo "VMWARE_ARIA_PROD_PASSWORD=your_password" > ~/.vmware-aria/.env
chmod 600 ~/.vmware-aria/.env
# Verify setup
vmware-aria doctorCLI Examples
# List top CPU consumers
vmware-aria resource top --metric cpu|usage_average --top 10
# Check active CRITICAL alerts
vmware-aria alert list --criticality CRITICAL
# Acknowledge an alert
vmware-aria alert acknowledge <alert-id>
# Fetch 4-hour CPU + memory metrics for a VM
vmware-aria resource metrics <vm-id> --metrics cpu|usage_average,mem|usage_average --hours 4
# Check cluster capacity
vmware-aria capacity remaining <cluster-id>
vmware-aria capacity time-remaining <cluster-id>
# Find rightsizing opportunities
vmware-aria capacity rightsizing
# Check Aria platform health
vmware-aria health status
vmware-aria health collectorsMCP Setup (Claude Code)
After uv tool install vmware-aria, add to ~/.claude.json:
{
"mcpServers": {
"vmware-aria": {
"command": "vmware-aria",
"args": ["mcp"],
"env": {
"VMWARE_ARIA_CONFIG": "~/.vmware-aria/config.yaml"
}
}
}
}v1.5.15+ uses the single-command form
vmware-aria mcp. The legacyvmware-aria-mcpconsole script is still kept for backward compatibility. If you must useuvx --from vmware-aria vmware-aria mcp(no install) and hitinvalid peer certificate: UnknownIssuerbehind a corporate TLS proxy, setUV_NATIVE_TLS=trueor use the recommendedvmware-aria mcpform above.
Then use natural language:
"Show me the top 10 CPU consumers right now"
"List all CRITICAL alerts and acknowledge them"
"How long until the prod cluster runs out of memory?"
"Which VMs are over-provisioned? Show rightsizing recommendations"
"Are there any anomalies on vm-web-01?"
Authentication
Aria Operations uses OpsToken authentication:
POST /suite-api/api/auth/token/acquire
{"username": "admin", "password": "...", "authSource": "LOCAL"}
→ {"token": "abc123", "validity": 1800000}
Subsequent requests: Authorization: OpsToken abc123Tokens are valid for 30 minutes and automatically refreshed 60 seconds before expiry.
Architecture
User (natural language)
↓
AI Agent (Claude Code / Goose / Cursor)
↓ [reads SKILL.md]
vmware-aria MCP server (stdio transport)
↓ [HTTPS + OpsToken]
Aria Operations Suite API
↓
VMs / Hosts / Clusters / Alerts / CapacityCompanion Skills
Skill | Scope | Tools | Install |
vmware-aiops ⭐ entry point | VM lifecycle, deployment, guest ops, clusters | 31 |
|
Read-only monitoring, alarms, events, VM info | 8 |
| |
NSX networking: segments, gateways, NAT, IPAM | 31 |
| |
DFW microsegmentation, security groups, Traceflow | 20 |
| |
Datastores, iSCSI, vSAN | 11 |
| |
Tanzu Namespaces, TKC cluster lifecycle | 20 |
|
Security
Passwords loaded from env vars or
.envfile, never fromconfig.yamlWrite operations (acknowledge/cancel alert) audit-logged to
~/.vmware-aria/audit.logAPI responses sanitized (control chars stripped, 500-char limit) to prevent prompt injection
Supports self-signed certificates (
verify_ssl: false) for lab environments
License
MIT — see LICENSE
Maintenance
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/zw008/VMware-Aria'
If you have feedback or need assistance with the MCP directory API, please join our Discord server