Skip to main content

MCP Debug — Test Your MCP Integrations

Access: Users with MCP Debug permission enabled by their Admin

The MCP Debug module is a testing and debugging tool for your Model Context Protocol (MCP) integrations. Use it to explore available MCP tools, test tool responses, and validate authentication — all from within TraptureIQ, without switching to a CLI or separate console.


What is MCP?

The Model Context Protocol (MCP) is an open standard that allows AI agents to interact with external tools and data sources. Think of it as a "universal adapter" that lets your agents connect to cloud services like BigQuery, Cloud Run, Firestore, and more.


What is Google Cloud MCP?

Google Cloud MCP servers let your AI agents interact with Google Cloud services. Each service exposes its capabilities as MCP tools that agents can discover and call programmatically.

Why it matters: If you're building agents that need to interact with Google Cloud services (query databases, manage infrastructure, monitor logs), MCP provides a standardized way to do it. The MCP Debug module lets you test these connections before deploying your agent.

Demo Video


Supported Servers

TraptureIQ supports 18 Google Cloud MCP servers:

ServerWhat You Can Do
BigQueryQuery, explore, and manage BigQuery datasets and tables
Cloud RunDeploy and manage Cloud Run services and jobs
Cloud SQLManage Cloud SQL instances (MySQL, PostgreSQL, SQL Server)
Cloud LoggingQuery and manage Cloud Logging log entries and sinks
Cloud MonitoringQuery metrics, manage alerting policies, and dashboards
Compute EngineManage Compute Engine VMs, disks, and networking
FirestoreManage Firestore databases, documents, and indexes
GKEManage Google Kubernetes Engine clusters and workloads
Pub/SubManage Pub/Sub topics, subscriptions, and message publishing
SpannerManage Spanner instances, databases, and schemas
Vertex AIManage Vertex AI models, endpoints, and pipelines
Vertex AI SearchManage Vertex AI Search engines and data stores
AlloyDB for PostgreSQLManage AlloyDB for PostgreSQL instances and databases
BigtableManage Bigtable instances, clusters, and tables
Resource ManagerManage GCP projects, folders, and organizations
Customer Experience Agent StudioBuild and manage CX Agent Studio conversational agents
Google Security OperationsQuery and manage Google Security Operations (Chronicle) data
Managed Service for Apache KafkaManage Apache Kafka clusters and topics

For a full list of available tools per server, see Supported Google Cloud MCP products.


How to Use MCP Debug

Step 1: Add a Connection

  1. Click MCP Debug in the sidebar.
  2. Click + Add Connection.
  3. Select a server from the dropdown (e.g., BigQuery).
  4. If the server is regional (AlloyDB, Security Operations, Managed Kafka), enter your region (e.g., us-central1).
  5. Choose an authentication method (see Authentication Setup below).
  6. Click Connect.

Expected result: The connection appears as a tab at the top of the page. You can add multiple connections to different servers — each gets its own tab.

MCP connection tabs — Replace with actual screenshot

Step 2: Browse Available Tools

Once connected, TraptureIQ automatically loads all available tools from the MCP server.

What you'll see for each tool:

  • Name — the tool identifier (e.g., list_dataset_ids, execute_sql)
  • Description — what the tool does in plain language
  • Parameters — required and optional inputs with type information (string, number, boolean, etc.)

Use the search bar to filter tools by name or description.

MCP tools list — Replace with actual screenshot

Step 3: Run a Tool

  1. Click Run on any tool card.
  2. Fill in the parameter fields. Required fields are marked with a red asterisk (*).
  3. Click Execute.
  4. The response appears below — either as formatted JSON (success) or an error message (failure).

Expected result for success: A JSON response showing the tool's output (e.g., a list of BigQuery datasets, Cloud Run service details, etc.).

Expected result for failure: An error message explaining what went wrong (e.g., missing permissions, wrong arguments, API not enabled).

MCP tool response — Replace with actual screenshot

Step 4: Manage Connections

  • Switch between connections — click the tabs at the top of the page
  • Remove a connection — click the x button on its tab (this only removes the configuration in TraptureIQ; no GCP resources are affected)
  • Auth method badge — each tab shows which authentication method is being used (Impersonation, Direct, SA Key)

Authentication Setup

Each MCP connection needs a GCP service account with the right permissions. TraptureIQ offers three authentication methods:

No credentials are exchanged. TraptureIQ uses short-lived tokens to access your GCP project.

Setup:

  1. Create a service account in your GCP project.
  2. Grant it the required roles (see Required Permissions).
  3. Grant TraptureIQ permission to impersonate this account (follow the instructions shown in the connection form).
  4. Enter your service account email in the connection form.

Option 2: Authorize TraptureIQ Principal (Simplest)

Grant TraptureIQ's service account direct permissions on your Google Cloud project. No credentials to manage.

Setup:

  1. Grant the required roles directly to TraptureIQ's service account on your project.

Option 3: Upload SA Key (Cross-Domain Fallback)

Upload a service account key JSON file. The key is stored securely and encrypted.

Setup:

  1. Create a service account in your GCP project.
  2. Grant it the required roles.
  3. Download the JSON key file.
  4. Upload it in the connection form.

Required Permissions

Regardless of which auth method you choose, the service account needs these Google Cloud permissions:

RolePurpose
roles/mcp.toolUserRequired for all MCP servers — allows calling MCP tools
Service-specific roleDepends on the server (see table below)

Common Service-Specific Roles

ServerRecommended Role
BigQueryroles/bigquery.user + roles/bigquery.dataViewer
Cloud Runroles/run.viewer
Cloud SQLroles/cloudsql.viewer
Cloud Loggingroles/logging.viewer
Cloud Monitoringroles/monitoring.viewer
Compute Engineroles/compute.viewer
GKEroles/container.viewer
Firestoreroles/datastore.viewer

How to grant: Follow the instructions shown in the TraptureIQ connection form, or ask your GCP admin to grant these roles to the service account.


Troubleshooting Common Errors

Error MessageCauseHow to Fix
"User does not have mcp.tools.call permission"Missing roles/mcp.toolUserGrant the role to your service account
"API has not been used in project ... or it is disabled"MCP not enabled for this APIAsk your GCP admin to enable the MCP API for the relevant service in your project
"Access Denied"SA lacks service-specific permissionsGrant the appropriate viewer/user role for that service
"Request contains an invalid argument"Wrong argument values or missing permissionsDouble-check argument values and ensure the SA has sufficient access

Tips for Beginners

  • Start with BigQuery — it's the most commonly used MCP server and has straightforward permissions. Try listing datasets first.
  • Use the search bar — MCP servers can expose many tools. Use search to quickly find the tool you need.
  • Test with read-only operations first — Start with "list" or "get" tools before running write operations.
  • Check permissions step by step — If a tool fails, first verify roles/mcp.toolUser, then verify the service-specific role.
  • One connection per tab — You can connect to multiple MCP servers simultaneously, making it easy to test cross-service workflows.