You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/platform-services/external-mcp-server.md
+47-1Lines changed: 47 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,6 +86,7 @@ Investigate security incidents without leaving Slack:
86
86
***Query raw logs** for deeper investigation.
87
87
***Update insight status** directly from Slack.
88
88
***Add investigation notes** to maintain audit context.
89
+
***Get AI-powered incident response guidance** with structured recommendations for investigation, containment, and escalation.
89
90
***Execute multi-tool actions conversationally** within a single Slack thread.
90
91
91
92
```txt title="Slack Example 1"
@@ -243,7 +244,18 @@ Do NOT use MCP for:
243
244
* Model training. Use the [Search Job API](/docs/api/search-job).
244
245
* High-volume automated queries.
245
246
246
-
MCP interactions incur token-based LLM processing costs, which can be significant for high-volume workloads. MCP is designed for conversational, agent-level interaction. For raw data access, standard APIs remain more efficient and cost-effective.
247
+
### Understanding MCP cost dynamics
248
+
249
+
MCP endpoints are cost-amplifying by design. A single conversational request can trigger multiple agent steps, tool calls, retries, and retrieval operations. Valid requests that appear reasonable can generate significantly higher costs than anticipated, particularly when:
250
+
251
+
* Queries trigger broad semantic searches with high retrieval limits.
252
+
* Requests induce multi-step reasoning or planning workflows.
253
+
* Tool calls fail and trigger automatic retries.
254
+
* Workflows continue executing after client disconnect.
255
+
256
+
MCP is designed for conversational, agent-level interaction where cost per request is understood and monitored. For raw data access or high-volume operations, standard APIs remain more efficient and cost-effective.
257
+
258
+
For detailed guidance on securing MCP against cost-based attacks, see our blog post: [Token Torching: How I'd burn your AI budget (so you can fix it)](https://www.sumologic.com/blog/token-torching-ai-attack).
247
259
248
260
## Security and data governance
249
261
@@ -253,6 +265,30 @@ MCP interactions incur token-based LLM processing costs, which can be significan
253
265
***Audit trails**. All MCP interactions are logged for compliance and security review.
254
266
***Multi-tenant isolation**. Tenant-level security controls are enforced at the gateway.
255
267
268
+
## Monitoring and cost controls
269
+
270
+
Implement these controls to prevent unintended or malicious cost escalation.
271
+
272
+
### What to monitor
273
+
274
+
Track these metrics per request, per identity, and per tool:
***Hard budgets**. Set per-request, per-identity, per-tool, and per-tenant spending limits.
286
+
***Validation gates**. Implement authentication, input validation, size limits, and retrieval caps before LLM processing begins.
287
+
***Progressive trust**. Start with restricted capabilities for new or untrusted identities. Expand access based on usage patterns.
288
+
***Per-tool quotas**. Limit or disable expensive tools for untrusted traffic.
289
+
***Kill switches**. Maintain the ability to disable high-cost tools or operations within seconds.
290
+
***Disconnect handling**. Ensure workflows terminate when clients disconnect to prevent billing for abandoned requests.
291
+
256
292
## FAQ
257
293
258
294
<details>
@@ -294,9 +330,19 @@ Agents connected via MCP run in your own environment, not within Sumo Logic infr
294
330
295
331
</details>
296
332
333
+
<details>
334
+
<summary>How do I protect against cost-based attacks?</summary>
335
+
336
+
MCP endpoints can be exploited to generate excessive costs through valid but expensive requests. Implement cost monitoring, set hard budgets per request and identity, apply validation before expensive operations, and ensure workflows terminate when clients disconnect.
337
+
338
+
For comprehensive guidance, see our blog post: [Token Torching: How I'd burn your AI budget (so you can fix it)](https://www.sumologic.com/blog/token-torching-ai-attack).
0 commit comments