A simple memory system designed to allow LLMs to store and retrieve information. This provides some focused tools to LLMs via the Model Context Protocol.
All methods are exposed as MCP tools and REST API endpoints.
Cloning and running the server locally.
git clone git@github.com:timescale/tiger-memory-mcp-server.git
Run npm i
to install dependencies and build the project. Use npm run watch
to rebuild on changes.
Create a .env
file based on the .env.sample
file.
cp .env.sample .env
The MCP Inspector is very handy.
npm run inspector
Field | Value |
---|---|
Transport Type | STDIO |
Command | node |
Arguments | dist/index.js |
Create/edit the file ~/Library/Application Support/Claude/claude_desktop_config.json
to add an entry like the following, making sure to use the absolute path to your local tiger-memory-mcp-server
project, and real database credentials.
{
"mcpServers": {
"tiger-memory": {
"command": "node",
"args": [
"/absolute/path/to/tiger-memory-mcp-server/dist/index.js",
"stdio"
],
"env": {
"PGHOST": "x.y.tsdb.cloud.timescale.com",
"PGDATABASE": "tsdb",
"PGPORT": "32467",
"PGUSER": "readonly_mcp_user",
"PGPASSWORD": "abc123"
}
}
}
}
We use a Helm chart to deploy to Kubernetes. See the chart/
directory for details.
The service is accessible to other services in the cluster via the DNS name tiger-memory-mcp-server.savannah-system.svc.cluster.local
.
Creating the database user:
CREATE USER tiger_memory WITH PASSWORD 'secret';
GRANT CREATE ON DATABASE tsdb TO tiger_memory;
Run the following to create the necessary sealed secrets. Be sure to fill in the correct values.
kubectl -n savannah-system create secret generic tiger-memory-mcp-server-database \
--dry-run=client \
--from-literal=user="tiger_memory" \
--from-literal=password="secret" \
--from-literal=database="tsdb" \
--from-literal=host="x.y.tsdb.cloud.timescale.com" \
--from-literal=port="32467" \
-o yaml | kubeseal -o yaml
# https://logfire-us.pydantic.dev/tigerdata/tigerdata/settings/write-tokens
kubectl -n savannah-system create secret generic tiger-memory-mcp-server-logfire \
--dry-run=client \
--from-literal=token="pylf_v1_us_" \
-o yaml | kubeseal -o yaml
# https://login.tailscale.com/admin/settings/keys
kubectl -n savannah-system create secret generic tiger-memory-mcp-server-tailscale \
--dry-run=client \
--from-literal=authkey="tskey-auth-" \
-o yaml | kubeseal -o yaml
Update ./chart/values/dev.yaml
with the output.