David Kramer, founder of Sentry, gives a last-minute talk sharing opinions based on experience building Sentry's MCP server, mainly for a B2B SaaS context
Sentry's core business is application monitoring, aimed at fixing bugs for internet-based applications
MCP (Model Connected Plug-in/Provider) is framed as a simple, pluggable architecture for agents, discussed mainly for enterprise, cloud-based services
While spinning up an MCP server seems straightforward, OAuth 2.1 is required, which is not widely supported yet
Sentry used Cloudflare Workers as a shim to manage OAuth 2.1; complexities exist, but building a functional MCP server took only a couple of days
Plug-and-play does not work: exposing your whole Open API as MCP tools yields poor results; extensive adaptation, massaging, and context-aware design are needed
You cannot simply proxy your existing API; MCP endpoints must be carefully crafted to provide useful, human-readable context
Sentry converts some API responses directly to markdown, prioritizing human and agent readability over machine-oriented JSON
Good error messages and context are crucial for both humans and agents; generic or unstructured responses degrade agent performance
Token and description length limits can break workflows, requiring iterative tuning and evolution of responses
The Agent-Centric Model and Its Value Proposition 12:59
Building agents—dedicated services orchestrating interactions—provides greater control, flexibility, and reliability than offloading everything to remote tools
MCP's primary value lies as a plug-in architecture for agents, but streaming responses for tools are lacking
Sentry’s own agent does detailed root cause analysis; exposing this via MCP is still challenging due to lack of streaming, requiring workarounds like polling
True potential will manifest as B2B companies offer tailored, agent-driven workflows over MCP