Amazon Athena MCP Server by CData
Amazon Athena MCP Server by CData
Open FastMCP and click “Install Now”
- In the FastMCP connection interface use the existing "Install Now" button. You will enter the required ENV values directly into the FastMCP connection form fields described in the steps below.
Download and license the CData JDBC Driver for Amazon Athena
- Download the driver (cdata.jdbc.amazonathena.jar) from CData’s Athena JDBC driver page and place the JAR somewhere on the machine FastMCP will use. The license file (cdata.jdbc.amazonathena.lic) must sit next to the JAR. (cdn.cdata.com)
Locate the JDBC driver class name and driver JAR path
- DriverClass: cdata.jdbc.amazonathena.AmazonAthenaDriver (use this value in the connection).
- DriverPath: full filesystem path to cdata.jdbc.amazonathena.jar (e.g., /path/to/cdata.jdbc.amazonathena.jar). (cdn.cdata.com)
Create an AWS IAM identity for programmatic access (to get AWS credentials)
- In the AWS Console go to IAM → Users → Create user. Choose “Programmatic access”.
- Attach appropriate permissions (for testing you can use AmazonAthenaFullAccess + AmazonS3FullAccess or follow least-privilege guidance—see Minimum IAM Permissions in the CData docs). After creation, download the Access key ID and Secret access key CSV and store it securely. (cdn.cdata.com)
Create or choose an S3 bucket for Athena query results (S3 staging directory)
- In the AWS Console → S3, create a bucket (or pick an existing one) and note its S3 URI (e.g., s3://my-athena-query-results/). This will be the S3StagingDirectory value used by the JDBC driver. Also note the AWS region of the bucket/account. (cdn.cdata.com)
(Optional) Configure temporary/sts credentials or role chaining if you prefer not to use static keys
- If you will use role-based or temporary credentials (STS, SSO, or AWS profiles), note the relevant values (AWSRoleARN, AWSSessionToken, AWSCredentialsFile, AWSCredentialsFileProfile, etc.)—these are supported connection options in the CData driver. (cdn.cdata.com)
Build the JDBC connection string
- Use the CData Connection String utility (run: java -jar cdata.jdbc.amazonathena.jar) or construct a JDBC URL manually. Typical properties you will include in the JDBC URL: AWSAccessKey, AWSSecretKey (or AWSSessionToken), S3StagingDirectory, AWSRegion, and any optional properties (Workgroup, AuthScheme, InitiateOAuth if using OAuth flows). Example structure (replace placeholders with your values):
jdbc:amazonathena:AWSAccessKey=YOUR_AWS_ACCESS_KEY;AWSSecretKey=YOUR_AWS_SECRET;S3StagingDirectory=s3://your-bucket/;AWSRegion=us-east-1;
(Do not paste real secrets into public places — use the FastMCP secure ENV fields.) (cdn.cdata.com)
- Use the CData Connection String utility (run: java -jar cdata.jdbc.amazonathena.jar) or construct a JDBC URL manually. Typical properties you will include in the JDBC URL: AWSAccessKey, AWSSecretKey (or AWSSessionToken), S3StagingDirectory, AWSRegion, and any optional properties (Workgroup, AuthScheme, InitiateOAuth if using OAuth flows). Example structure (replace placeholders with your values):
Create the .prp (property) file for the MCP server (local copy)
- Create a file (e.g., amazon-athena.prp) that includes:
- Prefix (e.g., amazonathena)
- ServerName and ServerVersion
- DriverPath (full path to the JAR)
- DriverClass (cdata.jdbc.amazonathena.AmazonAthenaDriver)
- JdbcUrl (the JDBC URL you built)
- Tables (optional — leave blank to expose all)
- Keep this .prp file accessible to FastMCP or the process that will launch the MCP server. (See README for format.) (cdn.cdata.com)
- Create a file (e.g., amazon-athena.prp) that includes:
Fill the FastMCP “Install Now” ENV fields
- In the FastMCP connection interface, enter the values into the ENV/key fields (use secure/secret fields for secrets). Example ENV keys to add:
- DRIVER_PATH — /full/path/to/cdata.jdbc.amazonathena.jar
- DRIVER_CLASS — cdata.jdbc.amazonathena.AmazonAthenaDriver
- JDBC_URL — (jdbc:amazonathena:... as built above)
- AWS_ACCESS_KEY_ID — your AWS Access Key ID (secure field)
- AWS_SECRET_ACCESS_KEY — your AWS Secret Access Key (secure field)
- S3_STAGING_DIRECTORY — s3://your-athena-bucket/
- AWS_REGION — e.g., us-east-1
- OPTIONAL: AWS_SESSION_TOKEN / AWS_ROLE_ARN / AWSCREDENTIALSFILE / AWSCREDENTIALSPROFILE if using temporary or profile-based credentials
- OPTIONAL: WORKGROUP — if you use an Athena workgroup
- Ensure secrets are entered into FastMCP’s secure/secret input types (not a visible/plain field).
- In the FastMCP connection interface, enter the values into the ENV/key fields (use secure/secret fields for secrets). Example ENV keys to add:
Install and verify
- Click Install (or the equivalent confirmation in the FastMCP UI).
- Verify the connection by asking the MCP tools for tables/columns (e.g., call amazon_athena_get_tables or run a simple query). If it fails, confirm DriverPath, JDBC_URL, and AWS credentials, and check the driver license file location. (cdn.cdata.com)
- Troubleshooting & security reminders
- Keep the license file next to the JAR and never commit secrets to source control.
- If you need least-privilege IAM guidance or run into permission issues, consult the driver’s “Minimum IAM Permissions” section in the CData docs. (cdn.cdata.com)
If you want, tell me the exact FastMCP ENV field names shown in your Install Now dialog and I’ll map the values above to those field names exactly.
Quick Start
Choose Connection Type for
Authentication Required
Please sign in to use FastMCP hosted connections
Run MCP servers without
local setup or downtime
Access to 1,000+ ready-to-use MCP servers
Skip installation, maintenance, and trial-and-error.
No local setup or infra
Run MCP servers without Docker, ports, or tunnels.
Always online
Your MCP keeps working even when your laptop is off.
One secure URL
Use the same MCP from any agent, anywhere.
Secure by default
Encrypted connections. Secrets never stored locally.
Configuration for
Environment Variables
Please provide values for the following environment variables:
HTTP Headers
Please provide values for the following HTTP headers:
started!
The MCP server should open in . If it doesn't open automatically, please check that you have the application installed.
Copy and run this command in your terminal:
Make sure Gemini CLI is installed:
Visit Gemini CLI documentation for installation instructions.
Make sure Claude Code is installed:
Visit Claude Code documentation for installation instructions.
Installation Steps:
Configuration
Installation Failed
More for Database
View All →Supabase MCP Server
Connect Supabase projects directly with AI assistants using the Model Context Protocol (MCP). This server standardizes communication between Large Language Models and Supabase, enabling AI to manage tables, query data, and interact with project features like edge functions, storage, and branching. Customize access with read-only or project-scoped modes and select specific tool groups to fit your needs. Integrated tools cover account management, documentation search, database operations, debugging, and more, empowering AI to assist with development, monitoring, and deployment tasks in your Supabase environment efficiently and securely.
Svelte
Official Svelte documentation access and code analysis server that provides up-to-date reference material, playground link generation, and intelligent autofixer capabilities for detecting common patterns, anti-patterns, and migration opportunities in Svelte 5 and SvelteKit projects.
More for Data & Analytics
View All →Agent Data Bridge
An MCP server that provides data bridging from Spring Boot interfaces and a lightweight Python sandbox for script execution. It enables agents to fetch data as Markdown or Parquet files and perform automated data analysis within a controlled environment.