As Karsten stated, if the traffic is in the same VLAN then there is no inspection. If you’re passing traffic between VLANs then the MX firewalls apply as well as the IDS/IPS rules, but not the AMP - that only applies to traffic arriving directly on the WAN/internet port. So the MX can be good for macro level segmentation for a small server farm (where you can put each server in its own VLAN), the greatest limitation may by the throughput of the MX appliances (which Karsten’s suggestion of a Cisco Firepower may ‘fix’)
If you’re wanting to provide inspection for all traffic within a data centre, along the lines of micro segmentation, then l’d be looking at other technology. Something like Cisco ACI can achieve that, or there are options depending on what hypervisor you are using (e.g. VMware NSX).