Skip to main content
Glama
deslicer

MCP Server for Splunk

.gitleaksignore2.65 kB
# Gitleaks ignore file # These are fingerprints for known false positives in historical commits # Format: commit:file:rule:line # Test credentials in test_credentials_handling.py (commit eec6d6d) # These are intentional fake passwords for testing credential masking eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:31 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:39 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:78 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:85 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:174 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:184 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:239 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:288 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:326 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:359 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:432 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:generic-credential:290 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:generic-credential:327 # Test credentials in test_http_surface.py (commit eec6d6d) eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_http_surface.py:splunk-password:369 # splunk_client.py password parameter (commits 64ac233 and eec6d6d) # This is the password= parameter in splunklib.client.connect() - not a hardcoded secret 64ac233bfd533af5bd907ec9af136e10d1703f28:src/splunk_client.py:generic-credential:36 eec6d6dc260ec720c48f8d4b9f3ebae5db785252:src/splunk_client.py:generic-credential:46 # Docker compose dev defaults (commit a71bc8a) # Default dev password Chang3d! - well-known, not a production secret a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:splunk-password:115 a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:splunk-password:249 a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:generic-credential:248 # Meta: gitleaksignore file itself triggers on fingerprint text (commit 88d1fff) 88d1fffb6e9e2ee1032940106947d6ca792e3c36:.gitleaksignore:generic-credential:25

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/deslicer/mcp-for-splunk'

If you have feedback or need assistance with the MCP directory API, please join our Discord server