Skip to main content
Glama

MCP Server for Splunk

Apache 2.0
16
  • Apple
  • Linux
security.md2.1 kB
# Security Guide This guide summarizes security best practices for deploying and operating the MCP Server for Splunk. ## Scope - Transport security (HTTP vs stdio) - Credential handling and secrets - Least-privilege Splunk access - Multi-tenant isolation - Logging/auditing and hardening ## Transport Security - Prefer HTTPS for HTTP transport behind a reverse proxy (e.g., Traefik). - Terminate TLS at the edge and limit inbound ports to required services. - For local development, stdio is acceptable; avoid exposing dev HTTP to untrusted networks. ## Credentials and Secrets - Do not hardcode Splunk credentials in code or commit them to VCS. - For Docker: - Use Docker secrets for `SPLUNK_PASSWORD` and other sensitive values. - Mount secrets and read via `_FILE` environment variables when possible. - For Kubernetes: - Store credentials in Kubernetes Secrets; mount as env or files. - Never log passwords/tokens; scrub sensitive values from logs. ## Least‑Privilege Access - Create a dedicated Splunk service account with only required roles for targeted tools. - Separate roles for admin tools vs read-only search tools. - Restrict index access to only what is needed. ## Multi‑Tenant Isolation - Prefer client-provided Splunk credentials per request for isolation. - Validate and sanitize all client-provided connection parameters. - Enforce request scoping: clients should not see each other's config or data. ## Logging and Auditing - Enable structured logs and include request IDs and client identifiers where appropriate. - Avoid logging request bodies containing credentials. - Consider centralizing logs with Fluentd/ELK and monitoring for security anomalies. ## Hardening Checklist - HTTPS enabled for HTTP transport - Secrets managed via Docker/Kubernetes - Service account with least-privilege roles - Logs scrub sensitive values - Requests validated and scoped per client ## References - Deployment hardening: `docs/guides/deployment/` - Example secrets usage: Docker/Kubernetes snippets in deployment guide - Windows specifics: `docs/WINDOWS_GUIDE.md`

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/deslicer/mcp-for-splunk'

If you have feedback or need assistance with the MCP directory API, please join our Discord server