We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/rigzindorje/Splunk-MCP-archived'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
mcp_config.json•2.11 KiB
{
"server": {
"url": "https://{stack}:{port}/servicesNS/nobody/missioncontrol"
},
"authentication": [
{
"schema_parameters": {
"scheme": "bearer"
},
"type": "http",
"value": "BEARER_TOKEN"
},
{
"password": "PASSWORD",
"schema_parameters": {
"scheme": "basic"
},
"type": "http",
"username": "USERNAME"
}
],
"operations": [
{
"description": "Retrieve assets using the ID of the KV collection assets_by_str. Requires mc_assets_read or admin_all_objects capabilities.",
"name": "public_v2_assets"
},
{
"description": "The API for retrieving findings by the querying fields. Requires mc_investigation_read or admin_all_objects capabilities.",
"name": "public_v2_get_findings"
},
{
"description": "Retrieve a finding using its ID. Requires mc_investigation_read or admin_all_objects capabilities.",
"name": "public_v2_get_finding_by_id"
},
{
"description": "Retrieve an identity using the ID of the identity. Requires mc_identity_read or admin_all_objects capabilities.",
"name": "public_v2_get_identity"
},
{
"description": "Retrieve investigations using query parameters. Requires mc_investigation_read or admin_all_objects capabilities.",
"name": "public_v2_list_investigations"
},
{
"description": "Create investigations using provided fields. Requires mc_investigation_write and edit_notable_events OR admin_all_objects capabilities.",
"name": "public_v2_create_investigation"
},
{
"description": "Update the investigation by id. Requires mc_investigation_write and edit_notable_events OR admin_all_objects capabilities.",
"name": "public_v2_update_investigation"
},
{
"description": "Get the risk scores for a risk entity in Splunk Enterprise Security. Requires mc_risk_score_write or admin_all_objects capabilities.",
"name": "public_v2_risk_entity_risk_scores_retrieve"
},
{
"description": "Add a risk modifier to a risk entity in Splunk Enterprise Security. Requires mc_risk_score_write or admin_all_objects capabilities.",
"name": "public_v2_risk_entity_risk_scores_update"
}
]
}