Provides secure access to Snowflake data warehouses, enabling AI assistants to execute SQL queries, analyze data, and retrieve insights through natural language interactions with configurable security controls and authentication methods.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Snowflake MCP Servershow me the top 10 customers by revenue this quarter"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
General-Purpose Snowflake MCP Server
A secure Model Context Protocol (MCP) server that provides AI assistants with safe, efficient access to your Snowflake data warehouse. Execute SQL queries, analyze data, and get insights through natural language interactions.
For more detail information and example usages, reference the Blog.
Key Features
π Multiple Authentication: Password, private key, and SSO support
π‘οΈ Security First: Environment-based config, no hard-coded credentials
β‘ Performance Optimized: Configurable limits and efficient query execution
π Smart Error Handling: Detailed messages with troubleshooting guidance
π Rich Query Results: Formatted tables with metadata and row counts
π§ AI-Ready: Natural language to SQL through MCP protocol
ποΈ Universal Compatibility: Works with any MCP-compatible AI client
Quick Start
1. Install
git clone https://github.com/sfc-gh-tjia/snowflake-generic-mcp.git
cd snowflake-generic-mcp
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
pip install -r requirements.txt2. Configure
cp .env.example .env
nano .env # Add your Snowflake credentials3. Test
npx @modelcontextprotocol/inspector python snowflake_mcp_server.pyConfiguration
Environment Variables
Required:
SNOWFLAKE_ACCOUNT=your-account-identifier # e.g., abc12345.us-east-1.snowflakecomputing.com
SNOWFLAKE_USERNAME=your-usernameAuthentication (choose one):
# Option 1: Password
SNOWFLAKE_PASSWORD=your-password
# Option 2: Private Key (recommended)
SNOWFLAKE_PRIVATE_KEY_PATH=/path/to/rsa_key.p8
SNOWFLAKE_PRIVATE_KEY_PASSPHRASE=passphrase # optional
# Option 3: SSO
SNOWFLAKE_AUTHENTICATOR=externalbrowserOptional:
SNOWFLAKE_WAREHOUSE=your_warehouse
SNOWFLAKE_DATABASE=your_database
SNOWFLAKE_SCHEMA=your_schema
SNOWFLAKE_ROLE=your_role
SNOWFLAKE_MAX_ROWS=100Private Key Setup (Recommended)
Generate key pair:
openssl genrsa 2048 | openssl pkcs8 -topk8 -inform PEM -out rsa_key.p8 -nocrypt
openssl rsa -in rsa_key.p8 -pubout -out rsa_key.pubAdd public key to Snowflake:
ALTER USER your_username SET RSA_PUBLIC_KEY='your-public-key-content';AI Tool Integration
Connect the MCP server to your AI assistant for natural language database interactions.
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"snowflake": {
"command": "/opt/homebrew/bin/uv",
"args": ["--directory", "/path/to/your/project", "run", "snowflake_mcp_server.py"]
}
}
}Cursor
Option 1: Project-specific in Cursor Settings β Tools & Integration β MCP tools
Option 2: Global config in ~/.cursor/mcp.json
{
"mcpServers": {
"snowflake": {
"command": "/opt/homebrew/bin/uv",
"args": ["--directory", "/absolute/path/to/your/project", "run", "snowflake_mcp_server.py"]
}
}
}Example Usage
Once connected, you can interact with your Snowflake data using natural language:
"What tables are available in my database?"
"Show me the schema of the users table"
"Find all customers who made purchases this month"
"Analyze sales trends for Q4"
"Help me optimize this slow query"
"Count records in each table"
"Show me the top 10 customers by revenue"The server handles:
Query execution with proper formatting and metadata
Error handling with helpful troubleshooting suggestions
Security logging for dangerous operations
Performance limits to prevent resource exhaustion
Security Best Practices
β οΈ IMPORTANT SECURITY NOTICE: This server executes raw SQL queries on your Snowflake instance. Always follow these security practices:
Use private key authentication instead of passwords
Create dedicated Snowflake user with minimal permissions:
CREATE USER mcp_user PASSWORD = 'secure_password';
GRANT USAGE ON WAREHOUSE COMPUTE_WH TO USER mcp_user;
GRANT USAGE ON DATABASE your_db TO USER mcp_user;
GRANT SELECT ON ALL TABLES IN SCHEMA your_db.public TO USER mcp_user;Secure private keys:
chmod 600 /path/to/rsa_key.p8Use environment variables - never hard-code credentials
Use project-specific configurations for sensitive environments
β οΈ SQL Injection Risk: This server executes any SQL query provided by AI assistants. Ensure:
Your Snowflake user has minimal required permissions
No admin or elevated privileges for the MCP user
Consider using read-only access for sensitive environments
Monitor query logs for unexpected operations
Network Security: Ensure proper firewall rules and VPN access if required
Troubleshooting
Common Issues
Environment Variables Not Set:
Check
.envfile format (no quotes, no spaces around=)Set variables in shell profile for global access
Connection Errors:
Verify account identifier format (include region if needed)
Check network connectivity and warehouse status
Verify credentials and permissions
Authentication Failures:
For private key: Ensure public key is set in Snowflake
For SSO: Test browser login first
Check if user account is locked
Path Issues:
Use absolute paths in configuration files
Verify paths with
which uvorwhich python
Debug Mode
Server Logs:
export MCP_LOG_LEVEL=DEBUG
python snowflake_mcp_server.pyClient Logs:
Claude Desktop:
~/Library/Logs/Claude/mcp*.logCursor: Output panel β "MCP Logs"
License
MIT License - see LICENSE file for details.