Skip to main content
Glama

Snowflake MCP Server

by sfc-gh-tjia

General-Purpose Snowflake MCP Server

A secure Model Context Protocol (MCP) server that provides AI assistants with safe, efficient access to your Snowflake data warehouse. Execute SQL queries, analyze data, and get insights through natural language interactions.

For more detail information and example usages, reference the Blog.

Python License: MIT

Key Features

  • šŸ” Multiple Authentication: Password, private key, and SSO support

  • šŸ›”ļø Security First: Environment-based config, no hard-coded credentials

  • ⚔ Performance Optimized: Configurable limits and efficient query execution

  • šŸ” Smart Error Handling: Detailed messages with troubleshooting guidance

  • šŸ“Š Rich Query Results: Formatted tables with metadata and row counts

  • 🧠 AI-Ready: Natural language to SQL through MCP protocol

  • šŸ—ļø Universal Compatibility: Works with any MCP-compatible AI client

Quick Start

1. Install

git clone https://github.com/sfc-gh-tjia/snowflake-generic-mcp.git cd snowflake-generic-mcp python -m venv venv source venv/bin/activate # Windows: venv\Scripts\activate pip install -r requirements.txt

2. Configure

cp .env.example .env nano .env # Add your Snowflake credentials

3. Test

npx @modelcontextprotocol/inspector python snowflake_mcp_server.py

Configuration

Environment Variables

Required:

SNOWFLAKE_ACCOUNT=your-account-identifier # e.g., abc12345.us-east-1.snowflakecomputing.com SNOWFLAKE_USERNAME=your-username

Authentication (choose one):

# Option 1: Password SNOWFLAKE_PASSWORD=your-password # Option 2: Private Key (recommended) SNOWFLAKE_PRIVATE_KEY_PATH=/path/to/rsa_key.p8 SNOWFLAKE_PRIVATE_KEY_PASSPHRASE=passphrase # optional # Option 3: SSO SNOWFLAKE_AUTHENTICATOR=externalbrowser

Optional:

SNOWFLAKE_WAREHOUSE=your_warehouse SNOWFLAKE_DATABASE=your_database SNOWFLAKE_SCHEMA=your_schema SNOWFLAKE_ROLE=your_role SNOWFLAKE_MAX_ROWS=100

Private Key Setup (Recommended)

  1. Generate key pair:

openssl genrsa 2048 | openssl pkcs8 -topk8 -inform PEM -out rsa_key.p8 -nocrypt openssl rsa -in rsa_key.p8 -pubout -out rsa_key.pub
  1. Add public key to Snowflake:

ALTER USER your_username SET RSA_PUBLIC_KEY='your-public-key-content';

AI Tool Integration

Connect the MCP server to your AI assistant for natural language database interactions.

Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json:

{ "mcpServers": { "snowflake": { "command": "/opt/homebrew/bin/uv", "args": ["--directory", "/path/to/your/project", "run", "snowflake_mcp_server.py"] } } }

Cursor

Option 1: Project-specific in Cursor Settings → Tools & Integration → MCP tools
Option 2: Global config in ~/.cursor/mcp.json

{ "mcpServers": { "snowflake": { "command": "/opt/homebrew/bin/uv", "args": ["--directory", "/absolute/path/to/your/project", "run", "snowflake_mcp_server.py"] } } }

Example Usage

Once connected, you can interact with your Snowflake data using natural language:

"What tables are available in my database?" "Show me the schema of the users table" "Find all customers who made purchases this month" "Analyze sales trends for Q4" "Help me optimize this slow query" "Count records in each table" "Show me the top 10 customers by revenue"

The server handles:

  • Query execution with proper formatting and metadata

  • Error handling with helpful troubleshooting suggestions

  • Security logging for dangerous operations

  • Performance limits to prevent resource exhaustion

Security Best Practices

āš ļø IMPORTANT SECURITY NOTICE: This server executes raw SQL queries on your Snowflake instance. Always follow these security practices:

  1. Use private key authentication instead of passwords

  2. Create dedicated Snowflake user with minimal permissions:

CREATE USER mcp_user PASSWORD = 'secure_password'; GRANT USAGE ON WAREHOUSE COMPUTE_WH TO USER mcp_user; GRANT USAGE ON DATABASE your_db TO USER mcp_user; GRANT SELECT ON ALL TABLES IN SCHEMA your_db.public TO USER mcp_user;
  1. Secure private keys: chmod 600 /path/to/rsa_key.p8

  2. Use environment variables - never hard-code credentials

  3. Use project-specific configurations for sensitive environments

  4. āš ļø SQL Injection Risk: This server executes any SQL query provided by AI assistants. Ensure:

    • Your Snowflake user has minimal required permissions

    • No admin or elevated privileges for the MCP user

    • Consider using read-only access for sensitive environments

    • Monitor query logs for unexpected operations

  5. Network Security: Ensure proper firewall rules and VPN access if required

Troubleshooting

Common Issues

Environment Variables Not Set:

  • Check .env file format (no quotes, no spaces around =)

  • Set variables in shell profile for global access

Connection Errors:

  • Verify account identifier format (include region if needed)

  • Check network connectivity and warehouse status

  • Verify credentials and permissions

Authentication Failures:

  • For private key: Ensure public key is set in Snowflake

  • For SSO: Test browser login first

  • Check if user account is locked

Path Issues:

  • Use absolute paths in configuration files

  • Verify paths with which uv or which python

Debug Mode

Server Logs:

export MCP_LOG_LEVEL=DEBUG python snowflake_mcp_server.py

Client Logs:

  • Claude Desktop: ~/Library/Logs/Claude/mcp*.log

  • Cursor: Output panel → "MCP Logs"

License

MIT License - see LICENSE file for details.

-
security - not tested
A
license - permissive license
-
quality - not tested

hybrid server

The server is able to function both locally and remotely, depending on the configuration or use case.

Enables AI assistants to securely connect to Snowflake data warehouses and execute SQL queries through natural language interactions. Supports multiple authentication methods and provides formatted query results with built-in security controls.

  1. Key Features
    1. Quick Start
      1. 1. Install
      2. 2. Configure
      3. 3. Test
    2. Configuration
      1. Environment Variables
      2. Private Key Setup (Recommended)
    3. AI Tool Integration
      1. Claude Desktop
      2. Cursor
    4. Example Usage
      1. Security Best Practices
        1. Troubleshooting
          1. Common Issues
          2. Debug Mode
        2. License

          MCP directory API

          We provide all the information about MCP servers via our MCP API.

          curl -X GET 'https://glama.ai/api/mcp/v1/servers/sfc-gh-tjia/snowflake-generic-mcp'

          If you have feedback or need assistance with the MCP directory API, please join our Discord server