Official Splunk integration β query observability data, alerts, and incident context through AI
The official Splunk MCP server gives AI agents access to observability and security data stored in Splunk. It can search logs, inspect alerts, and correlate incidents with operational data. Features: - Run Splunk queries and retrieve event results - Inspect logs, metrics, and traces across services - Access alert and incident timelines - Search dashboards and saved searches - Manage Splunk apps and data inputs - Correlate security and operational events Splunk MCP is ideal for SRE and SecOps teams that need AI to triage incidents and surface root causes from large datasets.
File location: ~/Library/Application Support/Claude/claude_desktop_config.json
{
"splunkMcp": {
"command": "npx",
"args": [
"-y",
"@splunk/mcp"
],
"env": {
"SPLUNK_HEC_URL": "https://instance.splunkcloud.com",
"SPLUNK_TOKEN": "..."
}
}
}If you maintain Splunk MCP, add this badge to your README to show it's verified on CuratedMCP:
[](https://curatedmcp.com/marketplace/splunk-mcp)
Grafana MCP
Official Grafana integration β query dashboards, explore metrics, and manage alerts via AI
Vercel MCP
Official Vercel integration β manage deployments, logs, env vars, and projects from your AI agent
Sentry MCP
Official Sentry integration β bring live error context, stack traces, and performance data into your AI