This repository demonstrates how to build agentic workflows using two MCP servers to detect and reverse configuration drift in a Meraki network. The system utilizes:
- A Splunk MCP Agent to detect network changes. Credit to William Searle for the Splunk MCP Server.
- A Meraki MCP Agent to reverse unauthorized changes.
Agentic AI handles both detection and remediation based on natural language prompts—no hardcoded orchestration required.
- You ask: “What changed in my Meraki network?”
- The Splunk MCP Agent queries Splunk using its SDK and returns configuration drift.
- The Meraki MCP Agent compares the change to the source of truth and calls the appropriate Meraki API to reverse it.
- Python 3.10 or higher
- Access to:
- A Splunk instance with relevant logs
- A Meraki Dashboard API key
- Claude Desktop or any MCP-compatible client
claude_desktop_config.jsonconfigured with correct tool registration and MCP server paths
Clone the repository:
git clone https://github.com/kiskander/mcp-splunk-meraki.git
cd mcp-splunk-merakifor more Splunk MCP installation options checkout: https://github.com/livehybrid/splunk-mcp
-
Access Splunk MCP:
cd mcp-splunk-meraki/SplunkMCP -
Install dependencies using Poetry:
poetry install
-
Configure environment variables:
Copy the example environment file and update it with your Splunk credentials:
cp .env.example .env
Update the
.envfile with the following:SPLUNK_HOST=your_splunk_host SPLUNK_PORT=8089 SPLUNK_USERNAME=your_username SPLUNK_PASSWORD=your_password SPLUNK_SCHEME=https VERIFY_SSL=true FASTMCP_LOG_LEVEL=INFO SERVER_MODE=stdio
-
Run the Splunk MCP:
poetry run python splunk_mcp.py stdio
-
Install
uv(if not already installed):For macOS/Linux:
brew install uv
-
Set Up Your Meraki MCP Project:
cd mcp-splunk-meraki/MerakiMCP -
Install dependencies using
uv:uv init uv venv source .venv/bin/activate # or .venv\Scripts\activate on Windows uv add "mcp[cli]" uv add "meraki"
-
Run the Meraki MCP Agent:
python meraki_mcp.py