4,000+ servers built on vurb.ts
Vinkius

Wazuh (SIEM) MCP Server for Google ADKGive Google ADK instant access to 21 tools to Create Agent, Create Security Role, Delete Agents, and more

MCP Inspector GDPR Free for Subscribers

Google Agent Development Kit (ADK) is Google's framework for building production AI agents. Add Wazuh (SIEM) as an MCP tool provider through Vinkius and your ADK agents can call every tool with full schema introspection.

Ask AI about this MCP Server for Google ADK

The Wazuh (SIEM) MCP Server for Google ADK is a standout in the Fort Knox category — giving your AI agent 21 tools to work with, ready to go from day one.

Built for AI Agents by Vinkius

Vinkius delivers Streamable HTTP and SSE to any MCP client

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
python
from google.adk.agents import Agent
from google.adk.tools.mcp_tool import McpToolset
from google.adk.tools.mcp_tool.mcp_session_manager import (
    StreamableHTTPConnectionParams,
)

# Your Vinkius token. get it at cloud.vinkius.com
mcp_tools = McpToolset(
    connection_params=StreamableHTTPConnectionParams(
        url="https://edge.vinkius.com/[YOUR_TOKEN_HERE]/mcp",
    )
)

agent = Agent(
    model="gemini-2.5-pro",
    name="wazuh_siem_agent",
    instruction=(
        "You help users interact with Wazuh (SIEM) "
        "using 21 available tools."
    ),
    tools=[mcp_tools],
)
Wazuh (SIEM)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

About Wazuh (SIEM) MCP Server

Connect your Wazuh SIEM to any AI agent to streamline security operations and endpoint monitoring through natural language.

Google ADK natively supports Wazuh (SIEM) as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 21 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.

What you can do

  • Agent Management — List all enrolled agents, create new ones, and perform bulk actions like restarts or upgrades using WQL filtering.
  • Manager & Cluster Health — Monitor manager daemon status, fetch logs, and inspect cluster nodes to ensure high availability.
  • Security Auditing — Query File Integrity Monitoring (Syscheck), Security Configuration Assessment (SCA), and Rootcheck results.
  • Threat Intelligence — Access MITRE ATT&CK mappings and test log decoders to validate your detection pipeline.
  • Rule Orchestration — List and update rules or decoders directly to fine-tune your security posture.

The Wazuh (SIEM) MCP Server exposes 21 tools through the Vinkius. Connect it to Google ADK in under two minutes — credentials fully managed, no infrastructure to provision, no vendor lock-in. Your configuration, your data, your control.

All 21 Wazuh (SIEM) tools available for Google ADK

When Google ADK connects to Wazuh (SIEM) through Vinkius, your AI agent gets direct access to every tool listed below — spanning siem, threat-detection, vulnerability-management, and more. Every call runs in a secure, isolated environment with full audit visibility. Beyond a simple connection, you get real-time monitoring of agent activity, enterprise governance, and optimized token usage.

create

Create agent on Wazuh (SIEM)

Enroll a new Wazuh agent

create

Create security role on Wazuh (SIEM)

Create a new Wazuh security role

delete

Delete agents on Wazuh (SIEM)

Use WQL to specify which agents to delete. Remove Wazuh agents

get

Get logtest on Wazuh (SIEM)

Test rules and decoders against logs

get

Get manager logs on Wazuh (SIEM)

Retrieve Wazuh manager logs

get

Get manager status on Wazuh (SIEM)

Get Wazuh manager daemon status

get

Get mitre on Wazuh (SIEM)

Supports WQL filtering. Get MITRE ATT&CK results

get

Get rootcheck on Wazuh (SIEM)

Supports WQL filtering. Get Rootcheck results

get

Get sca on Wazuh (SIEM)

Supports WQL filtering. Get Security Configuration Assessment (SCA) results

get

Get syscheck on Wazuh (SIEM)

Supports WQL filtering. Get File Integrity Monitoring (Syscheck) results

get

Get syscollector on Wazuh (SIEM)

Supports WQL filtering. Get Syscollector inventory

list

List agents on Wazuh (SIEM)

Supports WQL filtering. List all Wazuh agents

list

List cluster nodes on Wazuh (SIEM)

List Wazuh cluster nodes

list

List decoders on Wazuh (SIEM)

Supports WQL filtering. List loaded Wazuh decoders

list

List rules on Wazuh (SIEM)

Supports WQL filtering. List loaded Wazuh rules

list

List security users on Wazuh (SIEM)

List Wazuh API users

restart

Restart agents on Wazuh (SIEM)

Restart Wazuh agents

restart

Restart cluster on Wazuh (SIEM)

Restart the Wazuh cluster

update

Update rule file on Wazuh (SIEM)

Update a Wazuh rule file

update

Update security config on Wazuh (SIEM)

Update Wazuh security configuration

upgrade

Upgrade agents on Wazuh (SIEM)

Upgrade Wazuh agents

Connect Wazuh (SIEM) to Google ADK via MCP

Follow these steps to wire Wazuh (SIEM) into Google ADK. The entire setup takes under two minutes — your credentials stay safe behind Vinkius.

01

Install Google ADK

Run pip install google-adk
02

Replace the token

Replace [YOUR_TOKEN_HERE] with your Vinkius token
03

Create the agent

Save the code above and integrate into your ADK workflow
04

Explore tools

The agent will discover 21 tools from Wazuh (SIEM) via MCP

Why Use Google ADK with the Wazuh (SIEM) MCP Server

Google ADK provides unique advantages when paired with Wazuh (SIEM) through the Model Context Protocol.

01

Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution

02

Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with Wazuh (SIEM)

03

Production-ready features like session management, evaluation, and deployment come built-in. not bolted on

04

Seamless integration with Google Cloud services means you can combine Wazuh (SIEM) tools with BigQuery, Vertex AI, and Cloud Functions

Wazuh (SIEM) + Google ADK Use Cases

Practical scenarios where Google ADK combined with the Wazuh (SIEM) MCP Server delivers measurable value.

01

Enterprise data agents: ADK agents query Wazuh (SIEM) and cross-reference results with internal databases for comprehensive analysis

02

Multi-modal workflows: combine Wazuh (SIEM) tool responses with Gemini's vision and language capabilities in a single agent

03

Automated compliance checks: schedule ADK agents to query Wazuh (SIEM) regularly and flag policy violations or configuration drift

04

Internal tool platforms: build self-service agent platforms where teams connect their own MCP servers including Wazuh (SIEM)

Example Prompts for Wazuh (SIEM) in Google ADK

Ready-to-use prompts you can give your Google ADK agent to start working with Wazuh (SIEM) immediately.

01

"List all Wazuh agents that are currently active."

02

"Show me the latest Security Configuration Assessment (SCA) results."

03

"Check the Wazuh manager logs for any recent errors."

Troubleshooting Wazuh (SIEM) MCP Server with Google ADK

Common issues when connecting Wazuh (SIEM) to Google ADK through Vinkius, and how to resolve them.

01

McpToolset not found

Update: pip install --upgrade google-adk

Wazuh (SIEM) + Google ADK FAQ

Common questions about integrating Wazuh (SIEM) MCP Server with Google ADK.

01

How does Google ADK connect to MCP servers?

Import the MCP toolset class and pass the server URL. ADK discovers and registers all tools automatically, making them available to your agent's tool-use loop.
02

Can ADK agents use multiple MCP servers?

Yes. Declare multiple MCP tool providers in your agent configuration. ADK merges all tool schemas and the agent can call tools from any server in a single turn.
03

Which Gemini models work best with MCP tools?

Gemini 2.0 Flash and Pro models both support function calling required for MCP tools. Flash is recommended for latency-sensitive use cases, Pro for complex reasoning.

Explore More MCP Servers

View all →