Wazuh (SIEM) MCP Server for Google ADKGive Google ADK instant access to 21 tools to Create Agent, Create Security Role, Delete Agents, and more
Google Agent Development Kit (ADK) is Google's framework for building production AI agents. Add Wazuh (SIEM) as an MCP tool provider through Vinkius and your ADK agents can call every tool with full schema introspection.
Ask AI about this MCP Server for Google ADK
The Wazuh (SIEM) MCP Server for Google ADK is a standout in the Fort Knox category — giving your AI agent 21 tools to work with, ready to go from day one.
Vinkius delivers Streamable HTTP and SSE to any MCP client
from google.adk.agents import Agent
from google.adk.tools.mcp_tool import McpToolset
from google.adk.tools.mcp_tool.mcp_session_manager import (
StreamableHTTPConnectionParams,
)
# Your Vinkius token. get it at cloud.vinkius.com
mcp_tools = McpToolset(
connection_params=StreamableHTTPConnectionParams(
url="https://edge.vinkius.com/[YOUR_TOKEN_HERE]/mcp",
)
)
agent = Agent(
model="gemini-2.5-pro",
name="wazuh_siem_agent",
instruction=(
"You help users interact with Wazuh (SIEM) "
"using 21 available tools."
),
tools=[mcp_tools],
)
* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
About Wazuh (SIEM) MCP Server
Connect your Wazuh SIEM to any AI agent to streamline security operations and endpoint monitoring through natural language.
Google ADK natively supports Wazuh (SIEM) as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 21 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.
What you can do
- Agent Management — List all enrolled agents, create new ones, and perform bulk actions like restarts or upgrades using WQL filtering.
- Manager & Cluster Health — Monitor manager daemon status, fetch logs, and inspect cluster nodes to ensure high availability.
- Security Auditing — Query File Integrity Monitoring (Syscheck), Security Configuration Assessment (SCA), and Rootcheck results.
- Threat Intelligence — Access MITRE ATT&CK mappings and test log decoders to validate your detection pipeline.
- Rule Orchestration — List and update rules or decoders directly to fine-tune your security posture.
The Wazuh (SIEM) MCP Server exposes 21 tools through the Vinkius. Connect it to Google ADK in under two minutes — credentials fully managed, no infrastructure to provision, no vendor lock-in. Your configuration, your data, your control.
All 21 Wazuh (SIEM) tools available for Google ADK
When Google ADK connects to Wazuh (SIEM) through Vinkius, your AI agent gets direct access to every tool listed below — spanning siem, threat-detection, vulnerability-management, and more. Every call runs in a secure, isolated environment with full audit visibility. Beyond a simple connection, you get real-time monitoring of agent activity, enterprise governance, and optimized token usage.
Create agent on Wazuh (SIEM)
Enroll a new Wazuh agent
Create security role on Wazuh (SIEM)
Create a new Wazuh security role
Delete agents on Wazuh (SIEM)
Use WQL to specify which agents to delete. Remove Wazuh agents
Get logtest on Wazuh (SIEM)
Test rules and decoders against logs
Get manager logs on Wazuh (SIEM)
Retrieve Wazuh manager logs
Get manager status on Wazuh (SIEM)
Get Wazuh manager daemon status
Get mitre on Wazuh (SIEM)
Supports WQL filtering. Get MITRE ATT&CK results
Get rootcheck on Wazuh (SIEM)
Supports WQL filtering. Get Rootcheck results
Get sca on Wazuh (SIEM)
Supports WQL filtering. Get Security Configuration Assessment (SCA) results
Get syscheck on Wazuh (SIEM)
Supports WQL filtering. Get File Integrity Monitoring (Syscheck) results
Get syscollector on Wazuh (SIEM)
Supports WQL filtering. Get Syscollector inventory
List agents on Wazuh (SIEM)
Supports WQL filtering. List all Wazuh agents
List cluster nodes on Wazuh (SIEM)
List Wazuh cluster nodes
List decoders on Wazuh (SIEM)
Supports WQL filtering. List loaded Wazuh decoders
List rules on Wazuh (SIEM)
Supports WQL filtering. List loaded Wazuh rules
List security users on Wazuh (SIEM)
List Wazuh API users
Restart agents on Wazuh (SIEM)
Restart Wazuh agents
Restart cluster on Wazuh (SIEM)
Restart the Wazuh cluster
Update rule file on Wazuh (SIEM)
Update a Wazuh rule file
Update security config on Wazuh (SIEM)
Update Wazuh security configuration
Upgrade agents on Wazuh (SIEM)
Upgrade Wazuh agents
Connect Wazuh (SIEM) to Google ADK via MCP
Follow these steps to wire Wazuh (SIEM) into Google ADK. The entire setup takes under two minutes — your credentials stay safe behind Vinkius.
Install Google ADK
pip install google-adkReplace the token
[YOUR_TOKEN_HERE] with your Vinkius tokenCreate the agent
Explore tools
Why Use Google ADK with the Wazuh (SIEM) MCP Server
Google ADK provides unique advantages when paired with Wazuh (SIEM) through the Model Context Protocol.
Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution
Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with Wazuh (SIEM)
Production-ready features like session management, evaluation, and deployment come built-in. not bolted on
Seamless integration with Google Cloud services means you can combine Wazuh (SIEM) tools with BigQuery, Vertex AI, and Cloud Functions
Wazuh (SIEM) + Google ADK Use Cases
Practical scenarios where Google ADK combined with the Wazuh (SIEM) MCP Server delivers measurable value.
Enterprise data agents: ADK agents query Wazuh (SIEM) and cross-reference results with internal databases for comprehensive analysis
Multi-modal workflows: combine Wazuh (SIEM) tool responses with Gemini's vision and language capabilities in a single agent
Automated compliance checks: schedule ADK agents to query Wazuh (SIEM) regularly and flag policy violations or configuration drift
Internal tool platforms: build self-service agent platforms where teams connect their own MCP servers including Wazuh (SIEM)
Example Prompts for Wazuh (SIEM) in Google ADK
Ready-to-use prompts you can give your Google ADK agent to start working with Wazuh (SIEM) immediately.
"List all Wazuh agents that are currently active."
"Show me the latest Security Configuration Assessment (SCA) results."
"Check the Wazuh manager logs for any recent errors."
Troubleshooting Wazuh (SIEM) MCP Server with Google ADK
Common issues when connecting Wazuh (SIEM) to Google ADK through Vinkius, and how to resolve them.
McpToolset not found
pip install --upgrade google-adkWazuh (SIEM) + Google ADK FAQ
Common questions about integrating Wazuh (SIEM) MCP Server with Google ADK.
How does Google ADK connect to MCP servers?
Can ADK agents use multiple MCP servers?
Which Gemini models work best with MCP tools?
Explore More MCP Servers
View all →
Scopus
10 toolsAccess the world's largest abstract and citation database. Search for research papers, authors, and institutional profiles directly.

Copernicus Data Space
14 toolsAccess satellite imagery and Earth observation datasets from the EU Copernicus program for environmental and geospatial analysis.

Wistia
9 toolsManage videos, projects, and performance analytics on Wistia with AI agents.

Cashboard
8 toolsManage time tracking, invoicing, and projects via Cashboard — track expenses, send estimates, and monitor client billing directly from any AI agent.
