Skip to Content

QueryPie SAC

Securely access servers through QueryPie platform’s SAC (Security Access Control).

Key Features

  • Server access through QueryPie SAC (Security Access Control)
  • Permission-based server management
  • Secure server command execution

Basic Information

Authentication Method

Authenticate using QueryPie platform username and password.

Input Parameters

  • Server URL (Required): QueryPie API server URL
  • Username (Required): QueryPie username
  • Password (Required): QueryPie password

Supported MCP Tools

SAC (Security Access Control) Tools

Manage server access through QueryPie’s security access control functionality.

QueryPie SAC MCP only works with Linux-based servers.

list_accessible_server_roles

Retrieve a list of all accessible server roles. You must select a role to use in subsequent commands.

list_accessible_server_groups

Retrieve a list of all accessible server groups.

Input Parameters:

  • roleUuid (Required): Role UUID

list_accessible_servers

Retrieve a list of all accessible servers.

Input Parameters:

  • roleUuid (Required): Role UUID
  • serverGroupUuid (Required): Server group UUID

list_server_accounts

Retrieve a list of server accounts. This is a list of all accounts that can be used to connect to the server.

Input Parameters:

  • roleUuid (Required): Role UUID
  • serverUuid (Required): Server UUID

run_server_command

Execute commands on the server.

Input Parameters:

  • roleUuid (Required): Role UUID
  • host (Required): Server host
  • port (Required): Server port
  • username (Required): Username
  • command (Required): Command to execute

Usage Examples

For example,

  • When you input the prompt “Show me the list of servers accessible through QueryPie”,
  • The LLM will sequentially call list_accessible_server_roles, list_accessible_server_groups, and list_accessible_servers tools through QueryPie SAC MCP, then respond based on the results.

Precautions

  • Keep your QueryPie username and password secure.
  • Maintain security through proper permission settings.
  • Follow your organization’s security policies when accessing servers.
  • Regularly review access logs.
Last updated on