Skip to main content

Unofficial MCP server for HPE Aruba Networking Central

Project description

central-mcp-server

PyPI - Python Version PyPI - License Ruff

Community MCP server for HPE Aruba Networking Central. This exposes your Central data as tools that AI assistants can query directly.


WARNING - Unofficial Community Project

This is not an officially supported product of HPE. It is provided as-is, with no warranty or guarantee of fitness for any purpose.

  • Review your organization's corporate device and data policies before connecting this server to any AI assistant.
  • Never share credentials (API secrets, API keys) with AI model providers unless your security policy explicitly permits it.
  • All read operations query live data from your HPE Aruba Networking Central instance. Recommended to test MCP server use in non-production or lab environments where possible before running on production.

Overview

central-mcp-server wraps Central REST APIs and exposes them as MCP (Model Context Protocol) tools. Once configured, AI assistants like Claude or GitHub Copilot can answer questions like:

  • "Which sites have poor health scores right now?"
  • "Show me all failed wireless clients at HQ in the last 24 hours."
  • "Show me all online access points at the Chicago office."
  • "What events happened on switch SW-CORE-01 yesterday?"

See the full overview guide for a deeper look at capabilities, limitations, and how the server works.


Getting Started

Getting Your Credentials

You need three values to connect this server to Central's REST APIs: CENTRAL_BASE_URL, CENTRAL_CLIENT_ID, and CENTRAL_CLIENT_SECRET.

API Gateway Base URL (CENTRAL_BASE_URL)

The API gateway base URL for your Central account (e.g. https://us5.api.central.arubanetworks.com).

For instructions on how to locate your base URL, see Finding Your Base URL in Central.

API Client Credentials (CENTRAL_CLIENT_ID & CENTRAL_CLIENT_SECRET)

OAuth credentials created through the HPE GreenLake Platform:

  1. Log in to your HPE GreenLake account and open Manage Workspace.
  2. Click Personal API clients.
  3. Click Create Personal API client.
  4. Give it a nickname (e.g. central-mcp-server) and select your HPE Aruba Networking Central instance from the service dropdown.
  5. Click Create personal API client.
  6. Copy both the Client ID and Client Secret immediately. The platform does not store the secret and it cannot be retrieved later.

Full guide: Generating and Managing Access Tokens


Installation

Install uv if you haven't already — it's the only prerequisite.

Using an MCP client (Claude Desktop, Claude Code, GitHub Copilot)? No install command needed. Jump to MCP Client Configuration — the client fetches and runs the server automatically via uvx.

Want the server as a persistent CLI tool on your PATH?

uv tool install --prerelease=allow central-mcp-server

--prerelease=allow is required because this server depends on pycentral, which currently only has a pre-release version on PyPI. uv skips pre-releases by default.

See the full setup guide for prerequisites, troubleshooting, and step-by-step instructions.


MCP Client Configuration

Replace the placeholder values with your actual credentials in all examples below.

Optional: Code Mode Transform (DYNAMIC_TOOLS)

DYNAMIC_TOOLS is optional and only affects startup behavior:

  • Code Mode is enabled only when DYNAMIC_TOOLS is set to true (case-insensitive).
  • Code Mode is disabled when DYNAMIC_TOOLS is not set or set to any other value.
  • Variable name is strict: use DYNAMIC_TOOLS (plural). DYNAMIC_TOOL is ignored.

When enabled, the server starts with CodeMode() and exposes Code Mode meta-tools to the client. When disabled, the server runs without the transform and exposes the normal registered tool catalog directly. Recommended to use CodeMode() when you have multiple MCP servers running to preserve your context window.

Claude Desktop

Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or %APPDATA%\Claude\claude_desktop_config.json (Windows):

{
  "mcpServers": {
    "central-mcp": {
      "command": "uvx",
      "args": ["--prerelease=allow", "central-mcp-server"],
      "env": {
        "CENTRAL_BASE_URL": "your-central-base-url",
        "CENTRAL_CLIENT_ID": "your-client-id",
        "CENTRAL_CLIENT_SECRET": "your-client-secret"
      }
    }
  }
}

See the Claude Desktop setup guide for full steps and troubleshooting.

Claude Code

claude mcp add central-mcp \
  -e CENTRAL_BASE_URL=your-central-base-url \
  -e CENTRAL_CLIENT_ID=your-client-id \
  -e CENTRAL_CLIENT_SECRET=your-client-secret \
  -- uvx --prerelease=allow central-mcp-server

See the Claude Code setup guide for full steps and troubleshooting.

GitHub Copilot (VS Code)

Add .vscode/mcp.json to your workspace root and add that path to .gitignore to keep credentials out of version control:

{
  "servers": {
    "central-mcp": {
      "type": "stdio",
      "command": "uvx",
      "args": ["--prerelease=allow", "central-mcp-server"],
      "env": {
        "CENTRAL_BASE_URL": "your-central-base-url",
        "CENTRAL_CLIENT_ID": "your-client-id",
        "CENTRAL_CLIENT_SECRET": "your-client-secret"
      }
    }
  }
}

Add to .gitignore:

.vscode/mcp.json

See the GitHub CoPilot setup guide for full steps and troubleshooting.


What You Can Ask

Once connected, you can ask your AI assistant questions like:

  • "Give me a health overview of all sites."
  • "Which sites are in poor health right now?"
  • "Show me all access points at the Chicago office."
  • "What critical alerts are active across the network?"
  • "Find all failed wireless clients at HQ in the last 24 hours."
  • "What events happened on switch SW-CORE-01 yesterday?"

See Central MCP Server in Action for real query examples across all supported clients.

Tools

Sites

Tool Description
central_get_sites Detailed health metrics for one or more sites (device/client/alert counts, health score)
central_get_summary Lightweight mapping of all site names to IDs and health scores

Devices

Tool Description
central_get_devices Filtered list of devices — filter by type, site, model, serial number, and more
central_find_device Look up a single device by serial number or device name

AP Monitoring

Tool Description
central_get_aps Filtered list of access points — filter by site, serial number, status, model, firmware version, deployment, or cluster
central_get_ap_statistics AP CPU, memory, and power statistics for a given AP serial number within a selected time window

WLAN

Tool Description
central_get_wlans Configured WLANs (SSIDs) with optional filtering by WLAN name, site, and sort fields
central_get_wlan_stats Throughput trend samples (tx/rx bps) for a specific WLAN over a selected time window

Clients

Tool Description
central_get_clients Filtered list of clients — filter by connection type, status, VLAN, WLAN, and more
central_find_client Look up a single client by MAC address

Alerts

Tool Description
central_get_alerts Active, cleared, or deferred alerts for a site — filter by device type or category

Events

Tool Description
central_get_events Events for a site, device, or client within a time window
central_get_events_count Event count breakdown by type with response_mode="full" (counts) or response_mode="compact" (ranked event id/name pairs + lists)

LLM Workflow for Events

Use this sequence for faster, lower-token event investigations:

  1. For site-level queries, call events tools with site_id only.
  2. For device/client queries, pass site_id plus context_type and context_identifier.
  3. Call central_get_events_count with response_mode="compact" to get ranked event_names (each with event_id + event_name), source_types, and categories.
  4. Pick the top category/source/event name as your likely starting point.
  5. Call central_get_events with targeted filters (category, source_type, and/or event_id) to fetch detailed records.
  6. Use central_get_events_count with response_mode="full" only when exact per-item counts are required.

Guided Prompts

The server includes 12 built-in prompts to help AI assistants run common workflows:

Prompt Description
network_health_overview Full network health overview across all sites
troubleshoot_site Deep-dive troubleshooting for a specific site
client_connectivity_check Investigate connectivity status for a client by MAC address
investigate_device_events Review recent events for a specific device
site_event_summary Summarize all events at a site within a time window
failed_clients_investigation Find and diagnose all failed clients at a site
site_client_overview Overview of client connectivity at a site
device_type_health Health check for all devices of a specific type at a site
top_event_drivers Identify dominant event drivers at a site and pull supporting evidence
critical_alerts_review Review all active critical alerts across the network
wlan_health_check Assess WLAN health using client failures and related events over a time window
compare_site_health Compare health metrics side-by-side across multiple sites

Dev Setup

git clone <Github Server URL>
cd central-mcp-server

Create and activate a virtual environment, then install dependencies:

python3 -m venv .venv
source .venv/bin/activate
uv sync

Create .env with your credentials:

CENTRAL_BASE_URL=your-central-base-url
CENTRAL_CLIENT_ID=your-client-id
CENTRAL_CLIENT_SECRET=your-client-secret

Run the server:

python3 server.py

To install and test the package locally before publishing:

uv tool install .

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

central_mcp_server-0.1.4.1.tar.gz (175.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

central_mcp_server-0.1.4.1-py3-none-any.whl (44.0 kB view details)

Uploaded Python 3

File details

Details for the file central_mcp_server-0.1.4.1.tar.gz.

File metadata

  • Download URL: central_mcp_server-0.1.4.1.tar.gz
  • Upload date:
  • Size: 175.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for central_mcp_server-0.1.4.1.tar.gz
Algorithm Hash digest
SHA256 6c03f1bbf555795f2fcccc737da107f4627cb42dd6b177830718142af8309024
MD5 ee88a363e0efae831d83954595a7bf70
BLAKE2b-256 710091be4208b72b83f7c0065ad3b3719f6bd92fd83d72a501e4dfd1d3ba55ef

See more details on using hashes here.

Provenance

The following attestation bundles were made for central_mcp_server-0.1.4.1.tar.gz:

Publisher: publish-release.yml on KarthikSKumar98/central-mcp-server

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file central_mcp_server-0.1.4.1-py3-none-any.whl.

File metadata

File hashes

Hashes for central_mcp_server-0.1.4.1-py3-none-any.whl
Algorithm Hash digest
SHA256 cd416d2e623d0b4769fda59347f4e95b042f2cb12855de8051f007f96157a790
MD5 22baf6f5b41d2ffeb4b85ef707579bcf
BLAKE2b-256 f2d3681b1f9b29f079d0560e165454b411a1c474d4672fbc4ac0cd9c1997e06d

See more details on using hashes here.

Provenance

The following attestation bundles were made for central_mcp_server-0.1.4.1-py3-none-any.whl:

Publisher: publish-release.yml on KarthikSKumar98/central-mcp-server

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page