Required Configuration
Base URL
The URL of your SnackBase backend instance:For local development, use:
http://localhost:8000API Key
Your API key for authentication:sb_ak.<payload>.<signature> where:
sb_akidentifies this as a SnackBase API keypayloadcontains encoded metadata (account, permissions, expiry)signatureverifies the key’s authenticity
Optional Configuration
Account ID (Multi-Tenant)
If your API key has access to multiple accounts, specify which one to use:If not specified, the MCP server will use the API key’s default account.
Timeout
Request timeout in milliseconds (default: 30000ms):Debug Mode
Enable debug logging for troubleshooting:- Incoming tool calls
- SDK requests
- Response times
- Error details
Configuration Examples
Local Development
Production (Self-Hosted)
SnackBase Cloud
Claude Code Configuration
To use the MCP server with Claude Code, add it to your Claude configuration:Locate Your Config
The Claude Code configuration file is at:- macOS/Linux:
~/.claude/settings.json - Windows:
%APPDATA%\claude\settings.json
Add MCP Server
Add the MCP server to themcpServers section:
Multiple Instances
If you need to connect to multiple SnackBase instances:Cursor Configuration
For Cursor IDE, the configuration is similar but in a different location:Locate Your Config
- macOS/Linux:
~/.cursor/settings.json - Windows:
%APPDATA%\cursor\settings.json
Add MCP Server
Troubleshooting
Connection Errors
If you see connection errors:- Verify the URL is correct and accessible
- Check your API key is valid and not expired
- Ensure the backend is running (for self-hosted)
- Test with curl:
Permission Errors
If you get permission errors:- Verify the API key has the required permissions
- Check the account the API key belongs to
- Review collection rules if accessing specific collections
Debug Mode
Enable debug mode to see detailed logs:Security Best Practices
API Key Management
- Use separate keys for different environments
- Rotate keys regularly (e.g., every 90 days)
- Use minimal permissions - only grant what’s needed
- Monitor usage via audit logs
- Revoke compromised keys immediately
Environment Isolation
- Never use production keys in development
- Use different API keys for different applications
- Document key purposes in key names
Audit Trail
Monitor MCP server usage via the audit logs:Next Steps
- Integration Guide - Use with Claude Code and other clients
- Tools Reference - Detailed documentation for each tool