File tree Expand file tree Collapse file tree 1 file changed +7
-5
lines changed Expand file tree Collapse file tree 1 file changed +7
-5
lines changed Original file line number Diff line number Diff line change @@ -6,11 +6,13 @@ description:
66---
77
88This tutorial shows how to integrate HashiCorp Vault with the ToolHive
9- Kubernetes Operator to securely manage secrets for your MCP servers. Using
10- Vault's Agent Injector, you can automatically provision secrets into MCP server
11- pods without exposing sensitive data in your Kubernetes manifests.
9+ Kubernetes Operator to securely manage secrets for your MCP servers. Using the
10+ [ Vault Agent Injector] ( https://developer.hashicorp.com/vault/docs/deploy/kubernetes/injector ) ,
11+ you can automatically provision secrets into MCP server pods without exposing
12+ sensitive data in your Kubernetes manifests.
1213
13- As an example, we'll be deploying a GitHub MCP server.
14+ To demonstrate this integration, you will deploy a GitHub MCP server that
15+ retrieves a GitHub personal access token (PAT) from Vault.
1416
1517:::info[ Prerequisites]
1618
@@ -255,7 +257,7 @@ MCP_POD_NAME=$(kubectl get pods -ntoolhive-system \
255257 -ojsonpath='{.items[0].metadata.name}')
256258
257259# Verify the Vault Agent wrote the secret file
258- kubectl exec -n toolhive-system "$PROXY_POD_NAME" -c toolhive -- \
260+ kubectl exec -n toolhive-system "$PROXY_POD_NAME" -c vault-agent -- \
259261 cat /vault/secrets/github-config
260262
261263# Check that the environment variable is available to the MCP server
You can’t perform that action at this time.
0 commit comments