Skip to content

Commit ed46692

Browse files
committed
Fix container name for verification step
Signed-off-by: Dan Barr <[email protected]>
1 parent b9dc6b8 commit ed46692

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

docs/toolhive/tutorials/vault-integration.mdx

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,13 @@ description:
66
---
77

88
This tutorial shows how to integrate HashiCorp Vault with the ToolHive
9-
Kubernetes Operator to securely manage secrets for your MCP servers. Using
10-
Vault's Agent Injector, you can automatically provision secrets into MCP server
11-
pods without exposing sensitive data in your Kubernetes manifests.
9+
Kubernetes Operator to securely manage secrets for your MCP servers. Using the
10+
[Vault Agent Injector](https://developer.hashicorp.com/vault/docs/deploy/kubernetes/injector),
11+
you can automatically provision secrets into MCP server pods without exposing
12+
sensitive data in your Kubernetes manifests.
1213

13-
As an example, we'll be deploying a GitHub MCP server.
14+
To demonstrate this integration, you will deploy a GitHub MCP server that
15+
retrieves a GitHub personal access token (PAT) from Vault.
1416

1517
:::info[Prerequisites]
1618

@@ -255,7 +257,7 @@ MCP_POD_NAME=$(kubectl get pods -ntoolhive-system \
255257
-ojsonpath='{.items[0].metadata.name}')
256258
257259
# Verify the Vault Agent wrote the secret file
258-
kubectl exec -n toolhive-system "$PROXY_POD_NAME" -c toolhive -- \
260+
kubectl exec -n toolhive-system "$PROXY_POD_NAME" -c vault-agent -- \
259261
cat /vault/secrets/github-config
260262
261263
# Check that the environment variable is available to the MCP server

0 commit comments

Comments
 (0)