Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 9 additions & 8 deletions docs/toolhive/guides-mcp/context7.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description:
Using the Context7 MCP server with ToolHive for up-to-date documentation.
last_update:
author: danbarr
date: 2025-10-08
date: 2026-02-10
---

## Overview
Expand Down Expand Up @@ -44,9 +44,9 @@ While Context7 works without an API key, registering at

**Remote MCP server**

Select the `context7-remote` MCP server in the ToolHive registry. Currently,
ToolHive doesn't support adding custom headers for remote MCP servers, so using
the remote server is limited to basic usage without an API key.
If you have a Context7 account, you can select the `context7-remote` MCP server
to connect to the hosted service with dynamic OAuth authentication. Your browser
will open to authorize the server to access your Context7 account.

**Local MCP server**

Expand All @@ -65,15 +65,16 @@ the server's network access using the default profile contained in the registry.
</TabItem>
<TabItem value='cli' label='CLI'>

For basic (unauthenticated) usage, you can connect directly to Context7's public
MCP server:
If you have a Context7 account, you can run the remote MCP server with dynamic
OAuth authentication. Your browser will open to authorize the server to access
your Context7 account.

```bash
thv run context7-remote
```

Alternatively, run the local containerized MCP server with the default
configuration (no API key required for basic usage):
configuration (you don't need an API key for basic usage):

```bash
thv run context7
Expand Down Expand Up @@ -124,7 +125,7 @@ kubectl apply -f context7.yaml
```

If you have a Context7 API key for higher rate limits, create a Kubernetes
secret containing your Context7 API key:
secret containing your key:

```bash
kubectl -n toolhive-system create secret generic context7-api-key --from-literal=token=<YOUR_TOKEN>
Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-mcp/fetch.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ sidebar_label: Fetch
description: Using the Fetch MCP server with ToolHive to retrieve website data.
last_update:
author: danbarr
date: 2025-10-07
date: 2026-02-10
---

## Overview
Expand Down
4 changes: 2 additions & 2 deletions docs/toolhive/guides-mcp/filesystem.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ sidebar_label: Filesystem
description: Using the Filesystem MCP server with ToolHive for file access.
last_update:
author: danbarr
date: 2025-08-15
date: 2026-02-10
---

import useBaseUrl from '@docusaurus/useBaseUrl';
Expand Down Expand Up @@ -121,7 +121,7 @@ metadata:
name: filesystem
namespace: toolhive-system
spec:
image: mcp/filesystem:latest
image: mcp/filesystem:1.0.2
transport: stdio
proxyPort: 8080
args:
Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-mcp/github.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description:
Using the GitHub MCP server with ToolHive for repository management.
last_update:
author: danbarr
date: 2025-10-07
date: 2026-02-10
---

## Overview
Expand Down
16 changes: 10 additions & 6 deletions docs/toolhive/guides-mcp/grafana.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description:
datasource queries, alerting, and incident response.
last_update:
author: danbarr
date: 2025-11-06
date: 2026-02-10
---

## Overview
Expand Down Expand Up @@ -140,7 +140,8 @@ kubectl -n toolhive-system create secret generic grafana-token \
```

Create a Kubernetes manifest to deploy the Grafana MCP server, specifying your
Grafana instance URL and referencing the secret:
Grafana instance URL and referencing the secret. This example uses a Grafana
instance running in an `observability` namespace in the cluster:

```yaml title="grafana.yaml"
apiVersion: toolhive.stacklok.dev/v1alpha1
Expand All @@ -149,13 +150,16 @@ metadata:
name: grafana
namespace: toolhive-system
spec:
image: docker.io/mcp/grafana:latest
transport: sse
image: docker.io/grafana/mcp-grafana:0.9.0
transport: streamable-http
mcpPort: 8000
proxyPort: 8080
args:
- --transport
- streamable-http
env:
- name: GRAFANA_URL
value: 'http://localhost:3000'
value: 'http://grafana.observability.svc.cluster.local:3000'
secrets:
- name: grafana-token
key: token
Expand Down Expand Up @@ -184,7 +188,7 @@ environment variable with the numeric organization ID:
spec:
env:
- name: GRAFANA_URL
value: 'http://localhost:3000'
value: 'http://grafana.observability.svc.cluster.local:3000'
- name: GRAFANA_ORG_ID
value: '2'
```
Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-mcp/k8s.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description:
Using the Kubernetes (MKP) MCP server with ToolHive for cluster management.
last_update:
author: danbarr
date: 2025-10-07
date: 2026-02-10
---

## Overview
Expand Down
6 changes: 3 additions & 3 deletions docs/toolhive/guides-mcp/notion-remote.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description:
workspace.
last_update:
author: danbarr
date: 2025-10-07
date: 2026-02-10
---

## Overview
Expand Down Expand Up @@ -84,8 +84,8 @@ thv restart notion-remote

:::note

The ToolHive Kubernetes operator does not currently support remote MCP servers.
Instead, you can run the
The ToolHive Kubernetes operator does not currently support remote MCP servers
using dynamic OAuth authentication. Instead, you can run the
[local Notion MCP server](https://github.com/makenotion/notion-mcp-server) in
Kubernetes using a static integration key.

Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-mcp/osv.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description:
Using the Open Source Vulnerabilities database (OSV) MCP server with ToolHive.
last_update:
author: danbarr
date: 2025-09-02
date: 2026-02-10
---

## Overview
Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-mcp/playwright.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description:
Using the Playwright MCP server with ToolHive for browser automation.
last_update:
author: danbarr
date: 2025-10-07
date: 2026-02-10
---

import useBaseUrl from '@docusaurus/useBaseUrl';
Expand Down