File tree Expand file tree Collapse file tree 1 file changed +14
-1
lines changed
content/en/docs/concepts/containers Expand file tree Collapse file tree 1 file changed +14
-1
lines changed Original file line number Diff line number Diff line change @@ -458,9 +458,22 @@ common use cases and suggested solutions.
458
458
459
459
If you need access to multiple registries, you can create one secret for each registry.
460
460
461
+ ## Legacy built-in kubelet credential provider
462
+
463
+ In older versions of Kubernetes, the kubelet had a direct integration with cloud provider credentials.
464
+ This gave it the ability to dynamically fetch credentials for image registries.
465
+
466
+ There were three built-in implementations of the kubelet credential provider integration:
467
+ ACR (Azure Container Registry), ECR (Elastic Container Registry), and GCR (Google Container Registry).
468
+
469
+ For more information on the legacy mechanism, read the documentation for the version of Kubenetes that you
470
+ are using. Kubernetes v1.26 through to v{{< skew latestVersion >}} do not include the legacy mechanism, so
471
+ you would need to either:
472
+ - configure a kubelet image credential provider on each node
473
+ - specify image pull credentials using ` imagePullSecrets ` and at least one Secret
474
+
461
475
## {{% heading "whatsnext" %}}
462
476
463
477
* Read the [ OCI Image Manifest Specification] ( https://github.com/opencontainers/image-spec/blob/master/manifest.md ) .
464
478
* Learn about [ container image garbage collection] ( /docs/concepts/architecture/garbage-collection/#container-image-garbage-collection ) .
465
479
* Learn more about [ pulling an Image from a Private Registry] ( /docs/tasks/configure-pod-container/pull-image-private-registry ) .
466
-
You can’t perform that action at this time.
0 commit comments