|
1 | | -# About the Replicated Proxy Service |
| 1 | +# About the Replicated Proxy Registry |
2 | 2 |
|
3 | | -This topic describes how the Replicated proxy service can be used to grant proxy access to your application's private images. |
| 3 | +This topic describes how the Replicated proxy registry can be used to grant proxy access to your application's private images. |
4 | 4 |
|
5 | 5 | ## Overview |
6 | 6 |
|
7 | | -If your application images are available in a private image registry exposed to the internet such as Docker Hub or Amazon Elastic Container Registry (ECR), then the Replicated proxy service can grant proxy, or _pull-through_, access to the images without exposing registry credentials to your customers. When you use the proxy service, you do not have to modify the process that you already use to build and push images to deploy your application. |
| 7 | +If your application images are available in a private image registry exposed to the internet such as Docker Hub or Amazon Elastic Container Registry (ECR), then the Replicated proxy registry can grant proxy, or _pull-through_, access to the images without exposing registry credentials to your customers. When you use the proxy registry, you do not have to modify the process that you already use to build and push images to deploy your application. |
8 | 8 |
|
9 | | -To grant proxy access, the proxy service uses the customer licenses that you create in the Replicated vendor portal. This allows you to revoke a customer’s ability to pull private images by editing their license, rather than having to manage image access through separate identity or authentication systems. For example, when a trial license expires, the customer's ability to pull private images is automatically revoked. |
| 9 | +To grant proxy access, the proxy registry uses the customer licenses that you create in the Replicated vendor portal. This allows you to revoke a customer’s ability to pull private images by editing their license, rather than having to manage image access through separate identity or authentication systems. For example, when a trial license expires, the customer's ability to pull private images is automatically revoked. |
10 | 10 |
|
11 | | -The following diagram demonstrates how the proxy service pulls images from your external registry, and how deployed instances of your application pull images from the proxy service: |
| 11 | +The following diagram demonstrates how the proxy registry pulls images from your external registry, and how deployed instances of your application pull images from the proxy registry: |
12 | 12 |
|
13 | | - |
| 13 | + |
14 | 14 |
|
15 | 15 | [View a larger version of this image](/images/private-registry-diagram-large.png) |
16 | 16 |
|
17 | | -## About Enabling the Proxy Service |
| 17 | +## About Enabling the Proxy Registry |
18 | 18 |
|
19 | | -The proxy service requires read-only credentials to your private registry to access your application images. See [Connecting to an External Registry](/vendor/packaging-private-images). |
| 19 | +The proxy registry requires read-only credentials to your private registry to access your application images. See [Connecting to an External Registry](/vendor/packaging-private-images). |
20 | 20 |
|
21 | | -After connecting your registry, the steps the enable the proxy service vary depending on your application deployment method. For more information, see: |
22 | | -* [Using the Proxy Service with KOTS Installations](/vendor/private-images-kots) |
23 | | -* [Using the Proxy Service with Helm Installations](/vendor/helm-image-registry) |
| 21 | +After connecting your registry, the steps the enable the proxy registry vary depending on your application deployment method. For more information, see: |
| 22 | +* [Using the Proxy Registry with KOTS Installations](/vendor/private-images-kots) |
| 23 | +* [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry) |
0 commit comments