Skip to content

Commit 2135920

Browse files
authored
we should call this the "proxy registry" instead of "proxy service"
to be more accurate and specific about what this proxy is doing
1 parent 5d39743 commit 2135920

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed
Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
1-
# About the Replicated Proxy Service
1+
# About the Replicated Proxy Registry
22

3-
This topic describes how the Replicated proxy service can be used to grant proxy access to your application's private images.
3+
This topic describes how the Replicated proxy registry can be used to grant proxy access to your application's private images.
44

55
## Overview
66

7-
If your application images are available in a private image registry exposed to the internet such as Docker Hub or Amazon Elastic Container Registry (ECR), then the Replicated proxy service can grant proxy, or _pull-through_, access to the images without exposing registry credentials to your customers. When you use the proxy service, you do not have to modify the process that you already use to build and push images to deploy your application.
7+
If your application images are available in a private image registry exposed to the internet such as Docker Hub or Amazon Elastic Container Registry (ECR), then the Replicated proxy registry can grant proxy, or _pull-through_, access to the images without exposing registry credentials to your customers. When you use the proxy registry, you do not have to modify the process that you already use to build and push images to deploy your application.
88

9-
To grant proxy access, the proxy service uses the customer licenses that you create in the Replicated vendor portal. This allows you to revoke a customer’s ability to pull private images by editing their license, rather than having to manage image access through separate identity or authentication systems. For example, when a trial license expires, the customer's ability to pull private images is automatically revoked.
9+
To grant proxy access, the proxy registry uses the customer licenses that you create in the Replicated vendor portal. This allows you to revoke a customer’s ability to pull private images by editing their license, rather than having to manage image access through separate identity or authentication systems. For example, when a trial license expires, the customer's ability to pull private images is automatically revoked.
1010

11-
The following diagram demonstrates how the proxy service pulls images from your external registry, and how deployed instances of your application pull images from the proxy service:
11+
The following diagram demonstrates how the proxy registry pulls images from your external registry, and how deployed instances of your application pull images from the proxy registry:
1212

13-
![Proxy service workflow diagram](/images/private-registry-diagram.png)
13+
![Proxy registry workflow diagram](/images/private-registry-diagram.png)
1414

1515
[View a larger version of this image](/images/private-registry-diagram-large.png)
1616

17-
## About Enabling the Proxy Service
17+
## About Enabling the Proxy Registry
1818

19-
The proxy service requires read-only credentials to your private registry to access your application images. See [Connecting to an External Registry](/vendor/packaging-private-images).
19+
The proxy registry requires read-only credentials to your private registry to access your application images. See [Connecting to an External Registry](/vendor/packaging-private-images).
2020

21-
After connecting your registry, the steps the enable the proxy service vary depending on your application deployment method. For more information, see:
22-
* [Using the Proxy Service with KOTS Installations](/vendor/private-images-kots)
23-
* [Using the Proxy Service with Helm Installations](/vendor/helm-image-registry)
21+
After connecting your registry, the steps the enable the proxy registry vary depending on your application deployment method. For more information, see:
22+
* [Using the Proxy Registry with KOTS Installations](/vendor/private-images-kots)
23+
* [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry)

0 commit comments

Comments
 (0)