You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/vendor/helm-image-registry.mdx
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,29 +4,29 @@ import RewriteHelmValues from "../partials/proxy-service/_step-rewrite-helm-valu
4
4
5
5
# Use the Proxy Registry with Helm Installations
6
6
7
-
This topic describes how to use the Replicated proxy registry to proxy images for installations with the Helm CLI. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about).
7
+
This topic describes how to configure your application to use the Replicated proxy registry with Helm installations. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about). For more information about installing applications distributed with Replicated using Helm, see [About Helm Installations with Replicated](/vendor/helm-install-overview).
8
8
9
9
## Overview
10
10
11
-
With the Replicated proxy registry, each customer's unique license can grant proxy access to images in an external private registry.
11
+
During Helm installations with Replicated, after customers provide their unique license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values.
12
12
13
-
During Helm installations, after customers provide their license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values. You can use this `global.replicated.dockerconfigjson`field to create the pull secret required to authenticate with the proxy registry, allowing you to use the proxy registry for images in your Helm charts.
13
+
You can use this `global.replicated.dockerconfigjson` field to create the pull secret required to authenticate with the proxy registry. For more information about how Kubernetes uses the `kubernetes.io/dockerconfigjson`Secret type to provide authentication for a private registry, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/)in the Kubernetes documentation.
14
14
15
-
Additionally, if you include the Replicated SDK as a dependency in your Helm chart, the image used by the Replicated SDK is automatically proxied through the proxy registry.
15
+
:::note
16
+
For Helm charts that include the Replicated SDK as a dependency, the image used by the Replicated SDK is automatically proxied through the proxy registry. No additional configuration is required. For more information, see [About the Replicated SDK](/vendor/replicated-sdk-overview).
17
+
:::
16
18
17
-
## Pull Private Images Through the Proxy Registry in Helm Installations
19
+
## Configure Your Application to Use the Proxy Registry
18
20
19
-
To use the Replicated proxy registry for applications installed with Helm:
21
+
To configure your application to use the proxy registry with Helm installations:
20
22
21
23
1. <StepCreds/>
22
24
23
25
1. <StepCustomDomain/>
24
26
25
27
1. <RewriteHelmValues/>
26
28
27
-
1. In your Helm chart templates, create a Kubernetes Secret to evaluate if the `global.replicated.dockerconfigjson` value is set and then write the rendered value into a Secret on the cluster, as shown below.
28
-
29
-
This Secret is used to authenticate with the proxy registry. For information about how Kubernetes uses the `kubernetes.io/dockerconfigjson` Secret type to provide authentication for a private registry, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) in the Kubernetes documentation.
29
+
1. In your Helm chart templates, add a YAML file that evaluates if the `global.replicated.dockerconfigjson` value is set, and then writes the rendered value into a Secret on the cluster, as shown below.
30
30
31
31
:::note
32
32
Do not use `replicated` for the name of the image pull secret because the Replicated SDK automatically creates a Secret named `replicated`. Using the same name causes an error.
@@ -47,8 +47,7 @@ To use the Replicated proxy registry for applications installed with Helm:
47
47
{{ end }}
48
48
```
49
49
50
-
51
-
1. Add the image pull secret that you created to any manifests that reference the image:
50
+
1. Add the image pull secret that you created to any manifests that reference the image.
Copy file name to clipboardExpand all lines: docs/vendor/private-images-kots.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,15 @@ import InjectPullSecret from "../partials/proxy-service/_step-inject-pull-secret
7
7
8
8
# Use the Proxy Registry with Replicated Installers
9
9
10
-
This topic describes how to use the Replicated proxy registry for applications deployed with Replicated installers (Embedded Cluster, KOTS existing cluster, or kURL).
10
+
This topic describes how to use the Replicated proxy registry for applications deployed with Replicated installers (Embedded Cluster, KOTS existing cluster, or kURL). For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about).
11
11
12
12
## Configure Your Application to Use the Proxy Registry
13
13
14
14
These steps assume that you package your application with Helm and that you install with the KOTS [HelmChart v2](/reference/custom-resource-helmchart-v2) custom resource.
15
15
16
16
If you are installing with the HelmChart v1 custom resource, or if your application is not packaged with Helm, there are different steps for configuring your application to use the proxy registry. See [Configure Other Application Types](#other-scenarios) below.
17
17
18
-
To configure your application to use the proxy registry:
18
+
To configure your application to use the proxy registry for installations with a Replicated installer:
0 commit comments