Prerequisites
Before you begin, ensure you have:- Container image in a supported registry
- Environment provisioned in AWS, Google Cloud, or Azure
Connect Private Registry
Navigate to Settings
Go to the Settings tab in the Ryvn Dashboard and select the Private Registries tab.
Choose Registry
We support the following container registries:
- Amazon Elastic Container Registry
- Docker Hub
- GitHub Container Registry
- Harbor
Add Registry Details
- Add registry name (eg:
my-github-registry) - Add registry host (Github -
ghcr.io, Docker -docker.io, Harbor -my-harbor.example.com)
Add Registry Credentials
For private registries, add your credentials through Settings in the Ryvn Dashboard.
- Generic OCI (Docker Hub, Github, Harbor, etc.): Add username and password
- For Harbor, this is typically a read-only robot account’s name and secret
- For Github, this is typically github username and personal access token (access to
read:packagesscope)
- AWS ECR: Configure AWS Role using cloudformation template
By default, your organization has access to Ryvn Registry. This is a multi-tenant registry backed by AWS ECR with
isolated repositories for your organization.
Authenticating with Private Registry
Server
Once you have added your private registry, you can pick the registry during server creation (or edit this in service settings).Open Dashboard
Open the Ryvn Dashboard and go to the Services tab
Choose Service Type
Select your service type:
| Type | Description |
|---|---|
| Server | Long-running service that handles HTTP/HTTPS traffic |
| Job | Short-lived task that runs to completion |
Helm Charts
Once you have connected private registry, Ryvn automatically creates image pull secrets in environments where your Helm Charts are deployed. To use these image pull secrets, you can:- Use the image pull secret reference:
In values.yaml on Ryvn, you can get the image pull secret for a registry named
my-registryas follows: - If your helm chart does not create a service account, you do not need to supply any image pull secret since Ryvn attaches the image pull secret to the default service account automatically. This is a Kubernetes feature, see Kubernetes Documentation
Troubleshooting
Image Pull Errors
If you encounter image pull errors, ensure that:- Your container registry is correctly connected and configured
- The image tag exists and is pushed to the registry
- The credentials used for the connected registry are not expired