When to use this
Private registries
Pull from Docker Hub private repos, ECR, GCR, ACR, or GHCR
Cross-org images
Use images from another Control Plane organization
Enterprise registries
Connect to self-hosted or enterprise container registries
Secure supply chain
Control access to private images with pull secrets
Prerequisites
CLI installed (optional)
CLI installed (optional)
The CLI is optional but helpful. See Installation.
Pull from public registries
Public images don’t require pull secrets. Use these formats:| Registry | Format |
|---|---|
| Docker Hub | IMAGE_NAME:TAG |
| Amazon ECR Public | public.ecr.aws/REGISTRY-ALIAS/IMAGE:TAG |
| Google Artifact Registry | LOCATION-docker.pkg.dev/PROJECT/REPO/IMAGE:TAG |
| GitHub Container Registry | ghcr.io/OWNER/IMAGE:TAG |
Pull from private registries
1
Create a pull secret
- Console
- CLI
- Navigate to Secrets in the left menu
- Click New or use the Create dropdown
- Enter a name for the secret
- Select the secret type:
- Docker for Docker Hub, ACR, GAR, GHCR, or another Control Plane org
- ECR for Amazon ECR
- GCP for Google Container Registry
- Enter the credentials
- Click Create
Images from your own org’s Control Plane registry don’t need a pull secret.
2
Associate with a GVC
- Console
- CLI
- Navigate to your GVC
- Click the Pull Secrets link
- Click Add and select your secret
- Click Save
3
Configure your workload
Reference the image in your workload using the appropriate format:
| Registry | Image Format |
|---|---|
| Control Plane (same org) | //image/IMAGE:TAG |
| Control Plane (cross-org) | ORG.registry.cpln.io/IMAGE:TAG |
| Docker Hub | IMAGE:TAG |
| Amazon ECR | ACCOUNT.dkr.ecr.REGION.amazonaws.com/IMAGE:TAG |
| Azure CR | REGISTRY.azurecr.io/IMAGE:TAG |
| GCR | gcr.io/PROJECT/IMAGE:TAG |
| GitHub CR | ghcr.io/OWNER/IMAGE:TAG |
Pull from Control Plane registry
Same organization
No pull secret needed:Cross-organization
- Create a Docker secret with the other org’s credentials
- Add it as a pull secret to your GVC
- Reference the image:
Troubleshooting
Authentication failed
Authentication failed
- Verify the secret credentials are correct
- Check the secret is associated with the GVC
- Ensure the secret type matches your registry
Image not found
Image not found
Verify the image name and tag are correct. Check the registry for the exact image path.
Cross-org pull fails
Cross-org pull fails
Ensure the source org has granted access and your Docker secret has the correct credentials. Learn more about configuring a secret for pulling images from other Control Plane orgs.