Skip to main content
Docker secrets store container registry credentials, enabling your workloads to pull images from private registries like Docker Hub, GitHub Container Registry, Azure Container Registry, or any Docker-compatible registry.

Use Cases

  • Private Docker Hub: Pull images from private Docker Hub repositories
  • GitHub Container Registry: Access private packages hosted on GHCR
  • Azure Container Registry: Pull images from ACR
  • Google Artifact Registry: Access private Google container images
  • Self-Hosted Registries: Connect to private/enterprise registries
  • Cross-Org Images: Pull images from another Control Plane org
Images stored in your current Control Plane org don’t require a pull secret. Reference them directly using the //image/IMAGE:TAG format.

Configuration Options

The Docker secret uses the standard Docker config.json format:
{
  "auths": {
    "<registry-url>": {
      "username": "<username>",
      "password": "<password-or-token>"
    }
  }
}
You can include credentials for multiple registries in a single secret.

Create a Docker Secret

1

Navigate to Secrets

In the Console, navigate to Secrets and click New, or use the Create dropdown in the top-right corner and select Secret.
2

Enter basic information

Enter a Name and optional Description.
3

Select secret type

Select Docker as the secret type.
4

Configure credentials

Click Data in the left pane. Enter the Docker Secret Data (JSON format), or drag and drop a file / click to import.
5

Create the secret

Click Create.

Common Registry URLs

RegistryURLNotes
Docker Hubhttps://index.docker.io/v1/Use access token, not password
GitHub Container Registryghcr.ioPAT with read:packages scope
Azure Container Registry<registry>.azurecr.ioService principal or admin user
Google Artifact Registry<region>-docker.pkg.devService account JSON key
AWS ECRUse ECR secretDedicated secret type available
Control Plane (other org)<org>.registry.cpln.ioService account token

Using the Secret

After creating the Docker secret, add it as a pull secret to your GVC:
1

Navigate to your GVC

Open your GVC in the Console.
2

Open Pull Secrets

Click Pull Secrets in the left pane.
3

Add the secret

Click Add and select your Docker secret.
4

Save changes

Click Save.

Next Steps