Skip to content

Commit d710e96

Browse files
committed
update xrefs
1 parent 0755c9f commit d710e96

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

docs/partials/helm/_helm-install-prereqs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,6 @@
22

33
* The customer used to install must have the **Existing Cluster (Helm CLI)** install type enabled. If installing into an air gap environment, additionally enable the **Helm CLI Air Gap Instructions** option for the customer. For more information about enabling install types for customers in the Vendor Portal, see [Manage Install Types for a License](licenses-install-types).
44

5-
* To ensure that the Replicated proxy registry can be used to grant proxy access to your application images during Helm installations, you must create an image pull secret for the proxy registry and add it to your Helm chart. To do so, follow the steps in [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry).
5+
* To ensure that the Replicated proxy registry can be used to grant proxy access to your application images during Helm installations, you must create an image pull secret for the proxy registry and add it to your Helm chart. To do so, follow the steps in [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry).
66

77
* Declare the SDK as a dependency in your Helm chart. For more information, see [Install the SDK as a Subchart](replicated-sdk-installing#install-the-sdk-as-a-subchart) in _Installing the Replicated SDK_.

docs/vendor/helm-image-registry.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@ import StepCreds from "../partials/proxy-service/_step-creds.mdx"
22
import StepCustomDomain from "../partials/proxy-service/_step-custom-domain.mdx"
33
import RewriteHelmValues from "../partials/proxy-service/_step-rewrite-helm-values.mdx"
44

5-
# Use the Proxy Registry with Helm Installations
5+
# Use the Proxy Registry with Helm CLI Installations
66

7-
This topic describes how to configure your application to use the Replicated proxy registry with Helm installations. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about). For more information about installing applications distributed with Replicated using Helm, see [About Helm Installations with Replicated](/vendor/helm-install-overview).
7+
This topic describes how to configure your application to use the Replicated proxy registry with Helm CLI installations. For more information about the proxy registry, see [About the Replicated Proxy Registry](private-images-about). For more information about installing applications distributed with Replicated using Helm, see [About Helm Installations with Replicated](/vendor/helm-install-overview).
88

99
## Overview
1010

11-
During Helm installations with Replicated, after customers provide their unique license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values.
11+
During Helm CLI installations with Replicated, after customers provide their unique license ID, a `global.replicated.dockerconfigjson` field that contains a base64 encoded Docker configuration file is automatically injected in the Helm chart values.
1212

1313
You can use this `global.replicated.dockerconfigjson` field to create the pull secret required to authenticate with the proxy registry. For more information about how Kubernetes uses the `kubernetes.io/dockerconfigjson` Secret type to provide authentication for a private registry, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) in the Kubernetes documentation.
1414

@@ -18,7 +18,7 @@ For Helm charts that include the Replicated SDK as a dependency, the image used
1818

1919
## Configure Your Application to Use the Proxy Registry
2020

21-
To configure your application to use the proxy registry with Helm installations:
21+
To configure your application to use the proxy registry with Helm CLI installations:
2222

2323
1. <StepCreds/>
2424

docs/vendor/packaging-public-images.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ For more information about the Replicated proxy registry, see [About the Replica
66

77
## Pull Public Images Through the Replicated Proxy Registry
88

9-
You can use the Replicated proxy registry to pull both public and private images. Using the Replicated proxy registry for public images can simplify network access requirements for your customers, as they only need to whitelist a single domain (either `proxy.replicated.com` or your custom domain) instead of multiple registry domains. These are authenticated requests to avoid the proxy from hitting rate limits and preventing pulls. For more information about how to reference these in your values, see [Use the Proxy Registry with Helm Installations](/vendor/helm-image-registry).
9+
You can use the Replicated proxy registry to pull both public and private images. Using the Replicated proxy registry for public images can simplify network access requirements for your customers, as they only need to whitelist a single domain (either `proxy.replicated.com` or your custom domain) instead of multiple registry domains. These are authenticated requests to avoid the proxy from hitting rate limits and preventing pulls. For more information about how to reference these in your values, see [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry).
1010

1111
> [!IMPORTANT]
1212
> For public images, you need to first configure registry credentials.

docs/vendor/private-images-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,8 @@ The following diagram demonstrates how the proxy registry pulls images from your
1919
The proxy registry requires read-only credentials to your private registry to access your application images. See [Connect to an External Registry](/vendor/packaging-private-images).
2020

2121
After connecting your registry, the steps the enable the proxy registry vary depending on your application deployment method. For more information, see:
22-
* [Using the Proxy Registry with KOTS Installations](/vendor/private-images-kots)
23-
* [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry)
22+
* [Use the Proxy Registry with Replicated Installers](/vendor/private-images-kots)
23+
* [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry)
2424

2525
## About Allowing Pull-Through Access of Public Images
2626

docs/vendor/replicated-onboarding.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,7 @@ Before you test Helm installations for your application, you can complete the [D
458458

459459
To support and test Helm installations:
460460

461-
1. Follow the steps in [Using the Proxy Registry with Helm Installations](/vendor/helm-image-registry) to authenticate with the Replicated proxy registry by creating a Secret with `type: kubernetes.io/dockerconfigjson` in your Helm chart.
461+
1. Follow the steps in [Use the Proxy Registry with Helm CLI Installations](/vendor/helm-image-registry) to authenticate with the Replicated proxy registry by creating a Secret with `type: kubernetes.io/dockerconfigjson` in your Helm chart.
462462

463463
1. Update dependencies and package the chart as a `.tgz` file:
464464

0 commit comments

Comments
 (0)