From 1ba097fe9b04b1f8f6450170fb9e5bdb92bc2c32 Mon Sep 17 00:00:00 2001 From: Graham Ford <82064878+otteryoudoing@users.noreply.github.com> Date: Mon, 13 Nov 2023 22:15:14 -1000 Subject: [PATCH] Document how to provide container registry credentials in air-gapped environment (#7256) Co-authored-by: Thibault Richard --- docs/operating-eck/air-gapped.asciidoc | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/docs/operating-eck/air-gapped.asciidoc b/docs/operating-eck/air-gapped.asciidoc index 03fdbf52e1c..3ea498fe134 100644 --- a/docs/operating-eck/air-gapped.asciidoc +++ b/docs/operating-eck/air-gapped.asciidoc @@ -24,15 +24,18 @@ spec: nodeSets: - name: default count: 1 + # podTemplate: + # spec: + # imagePullSecrets: <2> + # - name: private-registry-credentials-secret ---- <1> The ECK operator will set this value by default. You can explicitly set it to your mirrored container image when running in an air-gapped environment +<2> You can provide credentials to your private container registry by setting the `imagePullSecrets` field through the `spec.podTemplate` section of your Elastic resource specification, check <<{p}-customize-pods,how to customize the Elastic resources Pods>> and link:https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/[how to setup a Secret containing your registry credentials]. ECK will automatically set the correct container image for each application. When running in an air-gapped or offline environment you will have to mirror the official Elastic container images in a private container image registry. To make use of your mirrored images you can either set the image for each application explicitly as shown in the preceding example or more conveniently override the default container registry as explained in the next section. - - [float] [id="{p}-use-mirrored-operator-image"] == Use a mirrored image of the ECK operator