Using a Custom Image Registry for the connectware-agent Helm Chart
You can use a custom image registry, if it provides the necessary image for your agents.
To change the registry for the agent, specify the address under which the image is pull-able in the image.registry
value inside the agents entry in protocolMapperAgents
context of your values.yaml file.
Example
protocolMapperAgents:
- name: bender-robots
connectwareHost: connectware.cybus # adjust to actual hostname of Connectware
image:
registry: registry.my-company.tld/cybus
Code-Sprache: YAML (yaml)
If your custom registry requires authentication, you must also provide a manually created kubernetes.io/dockerconfigjson
secret in the image.pullSecrets
list inside the agents entry in protocolMapperAgents
context of your values.yaml file.
Example
protocolMapperAgents:
- name: bender-robots
connectwareHost: connectware.cybus # adjust to actual hostname of Connectware
image:
registry: registry.my-company.tld/cybus
pullSecrets:
- name: my-company-pull-secret
Code-Sprache: YAML (yaml)
Hint: kubernetes.io/dockerconfigjson
secrets can be created with this command:
kubectl create secret <secret-name> --docker-server=<registry-address> --docker-username=<username> --docker-password=<password> --docker-email=<user-email>
Code-Sprache: YAML (yaml)
Need more help?
Can’t find the answer you’re looking for?
Don’t worry, we’re here to help.