Skip to main content
Version: 1.19

Registry Credentials

In the Admin Dashboard, you can set up private registry credentials for your Okteto instance. These credentials are automatically used by Okteto for various developer operations like building and deploying, so developers don't need direct credential access. Once set, all developers can access the registries through Okteto without additional steps. Additionally, you have the option to manage these credentials via Kubernetes CRDs provided by Okteto.

Registry credentials view

When the daemonset.configurePrivateRegistriesInNodes.enabled setting is active, Okteto automatically applies registry credentials to nodes, allowing cluster-wide access to these registries.

Registries are listed by type (Static or AWS) and hostname. Static credentials use a username and password, ideal for platforms like Docker Hub. AWS credentials for ECR use an Access Key and Secret, with Okteto refreshing credentials every 4 hours. For AWS, ensure the registry hostname ends with .amazonaws.com. Instructions are provided for retrieving ECR credentials.

Follow one of the guides below to learn how to retrieve your registry credentials:

note

Registries must be included using a valid host name. For example, index.docker.io or 111122223333.dkr.ecr.eu-central-1.amazonaws.com. For static registries, if the registry is exposed in a port other than the default http(s) 80/443 it must be included in the name, eg: my-registry.com:5000

This admin view also enables you to rotate your registry credentials or delete them if you don't need them anymore. For sensitive data you will only see the last few characters as a hint to verify the value.

Registry credentials detail

note

Be aware that any changes you make to credentials may take a few minutes to propagate to all of the components in the cluster.