Documentation Index
Fetch the complete documentation index at: https://arize-ax.mintlify.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Summary
Use this path when the cluster (or your regulated network) cannot pull from Arize or reachch.hub.arize.com. You still need the distribution tarball and container images in a private registry your nodes can reach. Pick one workflow below depending on whether any machine can reach Arize to mirror images, or you must move payloads offline.
Choose your path
| Situation | Image source | Typical ./arize.sh flow |
|---|---|---|
| A — Bastion or CI can reach both Arize and your private registry | Mirror from hub into your registry on one host | load-remote-images |
| B — One host has internet; another reaches only your registry and the cluster | Pull/save on internet host; transfer images/; push/install inside | pull-images → save-images → transfer → load-images → push-images |
| C — Cluster is isolated; runtime pulls only from your registry | Same as A or B for loading images; pullRegistry / pushRegistry always point at your registry | See A or B |
./arize.sh load-remote-images requires a host that can reach Arize (it logs in to the hub and pulls). It is not a substitute for cluster egress—it is how you populate a private registry before the isolated cluster pulls from it.
Step 0 — Distribution without cluster internet
If you cannot runcurl from the target network, obtain the tarball through your approved transfer process, then extract it. See Download and extract the distribution for layout (arize.sh, arize-operator-chart.tgz, bundled docs).
Network and images
- Workloads must pull from your registry only: set
pullRegistry(andpushRegistrywhen mirroring) to that registry’s hostname. Helm and the operator usepullRegistryfor pod image strings;arize.shneedspushRegistrywhen pushing mirrored layers—use the same registry hostname for both unless Arize has given you a different layout. - Use the quick start and walkthrough for the full operator field list when you reach install. Plan DNS and TLS for the UI inside the isolated network; ingress applies once workloads are running.
Authenticate Docker to your registry
The host that runspush-images or load-remote-images must be able to push to pushRegistry:
- User or gcloud (common on a bastion):
- Service account or CI: JSON key or access token and
docker login, orgcloud auth activate-service-accountthengcloud auth configure-docker, per your platform standard.
Choose one workflow
Work from the extracted directory that containsarize.sh, arize-operator-chart.tgz, and the bundled chart and docs (see Download and extract).
A — Bastion can reach the internet and your private registry
Use one machine that can reach both Arize’s hub and your registry. Authenticate Docker to your registry, then mirror with-f none and -y for non-interactive runs, passing comma-separated key=value pairs in a single quoted string (no spaces inside the list).
load-remote-images pulls from the hub into Docker, retags, and pushes to pushRegistry (see ./arize.sh help).
B — Split network (internet host vs internal host)
Use when one host can reach the internet and another can reach your registry and the cluster, but not both. Setup (both hosts): Use the samehubJwt, cloud, registry endpoints, and optional flags on every step that reads them so image tags stay aligned.
| Step | Needs hub or registry settings? |
|---|---|
pull-images, save-images | Yes — hubJwt, cloud |
load-images | No — imports Docker data from the images/ folder only |
push-images | Yes — push-images requires pushRegistry |
images/ directory to the internal host (encrypted media, approved gateway, etc.).
Phase 2 — Internal host (registry + cluster access)
save-images / load-images only when you must move image payloads between machines. hubJwt is required on any step that pulls from the hub (pull-images, or load-remote-images on path A).
For digest-preserving copies without loading into local Docker, you can use ./arize.sh --skopeo load-remote-images where supported; coordinate with Arize on upgrade expectations when changing pull modes.
Image references and upgrades
By default, image references use tags. The chart supportsimagePullMode values that change how image strings are built (for example digest-style references). Pushing through Docker may not preserve the same digest as upstream; for immutable digest pulls from a private registry, consider skopeo-style workflows and coordinate with Arize on upgrades.
Additional reference
For multi-cloud variants and extended parameters, use Advanced → Helm in the offline HTML docs underdocs/ in the tarball (open docs/index.html) alongside materials from Arize.
Next steps
- Provision or use a GKE cluster (or Terraform).
- Install Arize (quick start) or detailed walkthrough after images are in your registry—for operator values and
./arize.sh. - Configure ingress or another controller.
- Validate the deployment.