Amazon Elastic Container Registry (ECR)
Amazon Elastic Container Registry (ECR) integration setup for Arnica
In Arnica, click Connect next to Elastic Container Registry (ECR)

Recommended: IAM Role (CloudFormation)
We strongly recommend using an IAM Role instead of access keys. It is more secure (no long‑lived keys) and easier to manage.
If you have AWS access:
In the integration dialog, keep the IAM Role tab selected.
Click Deploy CloudFormation Template.
In the AWS Console, click Create Stack to deploy the template. Any region works because IAM roles are global; we recommend
us-east-1for simplicity.After the stack finishes, open the Outputs tab.
Copy the
RoleArnvalue. You do not need to copy theExternalIdas long as you did not change it in Arnica.Back in Arnica, paste the
RoleArninto the Role ARN field (if yourExternal IDdiffers for any reason, enter it as shown in the dialog).(Optional) Enter an alias to help you recognize the integration.
Click Validate, then OK.
If you do not have AWS access:
Copy the Direct template link and your External ID from the integration dialog:
Template URL:
https://arnica-integration-templates.s3.amazonaws.com/ecr-integration-role.yamlExternal ID: use the value shown in Arnica. Keep this External ID so you can complete the integration later.
Ask your AWS administrator to deploy the template using that External ID (any region is fine;
us-east-1recommended) and to send you theRoleArnfrom the stack's Outputs.When you receive the
RoleArn, paste it into the Role ARN field in Arnica. If your admin used a different External ID, update the External ID field to match.(Optional) Enter an alias, click Validate, then OK.
Alternative: Access Key (not recommended)
Only use this if you cannot use the IAM Role method above.
Create an IAM user with the following permissions:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ecr:GetAuthorizationToken", "ecr:BatchCheckLayerAvailability", "ecr:GetDownloadUrlForLayer", "ecr:GetRepositoryPolicy", "ecr:DescribeRepositories", "ecr:ListImages", "ecr:DescribeImages", "ecr:BatchGetImage", "ecr:GetLifecyclePolicy", "ecr:GetLifecyclePolicyPreview", "ecr:ListTagsForResource", "ecr:DescribeImageScanFindings", "ec2:DescribeRegions" ], "Resource": "*" } ] }In Arnica, switch to the Access Key tab, enter the Access Key ID and Secret Access Key, click Validate, then OK.
Last updated
Was this helpful?