Amazon Elastic Container Registry (ECR)
Amazon Elastic Container Registry (ECR) integration setup for Arnica
In Arnica, click Connect next to Elastic Container Registry (ECR)
Recommended: IAM Role (CloudFormation)
We strongly recommend using an IAM Role instead of access keys. It is more secure (no long‑lived keys) and easier to manage.
If you have AWS access:
In the integration dialog, keep the IAM Role tab selected.
Click Deploy CloudFormation Template.
In the AWS Console, click Create Stack to deploy the template. Any region works because IAM roles are global; we recommend
us-east-1
for simplicity.After the stack finishes, open the Outputs tab.
Copy the
RoleArn
value. You do not need to copy theExternalId
as long as you did not change it in Arnica.Back in Arnica, paste the
RoleArn
into the Role ARN field (if yourExternal ID
differs for any reason, enter it as shown in the dialog).(Optional) Enter an alias to help you recognize the integration.
Click Validate, then OK.
If you do not have AWS access:
Copy the Direct template link and your External ID from the integration dialog:
Template URL:
https://arnica-integration-templates.s3.amazonaws.com/ecr-integration-role.yaml
External ID: use the value shown in Arnica. Keep this External ID so you can complete the integration later.
Ask your AWS administrator to deploy the template using that External ID (any region is fine;
us-east-1
recommended) and to send you theRoleArn
from the stack's Outputs.When you receive the
RoleArn
, paste it into the Role ARN field in Arnica. If your admin used a different External ID, update the External ID field to match.(Optional) Enter an alias, click Validate, then OK.
Alternative: Access Key (not recommended)
Only use this if you cannot use the IAM Role method above.
Create an IAM user with the following permissions:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ecr:GetAuthorizationToken", "ecr:BatchCheckLayerAvailability", "ecr:GetDownloadUrlForLayer", "ecr:GetRepositoryPolicy", "ecr:DescribeRepositories", "ecr:ListImages", "ecr:DescribeImages", "ecr:BatchGetImage", "ecr:GetLifecyclePolicy", "ecr:GetLifecyclePolicyPreview", "ecr:ListTagsForResource", "ecr:DescribeImageScanFindings", "ec2:DescribeRegions" ], "Resource": "*" } ] }
In Arnica, switch to the Access Key tab, enter the Access Key ID and Secret Access Key, click Validate, then OK.
Last updated
Was this helpful?