Setup Private Container Registry Authentication
When using self-hosted LangSmith platform and deploying LangGraph agents that use images from private container registries, you need to configure authentication credentials. Follow these steps to properly set up image pull secrets for your agent deployments:
Create a Kubernetes secret with your private registry credentials in the langsmith namespace:
kubectl create secret docker-registry multirepo-secret --docker-server=your-registry.com --docker-username=your-username --docker-password=your-password -n langsmithOverride the default deployment template in your Helm values.yaml file to include imagePullSecrets. Add the following configuration:
operator: templates: deployment: | apiVersion: apps/v1 kind: Deployment metadata: name: ${name} namespace: ${namespace} spec: replicas: ${replicas} selector: matchLabels: app: ${name} template: metadata: labels: app: ${name} spec: imagePullSecrets: - name: multirepo-secret containers: - name: api-server image: ${image} ports: - containerPort: 8000 # ... rest of container spec ...Configure your custom image repository in the values.yaml file:
images: genai-agent: repository: your-private-registry.com/your-org/genai-agent tag: latestApply the updated Helm configuration to your cluster
Important: Do not use images.imagePullSecrets in your values.yaml as this configuration only applies to default LangSmith images, not to agent deployment pods created by the LangSmith Cloud operator.
Usage
Once configured, the LangSmith Cloud operator will automatically use the specified imagePullSecrets when creating new agent deployments. This ensures that pods can successfully pull images from your private container registry without encountering authorization failed: no basic auth credentials errors.
The custom deployment template will be applied to all future agent deployments, eliminating the need to manually configure authentication for each individual deployment.