Documentation Index
Fetch the complete documentation index at: https://arize-ax.mintlify.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Summary
Use this path when the cluster (or your regulated network) cannot pull from Arize AI’s image registry or reachch.hub.arize.com. You still need the distribution tarball and container images in a private registry your nodes can reach. Pick one workflow below depending on whether any machine can reach Arize AI to mirror images, or you must move payloads offline.
Choose your path
| Situation | Image source | Typical ./arize.sh flow |
|---|---|---|
| A — Bastion or CI can reach both Arize AI’s image registry and your private registry | Mirror from hub into your registry on one host | load-remote-images |
| B — One host has internet; another reaches only your registry and the cluster | Pull/save on internet host; transfer images/; push/install inside | pull-images → save-images → transfer → load-images → push-images |
| C — Cluster is isolated; runtime pulls only from your registry | Same as A or B for loading images; pullRegistry / pushRegistry always point at your registry | See A or B |
./arize.sh load-remote-images requires a host that can reach Arize AI (it logs in to the hub and pulls). It is not a substitute for cluster egress—it is how you populate a private registry before the isolated cluster pulls from it.
Step 0 — Distribution without cluster internet
If you cannot runcurl from the target network, obtain the tarball through your approved transfer process, then extract it. See Download and extract the distribution for layout (arize.sh, arize-operator-chart.tgz, bundled docs).
Network and images
- Workloads must pull from your registry only: set
pullRegistry(andpushRegistrywhen mirroring) to that registry’s hostname. Helm and the operator usepullRegistryfor pod image strings;arize.shneedspushRegistrywhen pushing mirrored layers—use the same registry hostname for both unless Arize AI has given you a different layout. - Use the quick start and walkthrough for the full operator field list when you reach install. Plan DNS and TLS for the UI inside the isolated network; ingress applies once workloads are running.
Authenticate Docker to your registry
The host that runspush-images or load-remote-images must be able to push to pushRegistry:
- User or Azure CLI (common on a bastion):
docker login or your platform’s standard.
- Service principal or CI: Access token and
docker login, or a federated credential flow, per your platform standard.
Choose one workflow
Work from the extracted directory that containsarize.sh, arize-operator-chart.tgz, and the bundled chart and docs (see Download and extract).
A — Bastion can reach the internet and your private registry
Use one machine that can reach both Arize AI’s hub and your registry. Authenticate Docker to your registry, then mirror with-f none and -y for non-interactive runs, passing comma-separated key=value pairs in a single quoted string (no spaces inside the list).
load-remote-images pulls from the hub into Docker, retags, and pushes to pushRegistry (see ./arize.sh help).
B — Split network (internet host vs internal host)
Use when one host can reach the internet and another can reach your registry and the cluster, but not both. Setup (both hosts): Use the samehubJwt, cloud, registry endpoints, and optional flags on every step that reads them so image tags stay aligned.
| Step | Needs hub or registry settings? |
|---|---|
pull-images, save-images | Yes — hubJwt, cloud |
load-images | No — imports Docker data from the images/ folder only |
push-images | Yes — push-images requires pushRegistry |
images/ directory to the internal host (encrypted media, approved gateway, etc.).
Phase 2 — Internal host (registry + cluster access)
save-images / load-images only when you must move image payloads between machines. hubJwt is required on any step that pulls from the hub (pull-images, or load-remote-images on path A).
For digest-preserving copies without loading into local Docker, you can use ./arize.sh --skopeo load-remote-images where supported; coordinate with Arize AI on upgrade expectations when changing pull modes.
Image references and upgrades
By default, image references use tags. The chart supportsimagePullMode values that change how image strings are built (for example digest-style references). Pushing through Docker may not preserve the same digest as upstream; for immutable digest pulls from a private registry, consider skopeo-style workflows and coordinate with Arize AI on upgrades.
Additional reference
For multi-cloud variants and extended parameters, use Advanced → Helm in the offline HTML docs underdocs/ in the tarball (open docs/index.html) alongside materials from Arize AI.
Next steps
- Provision or use an AKS cluster (or Terraform).
- Install Arize AX (quick start) or detailed walkthrough after images are in your registry—for operator values and
./arize.sh. - Configure ingress or another controller.
- Validate the deployment.