If you’re using AWS ECR with private repositories for Pipecat Cloud deployments, you’ll need to configure image pull secrets to authenticate with your registry. ECR tokens expire every 12 hours, so you’ll also need to set up automatic token refresh.Documentation Index
Fetch the complete documentation index at: https://daily-docs-pr-4386.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Authenticate Docker
First, authenticate Docker with ECR:Configure Image Pull Secrets
Use the Pipecat Cloud REST API to store your ECR registry credentials:<region>with your AWS region (e.g.,us-east-1,us-west-2)<aws_account_id>with your AWS account ID<your-private-api-token>with your Pipecat Cloud private API token
Configure Your Deployment
Create apcc-deploy.toml file with your ECR image configuration:
Build and Push to ECR
Build and push your agent image to ECR using the Pipecat Cloud CLI:linux/arm64) and pushes to your configured ECR repository.
Pipecat Cloud may pull your image on deploy and again during scale-outs, so
credentials must be valid whenever new pods start.
Deploy Your Agent
Deploy using your configuredpcc-deploy.toml:
Automatic Token Refresh (Required)
ECR passwords expire every 12 hours, so set up a scheduled job to refresh the token:Operational Considerations
Critical operational tips:- Image pulls can happen during scale-outs, not just at initial deploy—keep the secret valid continuously
- If you see agents failing to become ready with no logs, check that your ECR credentials aren’t expired
- Consider setting up monitoring alerts for ECR token expiration
- Test your refresh script to ensure it works before relying on it in production
Ensure your AWS credentials have the necessary permissions to access ECR,
including
ecr:GetAuthorizationToken and ecr:BatchGetImage policies.