Skip to content

Latest commit

 

History

History
66 lines (42 loc) · 5.8 KB

registry_rhos.md

File metadata and controls

66 lines (42 loc) · 5.8 KB
copyright lastupdated keywords subcollection
years
2020, 2024
2024-07-17
External registry, private registry, Red Hat OpenShift, Red Hat, clusters, Red Hat OpenShift Container Platform, container platform, internal registry, images
Registry

{{site.data.keyword.attribute-definition-list}}

Setting up {{site.data.keyword.registryshort}} as a private registry on {{site.data.keyword.redhat_openshift_notm}}

{: #registry_rhos}

You can add value to your {{site.data.keyword.redhat_openshift_full}} Container Platform clusters by using {{site.data.keyword.registrylong}} even where an internal registry is already provided. {: shortdesc}

For example, if you have multiple clusters, {{site.data.keyword.registryshort_notm}} integrates conveniently with {{site.data.keyword.redhat_openshift_notm}} Container Platform clusters so that you can build, share, synchronize, and scan image assets across clusters. For more information, see Choosing an image registry solution.

You can set up {{site.data.keyword.registryshort}} to work with the internal registry of {{site.data.keyword.openshiftlong_notm}} or other {{site.data.keyword.redhat_openshift_notm}} Container Platform providers.

Set up {{site.data.keyword.openshiftlong_notm}} to use {{site.data.keyword.registryshort}}

{: #registry_rhos_rhoks} {: help} {: support}

By default, your {{site.data.keyword.openshiftlong_notm}} clusters are set up with an internal registry that stores images locally in your cluster. The clusters are also set up with image pull secrets in the default project to pull images that you store in your private {{site.data.keyword.registryshort}} repositories.

You can use either registry separately or in combination. When you set up the {{site.data.keyword.openshiftlong_notm}} internal registry to import images from {{site.data.keyword.registryshort}}, you get the advantage of a private registry that is common to multiple clusters. Another benefit is that copies of the pulled images from {{site.data.keyword.registryshort}} are stored locally on the cluster, therefore reducing latency and external traffic, but you are subject to storage limitations.

To set up your {{site.data.keyword.openshiftlong_notm}} clusters to use the internal registry in combination with {{site.data.keyword.registryshort}}, see the following topics in the {{site.data.keyword.openshiftlong_notm}} documentation:

Set up {{site.data.keyword.redhat_openshift_notm}} Container Platform to use {{site.data.keyword.registryshort}}

{: #registry_rhos_os}

To set up {{site.data.keyword.redhat_openshift_notm}} Container Platform, you must create secrets that have the credentials to access {{site.data.keyword.registryshort}} so that you can perform the following actions.

  • Pull Create image pull secrets to pull images from {{site.data.keyword.registryshort}} to your {{site.data.keyword.redhat_openshift_notm}} cluster. For example, you might deploy an app that uses an image in a private registry.
  • Push Create image push secrets to push images from your {{site.data.keyword.redhat_openshift_notm}} cluster to a repository in {{site.data.keyword.registryshort}}. For example, you might set up a continuous delivery pipeline that builds an image to a private registry instead of the internal registry.
  • Both Create a secret that can pull images from and push images to {{site.data.keyword.registryshort}}. For example, you might set up a continuous delivery pipeline that builds an image to a private registry so that your team can pull the most recent image across multiple clusters.

Set up the {{site.data.keyword.redhat_openshift_notm}} Container Platform internal registry to pull from {{site.data.keyword.registryshort}}

{: #registry_rhos_os_pull} {: help} {: support}

To configure {{site.data.keyword.redhat_openshift_notm}} Container Platform to pull from {{site.data.keyword.registryshort}}, you must complete the following steps:

  1. Set up image pull secrets to {{site.data.keyword.registrylong_notm}} for each project that you want to pull images in.

  2. Configure {{site.data.keyword.redhat_openshift_notm}} Container Platform to use the image pull secrets by adding the secrets to a service account in each project or by referring to the secret in your pod{: term} deployment. You are only required to add the secret to the projects that you want to pull to.

Set up the {{site.data.keyword.redhat_openshift_notm}} Container Platform build to push images to {{site.data.keyword.registryshort}}

{: #registry_rhos_os_push} {: help} {: support}

If you want to push application images from {{site.data.keyword.redhat_openshift_notm}} Container Platform to {{site.data.keyword.registryshort}}, you must edit the {{site.data.keyword.redhat_openshift_notm}} Container Platform build configuration to point at {{site.data.keyword.registryshort}}, where myregistry.mycompany.io is <region_domain_name>.icr.io. For more information about {{site.data.keyword.registryshort}} regions and domain names, see Regions.

For instructions, see Setting up builds in the internal registry to push images to {{site.data.keyword.registrylong_notm}}.