Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 3. Setting up and configuring the registry
3.1. Configuring the registry for AWS user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
3.1.1. Configuring a secret for the Image Registry Operator Link kopierenLink in die Zwischenablage kopiert!
In addition to the
configs.imageregistry.operator.openshift.io
openshift-image-registry
The
image-registry-private-configuration-user
For S3 on AWS storage, the secret is expected to contain two keys:
-
REGISTRY_STORAGE_S3_ACCESSKEY -
REGISTRY_STORAGE_S3_SECRETKEY
Procedure
Create an OpenShift Container Platform secret that contains the required keys.
$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=myaccesskey --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=mysecretkey --namespace openshift-image-registry
3.1.2. Configuring registry storage for AWS with user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
During installation, your cloud credentials are sufficient to create an Amazon S3 bucket and the Registry Operator will automatically configure storage.
If the Registry Operator cannot create an S3 bucket and automatically configure storage, you can create an S3 bucket and configure storage with the following procedure.
Prerequisites
- You have a cluster on AWS with user-provisioned infrastructure.
For Amazon S3 storage, the secret is expected to contain two keys:
-
REGISTRY_STORAGE_S3_ACCESSKEY -
REGISTRY_STORAGE_S3_SECRETKEY
-
Procedure
Use the following procedure if the Registry Operator cannot create an S3 bucket and automatically configure storage.
- Set up a Bucket Lifecycle Policy to abort incomplete multipart uploads that are one day old.
Fill in the storage configuration in
:configs.imageregistry.operator.openshift.io/cluster$ oc edit configs.imageregistry.operator.openshift.io/clusterExample configuration
storage: s3: bucket: <bucket-name> region: <region-name>
To secure your registry images in AWS, block public access to the S3 bucket.
3.1.3. Image Registry Operator configuration parameters for AWS S3 Link kopierenLink in die Zwischenablage kopiert!
The following configuration parameters are available for AWS S3 registry storage.
The image registry
spec.storage.s3
| Parameter | Description |
|---|---|
|
| Bucket is the bucket name in which you want to store the registry’s data. It is optional and is generated if not provided. |
|
| Region is the AWS region in which your bucket exists. It is optional and is set based on the installed AWS Region. |
|
| RegionEndpoint is the endpoint for S3 compatible storage services. It is optional and defaults based on the Region that is provided. |
|
| VirtualHostedStyle enables using S3 virtual hosted style bucket paths with a custom RegionEndpoint. It is optional and defaults to false. Set this parameter to deploy OpenShift Container Platform to hidden regions. |
|
| Encrypt specifies whether or not the registry stores the image in encrypted format. It is optional and defaults to false. |
|
| KeyID is the KMS key ID to use for encryption. It is optional. Encrypt must be true, or this parameter is ignored. |
|
| CloudFront configures Amazon Cloudfront as the storage middleware in a registry. It is optional. |
|
| The namespace for the config map referenced by
|
When the value of the
regionEndpoint
regionEndpoint: http://rook-ceph-rgw-ocs-storagecluster-cephobjectstore.openshift-storage.svc.cluster.local
3.2. Configuring the registry for Google Cloud user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
3.2.1. Configuring a secret for the Image Registry Operator Link kopierenLink in die Zwischenablage kopiert!
In addition to the
configs.imageregistry.operator.openshift.io
openshift-image-registry
The
image-registry-private-configuration-user
For GCS on Google Cloud storage, the secret is expected to contain one key whose value is the contents of a credentials file provided by Google Cloud:
-
REGISTRY_STORAGE_GCS_KEYFILE
Procedure
Create an OpenShift Container Platform secret that contains the required keys.
$ oc create secret generic image-registry-private-configuration-user --from-file=REGISTRY_STORAGE_GCS_KEYFILE=<path_to_keyfile> --namespace openshift-image-registry
3.2.2. Configuring the registry storage for Google Cloud with user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
If the Registry Operator cannot create a Google Cloud bucket, you must set up the storage medium manually and configure the settings in the registry custom resource (CR).
Prerequisites
- A cluster on Google Cloud with user-provisioned infrastructure.
- To configure registry storage for Google Cloud, you need to provide Registry Operator cloud credentials.
For GCS on Google Cloud storage, the secret is expected to contain one key whose value is the contents of a credentials file provided by Google Cloud:
-
REGISTRY_STORAGE_GCS_KEYFILE
-
Procedure
- Set up an Object Lifecycle Management policy to abort incomplete multipart uploads that are one day old.
Fill in the storage configuration in
:configs.imageregistry.operator.openshift.io/cluster$ oc edit configs.imageregistry.operator.openshift.io/clusterExample configuration
# ... storage: gcs: bucket: <bucket-name> projectID: <project-id> region: <region-name> # ...
You can secure your registry images that use a Google Cloud Storage bucket by setting public access prevention.
3.2.3. Image Registry Operator configuration parameters for Google Cloud GCS Link kopierenLink in die Zwischenablage kopiert!
The following configuration parameters are available for Google Cloud GCS registry storage.
| Parameter | Description |
|---|---|
|
| Bucket is the bucket name in which you want to store the registry’s data. It is optional and is generated if not provided. |
|
| Region is the GCS location in which your bucket exists. It is optional and is set based on the installed GCS Region. |
|
| ProjectID is the Project ID of the Google Cloud project that this bucket should be associated with. It is optional. |
|
| KeyID is the KMS key ID to use for encryption. It is optional because buckets are encrypted by default on Google Cloud. This allows for the use of a custom encryption key. |
3.3. Configuring the registry for OpenStack user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
You can configure the registry of a cluster that runs on your own Red Hat OpenStack Platform (RHOSP) infrastructure.
3.3.1. Configuring Image Registry Operator redirects Link kopierenLink in die Zwischenablage kopiert!
By disabling redirects, you can configure the Image Registry Operator to control whether clients such as OpenShift Container Platform cluster builds or external systems like developer machines are redirected to pull images directly from Red Hat OpenStack Platform (RHOSP) Swift storage. This configuration is optional and depends on whether the clients trust the storage’s SSL/TLS certificates.
In situations where clients to not trust the storage certificate, setting the
disableRedirect
true
Alternatively, if clients trust the storage certificate, the registry can allow redirects. This reduces resource demand on the registry itself.
Some users might prefer to configure their clients to trust their self-signed certificate authorities (CAs) instead of disabling redirects. If you are using a self-signed CA, you must decide between trusting the custom CAs or disabling redirects.
Procedure
To ensures that the image registry proxies traffic instead of relying on Swift storage, change the value of the
field in thespec.disableRedirectobject toconfig.imageregistryby running the following command:true$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"disableRedirect":true}}'
3.3.2. Configuring a secret for the Image Registry Operator Link kopierenLink in die Zwischenablage kopiert!
In addition to the
configs.imageregistry.operator.openshift.io
openshift-image-registry
The
image-registry-private-configuration-user
For Swift on Red Hat OpenStack Platform (RHOSP) storage, the secret is expected to contain the following two keys:
-
REGISTRY_STORAGE_SWIFT_USERNAME -
REGISTRY_STORAGE_SWIFT_PASSWORD
Procedure
Create an OpenShift Container Platform secret that contains the required keys.
$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_SWIFT_USERNAME=<username> --from-literal=REGISTRY_STORAGE_SWIFT_PASSWORD=<password> -n openshift-image-registry
3.3.3. Registry storage for RHOSP with user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
If the Registry Operator cannot create a Swift bucket, you must set up the storage medium manually and configure the settings in the registry custom resource (CR).
Prerequisites
- A cluster on Red Hat OpenStack Platform (RHOSP) with user-provisioned infrastructure.
- To configure registry storage for RHOSP, you need to provide Registry Operator cloud credentials.
For Swift on RHOSP storage, the secret is expected to contain the following two keys:
-
REGISTRY_STORAGE_SWIFT_USERNAME -
REGISTRY_STORAGE_SWIFT_PASSWORD
-
Procedure
Fill in the storage configuration in
:configs.imageregistry.operator.openshift.io/cluster$ oc edit configs.imageregistry.operator.openshift.io/clusterExample configuration
# ... storage: swift: container: <container-id> # ...
3.3.4. Image Registry Operator configuration parameters for RHOSP Swift Link kopierenLink in die Zwischenablage kopiert!
The following configuration parameters are available for Red Hat OpenStack Platform (RHOSP) Swift registry storage.
| Parameter | Description |
|---|---|
|
| Defines the URL for obtaining the authentication token. This value is optional. |
|
| Specifies the Auth version of RHOSP, for example,
|
|
| Defines the name of a Swift container for storing registry data. This value is optional. |
|
| Specifies the RHOSP domain name for the Identity v3 API. This value is optional. |
|
| Specifies the RHOSP domain ID for the Identity v3 API. This value is optional. |
|
| Defines the RHOSP tenant name to be used by the registry. This value is optional. |
|
| Defines the RHOSP tenant ID to be used by the registry. This value is optional. |
|
| Defines the RHOSP region in which the container exists. This value is optional. |
3.4. Configuring the registry for Azure user-provisioned infrastructure Link kopierenLink in die Zwischenablage kopiert!
3.4.1. Configuring a secret for the Image Registry Operator Link kopierenLink in die Zwischenablage kopiert!
In addition to the
configs.imageregistry.operator.openshift.io
openshift-image-registry
The
image-registry-private-configuration-user
For Azure registry storage, the secret is expected to contain one key whose value is the contents of a credentials file provided by Azure:
-
REGISTRY_STORAGE_AZURE_ACCOUNTKEY
Procedure
Create an OpenShift Container Platform secret that contains the required key.
$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_AZURE_ACCOUNTKEY=<accountkey> --namespace openshift-image-registry
3.4.2. Configuring registry storage for Azure Link kopierenLink in die Zwischenablage kopiert!
During installation, your cloud credentials are sufficient to create Azure Blob Storage, and the Registry Operator automatically configures storage.
Prerequisites
- A cluster on Azure with user-provisioned infrastructure.
- To configure registry storage for Azure, provide Registry Operator cloud credentials.
For Azure storage the secret is expected to contain one key:
-
REGISTRY_STORAGE_AZURE_ACCOUNTKEY
-
Procedure
- Create an Azure storage container.
Fill in the storage configuration in
:configs.imageregistry.operator.openshift.io/cluster$ oc edit configs.imageregistry.operator.openshift.io/clusterExample configuration
storage: azure: accountName: <storage-account-name> container: <container-name>
3.4.3. Configuring registry storage for Azure Government Link kopierenLink in die Zwischenablage kopiert!
During installation, your cloud credentials are sufficient to create Azure Blob Storage, and the Registry Operator automatically configures storage.
Prerequisites
- A cluster on Azure with user-provisioned infrastructure in a government region.
- To configure registry storage for Azure, provide Registry Operator cloud credentials.
For Azure storage, the secret is expected to contain one key:
-
REGISTRY_STORAGE_AZURE_ACCOUNTKEY
-
Procedure
- Create an Azure storage container.
Fill in the storage configuration in
:configs.imageregistry.operator.openshift.io/cluster$ oc edit configs.imageregistry.operator.openshift.io/clusterExample configuration
storage: azure: accountName: <storage-account-name> container: <container-name> cloudName: AzureUSGovernmentCloud1 - 1
cloudNameis the name of the Azure cloud environment, which can be used to configure the Azure SDK with the appropriate Azure API endpoints. Defaults toAzurePublicCloud. You can also setcloudNametoAzureUSGovernmentCloud,AzureChinaCloud, orAzureGermanCloudwith sufficient credentials.
3.5. Configuring the registry for RHOSP Link kopierenLink in die Zwischenablage kopiert!
3.5.1. Configuring an image registry with custom storage on clusters that run on RHOSP Link kopierenLink in die Zwischenablage kopiert!
After you install a cluster on Red Hat OpenStack Platform (RHOSP), you can use a Cinder volume that is in a specific availability zone for registry storage.
Procedure
Create a YAML file that specifies the storage class and availability zone to use. For example:
apiVersion: storage.k8s.io/v1 kind: StorageClass metadata: name: custom-csi-storageclass provisioner: cinder.csi.openstack.org volumeBindingMode: WaitForFirstConsumer allowVolumeExpansion: true parameters: availability: <availability_zone_name>NoteOpenShift Container Platform does not verify the existence of the availability zone you choose. Verify the name of the availability zone before you apply the configuration.
From a command line, apply the configuration:
$ oc apply -f <storage_class_file_name>Example output
storageclass.storage.k8s.io/custom-csi-storageclass createdCreate a YAML file that specifies a persistent volume claim (PVC) that uses your storage class and the
namespace. For example:openshift-image-registryapiVersion: v1 kind: PersistentVolumeClaim metadata: name: csi-pvc-imageregistry namespace: openshift-image-registry1 annotations: imageregistry.openshift.io: "true" spec: accessModes: - ReadWriteOnce volumeMode: Filesystem resources: requests: storage: 100Gi2 storageClassName: <your_custom_storage_class>3 From a command line, apply the configuration:
$ oc apply -f <pvc_file_name>Example output
persistentvolumeclaim/csi-pvc-imageregistry createdReplace the original persistent volume claim in the image registry configuration with the new claim:
$ oc patch configs.imageregistry.operator.openshift.io/cluster --type 'json' -p='[{"op": "replace", "path": "/spec/storage/pvc/claim", "value": "csi-pvc-imageregistry"}]'Example output
config.imageregistry.operator.openshift.io/cluster patchedOver the next several minutes, the configuration is updated.
Verification
To confirm that the registry is using the resources that you defined:
Verify that the PVC claim value is identical to the name that you provided in your PVC definition:
$ oc get configs.imageregistry.operator.openshift.io/cluster -o yamlExample output
... status: ... managementState: Managed pvc: claim: csi-pvc-imageregistry ...Verify that the status of the PVC is
:Bound$ oc get pvc -n openshift-image-registry csi-pvc-imageregistryExample output
NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE csi-pvc-imageregistry Bound pvc-72a8f9c9-f462-11e8-b6b6-fa163e18b7b5 100Gi RWO custom-csi-storageclass 11m
3.6. Configuring the registry for bare metal Link kopierenLink in die Zwischenablage kopiert!
3.6.1. Image registry removed during installation Link kopierenLink in die Zwischenablage kopiert!
On platforms that do not provide shareable object storage, the OpenShift Image Registry Operator bootstraps itself as
Removed
openshift-installer
After installation, you must edit the Image Registry Operator configuration to switch the
managementState
Removed
Managed
3.6.2. Changing the image registry’s management state Link kopierenLink in die Zwischenablage kopiert!
To start the image registry, you must change the Image Registry Operator configuration’s
managementState
Removed
Managed
Procedure
Change
Image Registry Operator configuration frommanagementStatetoRemoved. For example:Managed$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"managementState":"Managed"}}'
3.6.3. Image registry storage configuration Link kopierenLink in die Zwischenablage kopiert!
The Image Registry Operator is not initially available for platforms that do not provide default storage. After installation, you must configure your registry to use storage so that the Registry Operator is made available.
Instructions are shown for configuring a persistent volume, which is required for production clusters. Where applicable, instructions are shown for configuring an empty directory as the storage location, which is available for only non-production clusters.
Additional instructions are provided for allowing the image registry to use block storage types by using the
Recreate
3.6.3.1. Configuring registry storage for bare metal and other manual installations Link kopierenLink in die Zwischenablage kopiert!
As a cluster administrator, following installation you must configure your registry to use storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have a cluster that uses manually-provisioned Red Hat Enterprise Linux CoreOS (RHCOS) nodes, such as bare metal.
You have provisioned persistent storage for your cluster, such as Red Hat OpenShift Data Foundation.
ImportantOpenShift Container Platform supports
access for image registry storage when you have only one replica.ReadWriteOnceaccess also requires that the registry uses theReadWriteOncerollout strategy. To deploy an image registry that supports high availability with two or more replicas,Recreateaccess is required.ReadWriteMany- Must have 100Gi capacity.
Procedure
To configure your registry to use storage, change the
in thespec.storage.pvcresource.configs.imageregistry/clusterNoteWhen you use shared storage, review your security settings to prevent outside access.
Verify that you do not have a registry pod:
$ oc get pod -n openshift-image-registry -l docker-registry=defaultExample output
No resources found in openshift-image-registry namespaceNoteIf you do have a registry pod in your output, you do not need to continue with this procedure.
Check the registry configuration:
$ oc edit configs.imageregistry.operator.openshift.ioExample output
storage: pvc: claim:Leave the
field blank to allow the automatic creation of anclaimPVC.image-registry-storageCheck the
status:clusteroperator$ oc get clusteroperator image-registryExample output
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE image-registry 4.12 True False False 6h50mEnsure that your registry is set to managed to enable building and pushing of images.
Run:
$ oc edit configs.imageregistry/clusterThen, change the line
managementState: Removedto
managementState: Managed
3.6.3.2. Configuring storage for the image registry in non-production clusters Link kopierenLink in die Zwischenablage kopiert!
You must configure storage for the Image Registry Operator. For non-production clusters, you can set the image registry to an empty directory. If you do so, all images are lost if you restart the registry.
Procedure
To set the image registry storage to an empty directory:
$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"storage":{"emptyDir":{}}}}'WarningConfigure this option for only non-production clusters.
If you run this command before the Image Registry Operator initializes its components, the
command fails with the following error:oc patchError from server (NotFound): configs.imageregistry.operator.openshift.io "cluster" not foundWait a few minutes and run the command again.
3.6.3.3. Configuring block registry storage for bare metal Link kopierenLink in die Zwischenablage kopiert!
To allow the image registry to use block storage types during upgrades as a cluster administrator, you can use the
Recreate
Block storage volumes, or block persistent volumes, are supported but not recommended for use with the image registry on production clusters. An installation where the registry is configured on block storage is not highly available because the registry cannot have more than one replica.
If you choose to use a block storage volume with the image registry, you must use a filesystem persistent volume claim (PVC).
Procedure
Enter the following command to set the image registry storage as a block storage type, patch the registry so that it uses the
rollout strategy, and runs with only one (Recreate) replica:1$ oc patch config.imageregistry.operator.openshift.io/cluster --type=merge -p '{"spec":{"rolloutStrategy":"Recreate","replicas":1}}'Provision the PV for the block storage device, and create a PVC for that volume. The requested block volume uses the ReadWriteOnce (RWO) access mode.
Create a
file with the following contents to define a VMware vSpherepvc.yamlobject:PersistentVolumeClaimkind: PersistentVolumeClaim apiVersion: v1 metadata: name: image-registry-storage1 namespace: openshift-image-registry2 spec: accessModes: - ReadWriteOnce3 resources: requests: storage: 100Gi4 - 1
- A unique name that represents the
PersistentVolumeClaimobject. - 2
- The namespace for the
PersistentVolumeClaimobject, which isopenshift-image-registry. - 3
- The access mode of the persistent volume claim. With
ReadWriteOnce, the volume can be mounted with read and write permissions by a single node. - 4
- The size of the persistent volume claim.
Enter the following command to create the
object from the file:PersistentVolumeClaim$ oc create -f pvc.yaml -n openshift-image-registry
Enter the following command to edit the registry configuration so that it references the correct PVC:
$ oc edit config.imageregistry.operator.openshift.io -o yamlExample output
storage: pvc: claim:1 - 1
- By creating a custom PVC, you can leave the
claimfield blank for the default automatic creation of animage-registry-storagePVC.
3.6.3.4. Configuring the Image Registry Operator to use Ceph RGW storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Ceph RGW storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Ceph RGW object storage.
Procedure
Create the object bucket claim using the
storage class. For example:ocs-storagecluster-ceph-rgwcat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: rgwbucket namespace: openshift-storage1 spec: storageClassName: ocs-storagecluster-ceph-rgw generateBucketName: rgwbucket EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage rgwbucket -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_ACCESS_KEY_ID}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_SECRET_ACCESS_KEY}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the
host by entering the following command:route$ route_host=$(oc get route ocs-storagecluster-cephobjectstore -n openshift-storage --template='{{ .spec.host }}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Ceph RGW object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.6.3.5. Configuring the Image Registry Operator to use Noobaa storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Noobaa storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Noobaa object storage.
Procedure
Create the object bucket claim using the
storage class. For example:openshift-storage.noobaa.iocat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: noobaatest namespace: openshift-storage1 spec: storageClassName: openshift-storage.noobaa.io generateBucketName: noobaatest EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage noobaatest -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_ACCESS_KEY_ID:" | head -n1 | awk '{print $2}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_SECRET_ACCESS_KEY:" | head -n1 | awk '{print $2}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the route host by entering the following command:
$ route_host=$(oc get route s3 -n openshift-storage -o=jsonpath='{.spec.host}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Nooba object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.6.4. Configuring the Image Registry Operator to use CephFS storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use CephFS storage.
CephFS uses persistent volume claim (PVC) storage. It is not recommended to use PVCs for image registry storage if there are other options are available, such as Ceph RGW or Noobaa.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and CephFS file storage.
Procedure
Create a PVC to use the
storage class. For example:cephfscat <<EOF | oc apply -f - apiVersion: v1 kind: PersistentVolumeClaim metadata: name: registry-storage-pvc namespace: openshift-image-registry spec: accessModes: - ReadWriteMany resources: requests: storage: 100Gi storageClassName: ocs-storagecluster-cephfs EOFConfigure the image registry to use the CephFS file system storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","pvc":{"claim":"registry-storage-pvc"}}}}' --type=merge
3.7. Configuring the registry for vSphere Link kopierenLink in die Zwischenablage kopiert!
3.7.1. Image registry removed during installation Link kopierenLink in die Zwischenablage kopiert!
On platforms that do not provide shareable object storage, the OpenShift Image Registry Operator bootstraps itself as
Removed
openshift-installer
After installation, you must edit the Image Registry Operator configuration to switch the
managementState
Removed
Managed
3.7.2. Changing the image registry’s management state Link kopierenLink in die Zwischenablage kopiert!
To start the image registry, you must change the Image Registry Operator configuration’s
managementState
Removed
Managed
Procedure
Change
Image Registry Operator configuration frommanagementStatetoRemoved. For example:Managed$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"managementState":"Managed"}}'
3.7.3. Image registry storage configuration Link kopierenLink in die Zwischenablage kopiert!
The Image Registry Operator is not initially available for platforms that do not provide default storage. After installation, you must configure your registry to use storage so that the Registry Operator is made available.
Instructions are shown for configuring a persistent volume, which is required for production clusters. Where applicable, instructions are shown for configuring an empty directory as the storage location, which is available for only non-production clusters.
Additional instructions are provided for allowing the image registry to use block storage types by using the
Recreate
3.7.3.1. Configuring registry storage for VMware vSphere Link kopierenLink in die Zwischenablage kopiert!
As a cluster administrator, following installation you must configure your registry to use storage.
Prerequisites
- Cluster administrator permissions.
- A cluster on VMware vSphere.
Persistent storage provisioned for your cluster, such as Red Hat OpenShift Data Foundation.
ImportantOpenShift Container Platform supports
access for image registry storage when you have only one replica.ReadWriteOnceaccess also requires that the registry uses theReadWriteOncerollout strategy. To deploy an image registry that supports high availability with two or more replicas,Recreateaccess is required.ReadWriteMany- Must have "100Gi" capacity.
Testing shows issues with using the NFS server on RHEL as storage backend for core services. This includes the OpenShift Container Registry and Quay, Prometheus for monitoring storage, and Elasticsearch for logging storage. Therefore, using RHEL NFS to back PVs used by core services is not recommended.
Other NFS implementations on the marketplace might not have these issues. Contact the individual NFS implementation vendor for more information on any testing that was possibly completed against these OpenShift Container Platform core components.
Procedure
To configure your registry to use storage, change the
in thespec.storage.pvcresource.configs.imageregistry/clusterNoteWhen you use shared storage, review your security settings to prevent outside access.
Verify that you do not have a registry pod:
$ oc get pod -n openshift-image-registry -l docker-registry=defaultExample output
No resourses found in openshift-image-registry namespaceNoteIf you do have a registry pod in your output, you do not need to continue with this procedure.
Check the registry configuration:
$ oc edit configs.imageregistry.operator.openshift.ioExample output
storage: pvc: claim:1 - 1
- Leave the
claimfield blank to allow the automatic creation of animage-registry-storagepersistent volume claim (PVC). The PVC is generated based on the default storage class. However, be aware that the default storage class might provide ReadWriteOnce (RWO) volumes, such as a RADOS Block Device (RBD), which can cause issues when you replicate to more than one replica.
Check the
status:clusteroperator$ oc get clusteroperator image-registryExample output
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE image-registry 4.7 True False False 6h50m
3.7.3.2. Configuring storage for the image registry in non-production clusters Link kopierenLink in die Zwischenablage kopiert!
You must configure storage for the Image Registry Operator. For non-production clusters, you can set the image registry to an empty directory. If you do so, all images are lost if you restart the registry.
Procedure
To set the image registry storage to an empty directory:
$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"storage":{"emptyDir":{}}}}'WarningConfigure this option for only non-production clusters.
If you run this command before the Image Registry Operator initializes its components, the
command fails with the following error:oc patchError from server (NotFound): configs.imageregistry.operator.openshift.io "cluster" not foundWait a few minutes and run the command again.
3.7.3.3. Configuring block registry storage for VMware vSphere Link kopierenLink in die Zwischenablage kopiert!
To allow the image registry to use block storage types such as vSphere Virtual Machine Disk (VMDK) during upgrades as a cluster administrator, you can use the
Recreate
Block storage volumes are supported but not recommended for use with image registry on production clusters. An installation where the registry is configured on block storage is not highly available because the registry cannot have more than one replica.
Procedure
Enter the following command to set the image registry storage as a block storage type, patch the registry so that it uses the
rollout strategy, and runs with onlyRecreatereplica:1$ oc patch config.imageregistry.operator.openshift.io/cluster --type=merge -p '{"spec":{"rolloutStrategy":"Recreate","replicas":1}}'Provision the PV for the block storage device, and create a PVC for that volume. The requested block volume uses the ReadWriteOnce (RWO) access mode.
Create a
file with the following contents to define a VMware vSpherepvc.yamlobject:PersistentVolumeClaimkind: PersistentVolumeClaim apiVersion: v1 metadata: name: image-registry-storage1 namespace: openshift-image-registry2 spec: accessModes: - ReadWriteOnce3 resources: requests: storage: 100Gi4 - 1
- A unique name that represents the
PersistentVolumeClaimobject. - 2
- The namespace for the
PersistentVolumeClaimobject, which isopenshift-image-registry. - 3
- The access mode of the persistent volume claim. With
ReadWriteOnce, the volume can be mounted with read and write permissions by a single node. - 4
- The size of the persistent volume claim.
Enter the following command to create the
object from the file:PersistentVolumeClaim$ oc create -f pvc.yaml -n openshift-image-registry
Enter the following command to edit the registry configuration so that it references the correct PVC:
$ oc edit config.imageregistry.operator.openshift.io -o yamlExample output
storage: pvc: claim:1 - 1
- By creating a custom PVC, you can leave the
claimfield blank for the default automatic creation of animage-registry-storagePVC.
For instructions about configuring registry storage so that it references the correct PVC, see Configuring the registry for vSphere.
3.7.3.4. Configuring the Image Registry Operator to use Ceph RGW storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Ceph RGW storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Ceph RGW object storage.
Procedure
Create the object bucket claim using the
storage class. For example:ocs-storagecluster-ceph-rgwcat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: rgwbucket namespace: openshift-storage1 spec: storageClassName: ocs-storagecluster-ceph-rgw generateBucketName: rgwbucket EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage rgwbucket -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_ACCESS_KEY_ID}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_SECRET_ACCESS_KEY}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the
host by entering the following command:route$ route_host=$(oc get route ocs-storagecluster-cephobjectstore -n openshift-storage --template='{{ .spec.host }}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Ceph RGW object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.7.3.5. Configuring the Image Registry Operator to use Noobaa storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Noobaa storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Noobaa object storage.
Procedure
Create the object bucket claim using the
storage class. For example:openshift-storage.noobaa.iocat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: noobaatest namespace: openshift-storage1 spec: storageClassName: openshift-storage.noobaa.io generateBucketName: noobaatest EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage noobaatest -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_ACCESS_KEY_ID:" | head -n1 | awk '{print $2}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_SECRET_ACCESS_KEY:" | head -n1 | awk '{print $2}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the route host by entering the following command:
$ route_host=$(oc get route s3 -n openshift-storage -o=jsonpath='{.spec.host}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Nooba object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.7.4. Configuring the Image Registry Operator to use CephFS storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use CephFS storage.
CephFS uses persistent volume claim (PVC) storage. It is not recommended to use PVCs for image registry storage if there are other options are available, such as Ceph RGW or Noobaa.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and CephFS file storage.
Procedure
Create a PVC to use the
storage class. For example:cephfscat <<EOF | oc apply -f - apiVersion: v1 kind: PersistentVolumeClaim metadata: name: registry-storage-pvc namespace: openshift-image-registry spec: accessModes: - ReadWriteMany resources: requests: storage: 100Gi storageClassName: ocs-storagecluster-cephfs EOFConfigure the image registry to use the CephFS file system storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","pvc":{"claim":"registry-storage-pvc"}}}}' --type=merge
3.8. Configuring the registry for Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
To configure the OpenShift image registry on bare metal and vSphere to use Red Hat OpenShift Data Foundation storage, you must install OpenShift Data Foundation and then configure image registry using Ceph or Noobaa.
3.8.1. Configuring the Image Registry Operator to use Ceph RGW storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Ceph RGW storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Ceph RGW object storage.
Procedure
Create the object bucket claim using the
storage class. For example:ocs-storagecluster-ceph-rgwcat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: rgwbucket namespace: openshift-storage1 spec: storageClassName: ocs-storagecluster-ceph-rgw generateBucketName: rgwbucket EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage rgwbucket -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_ACCESS_KEY_ID}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_SECRET_ACCESS_KEY}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the
host by entering the following command:route$ route_host=$(oc get route ocs-storagecluster-cephobjectstore -n openshift-storage --template='{{ .spec.host }}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Ceph RGW object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.8.2. Configuring the Image Registry Operator to use Noobaa storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Noobaa storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Noobaa object storage.
Procedure
Create the object bucket claim using the
storage class. For example:openshift-storage.noobaa.iocat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: noobaatest namespace: openshift-storage1 spec: storageClassName: openshift-storage.noobaa.io generateBucketName: noobaatest EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage noobaatest -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_ACCESS_KEY_ID:" | head -n1 | awk '{print $2}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_SECRET_ACCESS_KEY:" | head -n1 | awk '{print $2}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the route host by entering the following command:
$ route_host=$(oc get route s3 -n openshift-storage -o=jsonpath='{.spec.host}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Nooba object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.8.3. Configuring the Image Registry Operator to use CephFS storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use CephFS storage.
CephFS uses persistent volume claim (PVC) storage. It is not recommended to use PVCs for image registry storage if there are other options are available, such as Ceph RGW or Noobaa.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and CephFS file storage.
Procedure
Create a PVC to use the
storage class. For example:cephfscat <<EOF | oc apply -f - apiVersion: v1 kind: PersistentVolumeClaim metadata: name: registry-storage-pvc namespace: openshift-image-registry spec: accessModes: - ReadWriteMany resources: requests: storage: 100Gi storageClassName: ocs-storagecluster-cephfs EOFConfigure the image registry to use the CephFS file system storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","pvc":{"claim":"registry-storage-pvc"}}}}' --type=merge
3.9. Configuring the registry for Nutanix Link kopierenLink in die Zwischenablage kopiert!
By following the steps outlined in this documentation, users can optimize container image distribution, security, and access controls, enabling a robust foundation for Nutanix applications on OpenShift Container Platform
3.9.1. Image registry removed during installation Link kopierenLink in die Zwischenablage kopiert!
On platforms that do not provide shareable object storage, the OpenShift Image Registry Operator bootstraps itself as
Removed
openshift-installer
After installation, you must edit the Image Registry Operator configuration to switch the
managementState
Removed
Managed
3.9.2. Changing the image registry’s management state Link kopierenLink in die Zwischenablage kopiert!
To start the image registry, you must change the Image Registry Operator configuration’s
managementState
Removed
Managed
Procedure
Change
Image Registry Operator configuration frommanagementStatetoRemoved. For example:Managed$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"managementState":"Managed"}}'
3.9.3. Image registry storage configuration Link kopierenLink in die Zwischenablage kopiert!
The Image Registry Operator is not initially available for platforms that do not provide default storage. After installation, you must configure your registry to use storage so that the Registry Operator is made available.
Instructions are shown for configuring a persistent volume, which is required for production clusters. Where applicable, instructions are shown for configuring an empty directory as the storage location, which is available for only non-production clusters.
Additional instructions are provided for allowing the image registry to use block storage types by using the
Recreate
3.9.3.1. Configuring registry storage for Nutanix Link kopierenLink in die Zwischenablage kopiert!
As a cluster administrator, following installation you must configure your registry to use storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have a cluster on Nutanix.
You have provisioned persistent storage for your cluster, such as Red Hat OpenShift Data Foundation.
ImportantOpenShift Container Platform supports
access for image registry storage when you have only one replica.ReadWriteOnceaccess also requires that the registry uses theReadWriteOncerollout strategy. To deploy an image registry that supports high availability with two or more replicas,Recreateaccess is required.ReadWriteMany- You must have 100 Gi capacity.
Procedure
To configure your registry to use storage, change the
in thespec.storage.pvcresource.configs.imageregistry/clusterNoteWhen you use shared storage, review your security settings to prevent outside access.
Verify that you do not have a registry pod:
$ oc get pod -n openshift-image-registry -l docker-registry=defaultExample output
No resourses found in openshift-image-registry namespaceNoteIf you do have a registry pod in your output, you do not need to continue with this procedure.
Check the registry configuration:
$ oc edit configs.imageregistry.operator.openshift.ioExample output
storage: pvc: claim:1 - 1
- Leave the
claimfield blank to allow the automatic creation of animage-registry-storagepersistent volume claim (PVC). The PVC is generated based on the default storage class. However, be aware that the default storage class might provide ReadWriteOnce (RWO) volumes, such as a RADOS Block Device (RBD), which can cause issues when you replicate to more than one replica.
Check the
status:clusteroperator$ oc get clusteroperator image-registryExample output
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE image-registry 4.13 True False False 6h50m
3.9.3.2. Configuring storage for the image registry in non-production clusters Link kopierenLink in die Zwischenablage kopiert!
You must configure storage for the Image Registry Operator. For non-production clusters, you can set the image registry to an empty directory. If you do so, all images are lost if you restart the registry.
Procedure
To set the image registry storage to an empty directory:
$ oc patch configs.imageregistry.operator.openshift.io cluster --type merge --patch '{"spec":{"storage":{"emptyDir":{}}}}'WarningConfigure this option for only non-production clusters.
If you run this command before the Image Registry Operator initializes its components, the
command fails with the following error:oc patchError from server (NotFound): configs.imageregistry.operator.openshift.io "cluster" not foundWait a few minutes and run the command again.
3.9.3.3. Configuring block registry storage for Nutanix volumes Link kopierenLink in die Zwischenablage kopiert!
To allow the image registry to use block storage types such as Nutanix volumes during upgrades as a cluster administrator, you can use the
Recreate
Block storage volumes, or block persistent volumes, are supported but not recommended for use with the image registry on production clusters. An installation where the registry is configured on block storage is not highly available because the registry cannot have more than one replica.
If you choose to use a block storage volume with the image registry, you must use a filesystem persistent volume claim (PVC).
Procedure
Enter the following command to set the image registry storage as a block storage type, patch the registry so that it uses the
rollout strategy, and runs with only one (Recreate) replica:1$ oc patch config.imageregistry.operator.openshift.io/cluster --type=merge -p '{"spec":{"rolloutStrategy":"Recreate","replicas":1}}'Provision the PV for the block storage device, and create a PVC for that volume. The requested block volume uses the ReadWriteOnce (RWO) access mode.
Create a
file with the following contents to define a Nutanixpvc.yamlobject:PersistentVolumeClaimkind: PersistentVolumeClaim apiVersion: v1 metadata: name: image-registry-storage1 namespace: openshift-image-registry2 spec: accessModes: - ReadWriteOnce3 resources: requests: storage: 100Gi4 - 1
- A unique name that represents the
PersistentVolumeClaimobject. - 2
- The namespace for the
PersistentVolumeClaimobject, which isopenshift-image-registry. - 3
- The access mode of the persistent volume claim. With
ReadWriteOnce, the volume can be mounted with read and write permissions by a single node. - 4
- The size of the persistent volume claim.
Enter the following command to create the
object from the file:PersistentVolumeClaim$ oc create -f pvc.yaml -n openshift-image-registry
Enter the following command to edit the registry configuration so that it references the correct PVC:
$ oc edit config.imageregistry.operator.openshift.io -o yamlExample output
storage: pvc: claim:1 - 1
- By creating a custom PVC, you can leave the
claimfield blank for the default automatic creation of animage-registry-storagePVC.
3.9.3.4. Configuring the Image Registry Operator to use Ceph RGW storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Ceph RGW storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Ceph RGW object storage.
Procedure
Create the object bucket claim using the
storage class. For example:ocs-storagecluster-ceph-rgwcat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: rgwbucket namespace: openshift-storage1 spec: storageClassName: ocs-storagecluster-ceph-rgw generateBucketName: rgwbucket EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage rgwbucket -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_ACCESS_KEY_ID}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage rgwbucket -o jsonpath='{.data.AWS_SECRET_ACCESS_KEY}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the
host by entering the following command:route$ route_host=$(oc get route ocs-storagecluster-cephobjectstore -n openshift-storage --template='{{ .spec.host }}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Ceph RGW object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.9.3.5. Configuring the Image Registry Operator to use Noobaa storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use Noobaa storage.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and Noobaa object storage.
Procedure
Create the object bucket claim using the
storage class. For example:openshift-storage.noobaa.iocat <<EOF | oc apply -f - apiVersion: objectbucket.io/v1alpha1 kind: ObjectBucketClaim metadata: name: noobaatest namespace: openshift-storage1 spec: storageClassName: openshift-storage.noobaa.io generateBucketName: noobaatest EOF- 1
- Alternatively, you can use the
openshift-image-registrynamespace.
Get the bucket name by entering the following command:
$ bucket_name=$(oc get obc -n openshift-storage noobaatest -o jsonpath='{.spec.bucketName}')Get the AWS credentials by entering the following commands:
$ AWS_ACCESS_KEY_ID=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_ACCESS_KEY_ID:" | head -n1 | awk '{print $2}' | base64 --decode)$ AWS_SECRET_ACCESS_KEY=$(oc get secret -n openshift-storage noobaatest -o yaml | grep -w "AWS_SECRET_ACCESS_KEY:" | head -n1 | awk '{print $2}' | base64 --decode)Create the secret
with the AWS credentials for the new bucket underimage-registry-private-configuration-userby entering the following command:openshift-image-registry project$ oc create secret generic image-registry-private-configuration-user --from-literal=REGISTRY_STORAGE_S3_ACCESSKEY=${AWS_ACCESS_KEY_ID} --from-literal=REGISTRY_STORAGE_S3_SECRETKEY=${AWS_SECRET_ACCESS_KEY} --namespace openshift-image-registryGet the route host by entering the following command:
$ route_host=$(oc get route s3 -n openshift-storage -o=jsonpath='{.spec.host}')Create a config map that uses an ingress certificate by entering the following commands:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirm$ oc create configmap image-registry-s3-bundle --from-file=ca-bundle.crt=./tls.crt -n openshift-configConfigure the image registry to use the Nooba object storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","s3":{"bucket":'\"${bucket_name}\"',"region":"us-east-1","regionEndpoint":'\"https://${route_host}\"',"virtualHostedStyle":false,"encrypt":false,"trustedCA":{"name":"image-registry-s3-bundle"}}}}}' --type=merge
3.9.4. Configuring the Image Registry Operator to use CephFS storage with Red Hat OpenShift Data Foundation Link kopierenLink in die Zwischenablage kopiert!
Red Hat OpenShift Data Foundation integrates multiple storage types that you can use with the OpenShift image registry:
- Ceph, a shared and distributed file system and on-premise object storage
- NooBaa, providing a Multicloud Object Gateway
This document outlines the procedure to configure the image registry to use CephFS storage.
CephFS uses persistent volume claim (PVC) storage. It is not recommended to use PVCs for image registry storage if there are other options are available, such as Ceph RGW or Noobaa.
Prerequisites
-
You have access to the cluster as a user with the role.
cluster-admin - You have access to the OpenShift Container Platform web console.
-
You installed the CLI.
oc - You installed the OpenShift Data Foundation Operator to provide object storage and CephFS file storage.
Procedure
Create a PVC to use the
storage class. For example:cephfscat <<EOF | oc apply -f - apiVersion: v1 kind: PersistentVolumeClaim metadata: name: registry-storage-pvc namespace: openshift-image-registry spec: accessModes: - ReadWriteMany resources: requests: storage: 100Gi storageClassName: ocs-storagecluster-cephfs EOFConfigure the image registry to use the CephFS file system storage by entering the following command:
$ oc patch config.image/cluster -p '{"spec":{"managementState":"Managed","replicas":2,"storage":{"managementState":"Unmanaged","pvc":{"claim":"registry-storage-pvc"}}}}' --type=merge