Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 5. Exposing the registry
By default, the OpenShift image registry is secured during cluster installation so that it serves traffic through TLS. Unlike previous versions of OpenShift Container Platform, the registry is not exposed outside of the cluster at the time of installation.
5.1. Exposing a default registry manually Link kopierenLink in die Zwischenablage kopiert!
Instead of logging in to the default OpenShift image registry from within the cluster, you can gain external access to it by exposing it with a route. This external access enables you to log in to the registry from outside the cluster using the route address and to tag and push images to an existing project by using the route host.
Prerequisites
The following prerequisites are automatically performed:
- Deploy the Registry Operator.
- Deploy the Ingress Operator.
-
You have access to the cluster as a user with the role.
cluster-admin
Procedure
You can expose the route by using the
defaultRoute
configs.imageregistry.operator.openshift.io
To expose the registry using the
defaultRoute
Set
todefaultRouteby running the following command:true$ oc patch configs.imageregistry.operator.openshift.io/cluster --patch '{"spec":{"defaultRoute":true}}' --type=mergeGet the default registry route by running the following command:
$ HOST=$(oc get route default-route -n openshift-image-registry --template='{{ .spec.host }}')Get the certificate of the Ingress Operator by running the following command:
$ oc extract secret/$(oc get ingresscontroller -n openshift-ingress-operator default -o json | jq '.spec.defaultCertificate.name // "router-certs-default"' -r) -n openshift-ingress --confirmMove the extracted certificate to the system’s trusted CA directory by running the following command:
$ sudo mv tls.crt /etc/pki/ca-trust/source/anchors/Enable the cluster’s default certificate to trust the route by running the following command:
$ sudo update-ca-trust enableLog in with podman using the default route by running the following command:
$ sudo podman login -u kubeadmin -p $(oc whoami -t) $HOST
5.2. Exposing a secure registry manually Link kopierenLink in die Zwischenablage kopiert!
Instead of logging in to the OpenShift image registry from within the cluster, you can gain external access to it by exposing it with a route. This allows you to log in to the registry from outside the cluster using the route address, and to tag and push images to an existing project by using the route host.
Prerequisites
The following prerequisites are automatically performed:
- Deploy the Registry Operator.
- Deploy the Ingress Operator.
-
You have access to the cluster as a user with the role.
cluster-admin
Procedure
You can expose the route by using
DefaultRoute
configs.imageregistry.operator.openshift.io
To expose the registry using
DefaultRoute
Set
toDefaultRoute:True$ oc patch configs.imageregistry.operator.openshift.io/cluster --patch '{"spec":{"defaultRoute":true}}' --type=mergeLog in with
:podman$ HOST=$(oc get route default-route -n openshift-image-registry --template='{{ .spec.host }}')$ podman login -u kubeadmin -p $(oc whoami -t) --tls-verify=false $HOST1 - 1
--tls-verify=falseis needed if the cluster’s default certificate for routes is untrusted. You can set a custom, trusted certificate as the default certificate with the Ingress Operator.
To expose the registry using custom routes:
Create a secret with your route’s TLS keys:
$ oc create secret tls public-route-tls \ -n openshift-image-registry \ --cert=</path/to/tls.crt> \ --key=</path/to/tls.key>This step is optional. If you do not create a secret, the route uses the default TLS configuration from the Ingress Operator.
On the Registry Operator:
$ oc edit configs.imageregistry.operator.openshift.io/clusterspec: routes: - name: public-routes hostname: myregistry.mycorp.organization secretName: public-route-tls ...NoteOnly set
if you are providing a custom TLS configuration for the registry’s route.secretName
Troubleshooting