Este conteúdo não está disponível no idioma selecionado.
Chapter 6. Using the config tool to reconfigure Quay on OpenShift
6.1. Accessing the config editor Copiar o linkLink copiado para a área de transferência!
In the Details section of the QuayRegistry screen, the endpoint for the config editor is available, along with a link to the secret containing the credentials for logging into the config editor:
6.1.1. Retrieving the config editor credentials Copiar o linkLink copiado para a área de transferência!
Click on the link for the config editor secret:
In the Data section of the Secret details screen, click
Reveal valuesto see the credentials for logging in to the config editor:
6.1.2. Logging in to the config editor Copiar o linkLink copiado para a área de transferência!
Browse to the config editor endpoint and then enter the username, typically quayconfig, and the corresponding password to access the config tool:
6.1.3. Changing configuration Copiar o linkLink copiado para a área de transferência!
In the following example, you will update your configuration file by changing the default expiration period of deleted tags.
Procedure
- On the config editor, locate the Time Machine section.
Add an expiration period to the Allowed expiration periods box, for example,
4w:
- Select Validate Configuration Changes to ensure that the changes are valid.
Apply the changes by pressing Reconfigure Quay:
After applying the changes, the config tool notifies you that the changes made have been submitted to your Red Hat Quay deployment:
+
Reconfiguring Red Hat Quay using the config tool UI can lead to the registry being unavailable for a short time while the updated configuration is applied.
6.2. Monitoring reconfiguration in the UI Copiar o linkLink copiado para a área de transferência!
6.2.1. QuayRegistry resource Copiar o linkLink copiado para a área de transferência!
After reconfiguring the Operator, you can track the progress of the redeployment in the YAML tab for the specific instance of QuayRegistry, in this case, example-registry:
Each time the status changes, you will be prompted to reload the data to see the updated version. Eventually, the Operator will reconcile the changes, and there will be no unhealthy components reported.
6.2.2. Events Copiar o linkLink copiado para a área de transferência!
The Events tab for the QuayRegistry shows some events related to the redeployment:
Streaming events, for all resources in the namespace that are affected by the reconfiguration, are available in the OpenShift console under Home
6.3. Accessing updated information after reconfiguration Copiar o linkLink copiado para a área de transferência!
6.3.1. Accessing the updated config tool credentials in the UI Copiar o linkLink copiado para a área de transferência!
With Red Hat Quay 3.7, reconfiguring Quay through the UI no longer generates a new login password. The password now generates only once, and remains the same after reconciling QuayRegistry objects.
6.3.2. Accessing the updated config.yaml in the UI Copiar o linkLink copiado para a área de transferência!
Use the config bundle to access the updated config.yaml file.
- On the QuayRegistry details screen, click on the Config Bundle Secret
-
In the Data section of the Secret details screen, click Reveal values to see the
config.yamlfile Check that the change has been applied. In this case,
4wshould be in the list ofTAG_EXPIRATION_OPTIONS:... SERVER_HOSTNAME: example-quay-openshift-operators.apps.docs.quayteam.org SETUP_COMPLETE: true SUPER_USERS: - quayadmin TAG_EXPIRATION_OPTIONS: - 2w - 4w ...
6.4. Custom SSL certificates UI Copiar o linkLink copiado para a área de transferência!
The config tool can be used to load custom certificates to facilitate access to resources such as external databases. Select the custom certs to be uploaded, ensuring that they are in PEM format, with an extension .crt.
The config tool also displays a list of any uploaded certificates. Once you upload your custom SSL cert, it will appear in the list:
6.5. External Access to the Registry Copiar o linkLink copiado para a área de transferência!
When running on OpenShift, the Routes API is available and will automatically be used as a managed component. After creating the QuayRegistry, the external access point can be found in the status block of the QuayRegistry:
status:
registryEndpoint: some-quay.my-namespace.apps.mycluster.com