Configure custom registry
See original GitHub issuehi
what’s the correct way to add a custom registry.yaml file to RD k3s?
in k3d i do something like this: --volume "$cfgDir/registries.yaml:/etc/rancher/k3s/registries.yaml"
thanks in advance
Issue Analytics
- State:
- Created 2 years ago
- Reactions:4
- Comments:17 (6 by maintainers)
Top Results From Across the Web
Deploy a registry server - Docker Documentation
This topic provides basic information about deploying and configuring a registry. For an exhaustive list of configuration options, see the configuration ...
Read more >How To Set Up a Private Docker Registry on Ubuntu 20.04
Step 1 — Installing and Configuring the Docker Registry · Step 2 — Setting Up Nginx Port Forwarding · Step 3 — Setting...
Read more >Configuring a custom registry - IBM
In User account repository > Available realm definitions, select Standalone custom registry from the drop-down list. Click Configure. Specify the Primary ...
Read more >A Guide to Docker Private Registry - Baeldung
In this tutorial, we'll learn to understand the use of public and private Docker registries. We'll also set up a private Docker registry....
Read more >How to create your own private Docker registry and secure it
Why use a private registry? · Control where your images are stored - A private registry gives you full control over the storage...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Copying here from Slack…
With Rancher Desktop v0.7.0, for using local insecure registries:
When the Container Runtime is
containerd
you need to make/etc/rancher/k3s/registries.yaml
withmirrors
, as shown below. Here themirrors
act like aliases, so I can have a deploymentsspec.template.spec.containers[].image
refer tonexus.lan/image:tag
andcontainerd
will pull the image fromhttp://nexus.lan:8082
When the Container Runtime is
dockerd (moby)
you need to make/etc/docker/daemon.json
withinsecure-registries
andregistry-mirrors
as shown below. But there are two problems as far as I can see.spec.template.spec.containers[].image
MUST refer tonexus.lan:8082/image:tag
- making the deployment yaml potentially incompatible betweencontainerd
anddockerd (moby)
.imagePullSecrets
pointing to asecret
of typekubernetes.io/dockerconfigjson
defined in the deployment’sspec.imagePullSecrets
or in theimagePullSecrets
of theserviceaccount
calleddefault
in thenamespace
of yourdeployment
.You can define both
/etc/rancher/k3s/registries.yaml
and/etc/docker/daemon.json
in one go by creatingoverride.yaml
in the following location:Here’s my
override.yaml
Reference (for implementing this in the UI): private registry configuration.
A minimal implementation could just maintain a
registry.yaml
internally and make it editable in a text field.Longer term a full UI (maybe driven by a schema definition) would be nice, but it should not delay exposing the functionality through the UI.