You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-import-images.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Image import into an Azure container registry has the following benefits over us
27
27
28
28
* If you import multi-architecture images (such as official Docker images), images for all architectures and platforms specified in the manifest list get copied.
29
29
30
-
* If you access to the target registry, it doesn't have to use the registry's public endpoint.
30
+
* If you have access to the target registry, you don't require the registry's public endpoint.
31
31
32
32
> [!IMPORTANT]
33
33
>* Importing images requires the external registry support [RFC 7233](https://www.rfc-editor.org/rfc/rfc7233#section-2.3). We recommend using a registry that supports RFC 7233 ranges while using az acr import command with the registry URI to avoid failures.
@@ -165,7 +165,7 @@ You can import an image from an Azure container registry in the same AD tenant u
165
165
166
166
* The registry can be in the same or a different Azure subscription in the same Active Directory tenant.
167
167
168
-
*[Public access](container-registry-access-selected-networks.md#disable-public-network-access) to the source registry may be disabled. If public access is disabled, specify the source registry by resource ID instead of by registry login server name.
168
+
*[Public access](container-registry-access-selected-networks.md#disable-public-network-access) to the source registry is disabled. If public access is disabled, specify the source registry by resource ID instead of by registry login server name.
169
169
170
170
* The source registry and/or the target registry with a private endpoint or registry firewall rules must ensure the restricted registry [allows trusted services](allow-access-trusted-services.md) to access the network.
> Cross-tenant doesn't work across the clouds. Cross-tenant import over private endpoints is also not supported.
345
-
346
-
347
345
## Import from a non-Azure private container registry
348
346
349
347
Import an image from a non-Azure private registry by specifying credentials that enable pull access to the registry. For example, pull an image from a private Docker registry:
> If you're importing from a non-Azure private registry with IP rules, [follow these steps.](container-registry-access-selected-networks.md)
368
366
369
367
### Troubleshoot Import Container Images
368
+
370
369
#### Symptoms and Causes
371
370
-`The remote server may not be RFC 7233 compliant`
372
371
- The [distribution-spec](https://github.com/opencontainers/distribution-spec/blob/main/spec.md) allows range header form of `Range: bytes=<start>-<end>`. However, the remote server may not be RFC 7233 compliant.
0 commit comments