You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/connected-registry-glossary.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,19 +116,19 @@ This glossary provides terms and definitions for the connected registry extensio
116
116
117
117
### Parent Registry
118
118
119
-
-**Description:** The primary registry that synchronizes with its child connected registries. A single parent registry can have multiple child registries connected to it. In a nested scenarios, there can be multiple layers of registries within the hierarchy.
119
+
-**Description:** The primary registry that synchronizes with its child connected registries. A single parent registry can have multiple child registries connected to it. In a nested scenario, there can be multiple layers of registries within the hierarchy.
-**Definition:** The file containing the connection string for deploying the connected registry extension on the Kubernetes cluster. This file would also includes the Kubernetes Secret or Public Cert + Private Key values pair for BYOC scenarios.
123
+
-**Definition:** The file containing the connection string for deploying the connected registry extension on the Kubernetes cluster. This file would also include the Kubernetes Secret or Public Cert + Private Key values pair for BYOC scenarios.
124
124
-**Accepted Values:** Alphanumerical value
125
125
-**Note:** Customer must specify.
126
126
127
127
### Public Certificate + Private Key
128
128
129
129
-**Value Type:** Alphanumerical base64-encoded
130
130
-**Customer Action:** Must specify
131
-
-**Description:** The public key certificate comprises of a pair of keys: a public key available to anyone for identity verification of the certificate holder, and a private key, a unique secret key.
131
+
-**Description:** The public key certificate comprises a pair of keys: a public key available to anyone for identity verification of the certificate holder, and a private key, a unique secret key.
Copy file name to clipboardExpand all lines: articles/container-registry/quickstart-connected-registry-arc-cli.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Quickstart: Deploying the Connected Registry Arc Extension"
2
+
title: "Quickstart: Deploying the connected registry Arc extension"
3
3
description: "Learn how to deploy the Connected Registry Arc Extension CLI UX with secure-by-default settings for efficient and secure container workload operations."
4
4
author: tejaswikolli-web
5
5
ms.author: tejaswikolli
@@ -11,7 +11,7 @@ ai-usage: ai-assisted
11
11
#customer intent: As a user, I want to learn how to deploy the connected registry Arc extension using the CLI UX with secure-by-default settings, such as using HTTPS, Read Only, Trust Distribution, and Cert Manager service, so that I can ensure the secure and efficient operation of my container workloads."
12
12
---
13
13
14
-
# Quickstart: Deploy the connected registry Arc extension (Preview)
14
+
# Quickstart: Deploy the connected registry Arc extension (preview)
15
15
16
16
In this quickstart, you learn how to deploy the Connected registry Arc extension using the CLI UX with secure-by-default settings to ensure robust security and operational integrity.
17
17
@@ -25,11 +25,11 @@ The connected registry is a pivotal tool for edge customers, enabling efficient
25
25
26
26
* Set up the firewall access and communication between the ACR and the connected registry by enabling the [dedicated data endpoints.][dedicated data endpoints]
27
27
28
-
* Create or use an existing Azure Kubernetes Service (AKS) cluster with the [tutorial.][tutorial-aks-cluster]
28
+
* Create or use an existing Azure KubernetesService (AKS) cluster with the [tutorial.][tutorial-aks-cluster]
29
29
30
-
* Set up the connection between the Kubernetes cluster and Azure Arc by following the [quickstart.][quickstart-connect-cluster]
30
+
* Set up the connection between the Kubernetescluster and Azure Arc by following the [quickstart.][quickstart-connect-cluster]
31
31
32
-
* Use the [k8s-extension][k8s-extension] command to manage Kubernetes extensions.
32
+
* Use the [k8s-extension][k8s-extension] command to manage Kubernetesextensions.
33
33
34
34
```azurecli
35
35
az extension add --name k8s-extension
@@ -52,9 +52,9 @@ The connected registry is a pivotal tool for edge customers, enabling efficient
52
52
The `hello-world` repository is created in the ACR registry `myacrregistry` to synchronize with the Connected registry.
53
53
54
54
55
-
## Deploy the Connected registry Arc extension with secure-by-default settings
55
+
## Deploy the connected registry Arc extension with secure-by-default settings
56
56
57
-
Once the prerequisites and necessary conditions and components are in place, follow the streamlined approach to securely deploy a connected registry extension on an Arc-enabled Kubernetes cluster using the following settings. These settings define the following configuration with HTTPS, Read Only, Trust Distribution, and Cert Manager service. Follow the steps for a successful deployment:
57
+
Once the prerequisites and necessary conditions and components are in place, follow the streamlined approach to securely deploy a connected registry extension on an Arc-enabled Kubernetescluster using the following settings. These settings define the following configuration with HTTPS, Read Only, Trust Distribution, and Cert Manager service. Follow the steps for a successful deployment:
58
58
59
59
1. [Create the connected registry.](#create-the-connected-registry-and-synchronize-with-acr)
60
60
2. [Deploy the connected registry Arc extension.](#deploy-the-connected-registry-arc-extension-on-the-arc-enabled-kubernetes-cluster)
@@ -81,15 +81,15 @@ Creating the connected registry to synchronize with ACR is the foundational step
81
81
- The [az acr connected-registry create][az-acr-connected-registry-create] command overwrites actions if the sync scope map named `myscopemap` exists and overwrites properties if the sync token named `mysynctoken` exists.
82
82
- The [az acr connected-registry create][az-acr-connected-registry-create] command validates a dedicated data endpoint during the creation of the connected registry and provides a command to enable the dedicated data endpoint on the ACR registry.
83
83
84
-
### Deploy the connected registry Arc extension on the Arc-enabled kubernetes cluster
84
+
### Deploy the connected registry Arc extension on the Arc-enabled Kubernetes cluster
85
85
86
86
By deploying the connected Registry Arc extension, you can synchronize container images and other Open Container Initiative (OCI) artifacts with your ACR registry. The deployment helps speed-up access to registry artifacts and enables the building of advanced scenarios. The extension deployment ensures secure trust distribution between the connected registry and all client nodes within the cluster, and installs the cert-manager service for Transport Layer Security (TLS) encryption.
87
87
88
88
1. Generate the Connection String and Protected Settings JSON File
89
89
90
90
For secure deployment of the connected registry extension, generate the connection string, including a new password, transport protocol, and create the `protected-settings-extension.json` file required for the extension deployment with [az acr connected-registry get-settings][az-acr-connected-registry-get-settings] command:
- The [az k8s-extension create][az-k8s-extension-create] command deploys the connected registry extension on the Kubernetes cluster with the provided configuration parameters and protected settings file.
146
+
- The [az k8s-extension create][az-k8s-extension-create] command deploys the connected registry extension on the Kubernetescluster with the provided configuration parameters and protected settings file.
147
147
- It ensures secure trust distribution between the connected registry and all client nodes within the cluster, and installs the cert-manager service for Transport Layer Security (TLS) encryption.
148
-
- The clusterIP must be from the AKS cluster subnet IP range. The `service.clusterIP` parameter specifies the IP address of the connected registry service within the cluster. It is essential to set the `service.clusterIP` within the range of valid service IPs forthe Kubernetes cluster. Ensure that the IP address specified for `service.clusterIP` falls within the designated service IP range defined during the cluster's initial configuration, typically foundin the cluster's networking settings. If the `service.clusterIP` is not within this range, it must be updated to an IP address that is both within the valid range and not currently in use by another service.
148
+
- The clusterIP must be from the AKS cluster subnet IP range. The `service.clusterIP` parameter specifies the IP address of the connected registry service within the cluster. It is essential to set the `service.clusterIP` within the range of valid service IPs forthe Kubernetescluster. Ensure that the IP address specified for `service.clusterIP` falls within the designated service IP range defined during the cluster's initial configuration, typically foundin the cluster's networking settings. If the `service.clusterIP` is not within this range, it must be updated to an IP address that is both within the valid range and not currently in use by another service.
149
149
150
150
151
151
### Verify the connected registry extension deployment
152
152
153
-
To verify the deployment of the connected registry extension on the Arc-enabled Kubernetes cluster, follow the steps:
153
+
To verify the deployment of the connected registry extension on the Arc-enabled Kubernetescluster, follow the steps:
Copy file name to clipboardExpand all lines: articles/container-registry/tutorial-connected-registry-arc.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Secure and deploy Connected registry Arc extension"
2
+
title: "Secure and deploy connected registry Arc extension"
3
3
description: "Learn to secure the connected registry Arc extension deployment with HTTPS, TLS, optional no TLS, BYOC certificate, and trust distribution."
4
4
author: tejaswikolli-web
5
5
ms.author: tejaswikolli
@@ -11,7 +11,7 @@ ms.date: 06/17/2024
11
11
12
12
---
13
13
14
-
# Tutorial: Secure deployment methods for the connected registry extension
14
+
# Tutorial: Secure deployment methods for the connected registry extension
15
15
16
16
These tutorials cover various deployment scenarios for the connected registry extension in an Arc-enabled Kubernetes cluster. Once the connected registry extension is installed, you can synchronize images from your cloud registry to on-premises or remote locations.
17
17
@@ -25,7 +25,7 @@ The connected registry cert manager is a service that manages TLS certificates f
25
25
26
26
[Cert-Manager][cert-manager] is an open-source Kubernetes add-on that automates the management and issuance of TLS certificates from various sources. It manages the lifecycle of certificates issued by CA pools created using CA Service, ensuring they are valid and renewed before they expire.
27
27
28
-
### What is Trust Distribution?
28
+
### What is trust distribution?
29
29
30
30
Connected registry trust distribution refers to the process of securely distributing trust between the connected registry service and Kubernetes clients within a cluster. This is achieved by using a Certificate Authority (CA), such as cert-manager, to sign TLS certificates, which are then distributed to both the registry service and the clients. This ensures that all entities can securely authenticate each other, maintaining a secure and trusted environment within the Kubernetes cluster.
31
31
@@ -34,7 +34,7 @@ In this tutorial, you:
34
34
> [!div class="checklist"]
35
35
> -[Deploy Connected registry extension using preinstalled cert-manager.](#deploy-connected-registry-extension-using-your-preinstalled-cert-manager)
36
36
> -[Deploy Connected registry extension using Bring Your Own Certificate (BYOC).](#deploy-connected-registry-extension-using-bring-your-own-certificate-byoc)
37
-
> -[Deploy Connected registry with kubernetes secret management.](#deploy-connected-registry-with-kubernetes-secret-management)
37
+
> -[Deploy Connected registry with Kubernetes secret management.](#deploy-connected-registry-with-Kubernetes-secret-management)
38
38
> -[Deploy the Connected registry Arc extension with inherent trust distribution or reject Connected registry trust distribution.](#deploy-the-connected-registry-using-your-own-trust-distribution-and-disable-the-connected-registrys-default-trust-distribution)
39
39
40
40
## Prerequisites
@@ -47,7 +47,7 @@ To complete this tutorial, you need:
47
47
48
48
In this tutorial, we demonstrate how to use a preinstalled cert-manager service on the cluster. This setup gives you control over certificate management, enabling you to deploy the connected registry extension with encryption by following the steps provided:
49
49
50
-
1.Run the [az-k8s-extension-create][az-k8s-extension-create] command in the [quickstart][quickstart] and set the `cert-manager.enabled=true` and `cert-manager.install=false` parameters to determine the cert-manager service is installed and enabled:
50
+
Run the [az-k8s-extension-create][az-k8s-extension-create] command in the [quickstart][quickstart] and set the `cert-manager.enabled=true` and `cert-manager.install=false` parameters to determine the cert-manager service is installed and enabled:
51
51
52
52
```azurecli
53
53
az k8s-extension create --cluster-name myarck8scluster \
@@ -60,7 +60,7 @@ In this tutorial, we demonstrate how to use a preinstalled cert-manager service
## Deploy Connected registry extension using Bring Your Own Certificate (BYOC)
63
+
## Deploy connected registry extension using bring your own certificate (BYOC)
64
64
65
65
In this tutorial, we demonstrate how to use your own certificate (BYOC) on the cluster. BYOC allows you to use your own public certificate and private key pair, giving you control over certificate management. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
2. Now, you can deploy the Connected registry extension with HTTPS (TLS encryption) using the public certificate and private key pair management by configuring variables set to `cert-manager.enabled=false` and `cert-manager.install=false`. With these parameters, the cert-manager isn't installed or enabled since the public certificate and private key pair is used instead for encryption.
103
+
4. Now, you can deploy the Connected registry extension with HTTPS (TLS encryption) using the public certificate and private key pair management by configuring variables set to `cert-manager.enabled=false` and `cert-manager.install=false`. With these parameters, the cert-manager isn't installed or enabled since the public certificate and private key pair is used instead for encryption.
104
104
105
-
3. Run the [az-k8s-extension-create][az-k8s-extension-create] command for deployment after protected settings file is edited:
105
+
5. Run the [az-k8s-extension-create][az-k8s-extension-create] command for deployment after protected settings file is edited:
106
106
107
107
```azurecli
108
108
az k8s-extension create --cluster-name myarck8scluster \
@@ -164,7 +164,7 @@ EOF
164
164
}
165
165
```
166
166
167
-
Now, you can deploy the Connected registry extension with HTTPS (TLS encryption) using the kubernetes secret management by configuring variables set to `cert-manager.enabled=false` and `cert-manager.install=false`. With these parameters, the cert-manager isn't installed or enabled since the kubernetes secret is used instead for encryption.
167
+
Now, you can deploy the Connected registry extension with HTTPS (TLS encryption) using the Kubernetes secret management by configuring variables set to `cert-manager.enabled=false` and `cert-manager.install=false`. With these parameters, the cert-manager isn't installed or enabled since the Kubernetes secret is used instead for encryption.
168
168
169
169
5. Run the [az-k8s-extension-create][az-k8s-extension-create] command for deployment after protected settings file is edited:
170
170
@@ -226,15 +226,13 @@ By deleting the deployed Connected registry extension, you remove the correspond
226
226
227
227
By deleting the Connected registry extension and the Connected registry, you remove all the associated resources and configurations.
228
228
229
-
## Next steps -or- Related content
230
-
231
-
> [!div class="nextstepaction"]
229
+
## Next steps
232
230
233
-
> [Enable Connected registry with Azure arc CLI][quickstart]
234
-
> [Upgrade Connected registry with Azure arc](tutorial-connected-registry-upgrade.md)
235
-
> [Sync Connected registry with Azure arc in Scheduled window](tutorial-connected-registry-sync.md)
236
-
> [Troubleshoot Connected registry with Azure arc](troubleshoot-connected-registry-arc.md)
237
-
> [Glossary of terms](connected-registry-glossary.md)
231
+
-[Enable Connected registry with Azure arc CLI][quickstart]
232
+
-[Upgrade Connected registry with Azure arc](tutorial-connected-registry-upgrade.md)
233
+
-[Sync Connected registry with Azure arc in Scheduled window](tutorial-connected-registry-sync.md)
234
+
-[Troubleshoot Connected registry with Azure arc](troubleshoot-connected-registry-arc.md)
235
+
-[Glossary of terms](connected-registry-glossary.md)
0 commit comments