|
| 1 | +--- |
| 2 | +title: Builder settings |
| 3 | +description: Set your builder settings relating to private registries, disk allocation . |
| 4 | +keywords: build, cloud build, optimize, remote, local, cloud, registry, package repository, vpn |
| 5 | +--- |
| 6 | + |
| 7 | +The **Builder settings** page in Docker Build Cloud lets you configure disk allocation, private resource access, and firewall settings for your cloud builders in your organization. These configurations help optimize storage, enable access to private registries, and secure outbound network traffic. |
| 8 | + |
| 9 | +## Disk allocation |
| 10 | + |
| 11 | +The **Disk allocation** setting lets you control how much of the available storage is dedicated to the build cache. A lower allocation increases storage available for active builds. |
| 12 | + |
| 13 | +To make disk allocation changes, navigate Builder settings in Docker Build Cloud and then adjust the Disk Allocation slider to specify the percentage of storage used for build caching. |
| 14 | + |
| 15 | +Any changes take effect immediately. |
| 16 | + |
| 17 | +> [!TIP] |
| 18 | +> |
| 19 | +> If you build very large images, consider allocating more storage for caching. |
| 20 | +
|
| 21 | +## Private resource access |
| 22 | + |
| 23 | +Private resource access lets cloud builders pull images and packages from private registries that are not publicly accessible. This feature is useful when builds rely on self-hosted artifact repositories or private OCI registries. |
| 24 | + |
| 25 | +For example, if your organization hosts a private [PyPI](https://pypi.org/) repository on a VPN, Docker Build Cloud would not be able to access it by default, since it isn't on the same network as your VPN. |
| 26 | + |
| 27 | +To enable your cloud builders to access your private registries, enter the host name and port of your private registry and then select **Add** to allow your cloud builders to access it. |
| 28 | + |
| 29 | +### Authentication |
| 30 | + |
| 31 | +If your internal artifacts require authentication, make sure that you |
| 32 | +authenticate with the repository either before or during the build. For |
| 33 | +internal packages like npm or PyPI, use [build secrets](/manuals/build/building/secrets.md) |
| 34 | +to authenticate during the build. For internal OCI registries, use `docker |
| 35 | +login` to authenticate before building. |
| 36 | + |
| 37 | +Note that if you use a private registry that requires authentication, you will |
| 38 | +need to authenticate with `docker login` twice before building. This is because |
| 39 | +the cloud builder needs to authenticate with Docker to use the cloud builder, |
| 40 | +and then again to authenticate with the private registry. |
| 41 | + |
| 42 | +```console |
| 43 | +$ echo $DOCKER_PAT | docker login docker.io -u <username> --password-stdin |
| 44 | +$ echo $REGISTRY_PASSWORD | docker login registry.example.com -u <username> --password-stdin |
| 45 | +$ docker build --builder <cloud-builder> --tag registry.example.com/<image> --push . |
| 46 | +``` |
| 47 | + |
| 48 | +## Firewall |
| 49 | + |
| 50 | +Firewall settings let you restrict cloud builder egress traffic to specific IP addresses. This helps enhance security by limiting external access. |
| 51 | + |
| 52 | +1. Select the **Enable firewall: Restrict cloud builder egress to specific public IP Address** checkbox. |
| 53 | + |
| 54 | +2. Enter the IP address you want to allow. |
| 55 | + |
| 56 | +3. Select **Add** to apply the restriction. |
0 commit comments