Skip to content

Commit 74246f3

Browse files
committed
Update Blog “setting-up-harbor-as-a-local-container-registry-in-hpe-private-cloud-ai”
1 parent 0a60423 commit 74246f3

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

content/blog/setting-up-harbor-as-a-local-container-registry-in-hpe-private-cloud-ai.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Guoping Jia
55
authorimage: /img/guoping.png
66
disable: false
77
---
8-
A container registry serves as a centralized system for storing and managing container images. In today’s fast-paced containerized application development landscape, speed, security and control over container workflows using a robust container registry are critical. While both cloud-based container registries, such as Google Container Registry (*GCR*), Azure Container Registry (*ACR*), and Amazon Elastic Container Registry (*ECR*), and third-party services like *DockerHub*, GitHub / GitLab Container Registry, and JFrog Container Registry, offer convenience, organizations often face challenges with latency, external dependencies, and security compliance constraints.
8+
A container registry serves as a centralized system for storing and managing container images. In today’s fast-paced containerized application development landscape, speed, security and control over container workflows using a robust container registry are critical. While both cloud-based container registries, such as Google Container Registry (*GCR*), Azure Container Registry (*ACR*), and Amazon Elastic Container Registry (*ECR*), and third-party services like *DockerHub*, *GitHub* / *GitLab* Container Registry, and *JFrog* Container Registry, offer convenience, organizations often face challenges with latency, external dependencies, and security compliance constraints.
99

1010
This blog post describes the process of deploying *Harbor* and setting it up as a local container registry within *HPE Private Cloud AI*. By using *Harbor* as a local registry, organizations gain faster image access, reduced reliance on external networks, enhanced security posture, and a tailored environment that aligns with compliance and governance needs.
1111

@@ -23,7 +23,7 @@ This blog post guides you through the step-by-step process of deploying the open
2323

2424
Before starting, make sure that [Docker Engine](https://docs.docker.com/engine/install/), version *28.1.1* or later, is installed, including the default *docker* CLI, which will used for building and pushing images.
2525

26-
The following sections detail application deployment using the *kubectl* CLI and *kubeconfig* to access the PCAI Kubernetes (K8s) cluster. However, direct cluster access via *kubectl* is generally not required.
26+
The following sections show application deployment details using the *kubectl* CLI and *kubeconfig* to access the PCAI Kubernetes (K8s) cluster. However, direct cluster access via *kubectl* is generally not required.
2727

2828
## Harbor
2929

@@ -33,14 +33,14 @@ The following sections describe in detail how to deploy *Harbor* into PCAI using
3333

3434
### Harbor deployment via PCAI *Import Framework*
3535

36-
Based on the latest Helm charts from the official [*Harbor* site](https://helm.goharbor.io/harbor-1.17.0.tgz), the following required YAML manifest files have been added under *templates/ezua/*:
36+
Based on the latest Helm charts from the official [*Harbor* site](https://helm.goharbor.io/harbor-1.17.0.tgz), the following YAML manifest files have been added under *templates/ezua/* directory:
3737

38-
* *virtualService.yaml*: an Istio *VirtualService* configuration file to define routing rules for incoming requests.
39-
* *kyverno-cluster-policy*: a Kyverno *ClusterPolicy* file to add the required labels to the deployment.
38+
* *virtualService.yaml*: Defines an Istio *VirtualService* to configure routing rules for incoming requests.
39+
* *kyverno-cluster-policy*: A Kyverno *ClusterPolicy* that automatically adds required labels to the deployment.
4040

41-
The default *values.yaml* file has been also updated with the following contents:
41+
Additionally, the default *values.yaml* file has been modified with the following updates:
4242

43-
* appended an *ezua* section to define the *Istio Gateway* and expose a service endpoint:
43+
* introduced an *ezua* section to configure the *Istio Gateway* and expose a service endpoint:
4444

4545
```bash
4646
ezua:
@@ -50,14 +50,13 @@ The default *values.yaml* file has been also updated with the following contents
5050
istioGateway: "istio-system/ezaf-gateway"
5151
```
5252

53-
* increased the *Harbor* registry size from the default *5G* to *500G*:
53+
* expanded *Harbor* registry storage from the default *5G* to *500G*:
5454

5555
```bash
5656
persistence.persistentVolumeClaim.registry.size = 500G
5757
```
5858

59-
The updated *Harbor* Helm charts have been available from GitHub repository [*pcai-helm-examples*](https://github.com/GuopingJia/pcai-helm-examples/tree/main/harbor).
60-
Using updated Helm charts, *Harbor* can be easily deployed into PCAI via the *Import Framework*:
59+
These updates are reflected in the revised *Harbor* Helm charts, available in the *GitHub* repository [*pcai-helm-examples*](https://github.com/GuopingJia/pcai-helm-examples/tree/main/harbor). With these customizations, *Harbor* can be seamlessly deployed into PCAI using the *Import Framework*:
6160

6261
![](/img/import-harbor.png)
6362

@@ -279,7 +278,7 @@ The *Logs* page of *Harbor* registry contains all the audit logs about project a
279278

280279
![](/img/harbor-audit.png)
281280

282-
### Conclusion
281+
## Conclusion
283282

284283
In this blog post, we explored how to deploy *Harbor* to HPE Private Cloud AI and configure it as a local container registry. By setting up a private *Harbor* project and assigning user roles, organizations can securely manage, push and pull container images tailored to their application needs.
285284

0 commit comments

Comments
 (0)