Skip to content

Commit 792c528

Browse files
committed
Update Blog “setting-up-harbor-as-a-local-container-registry-in-hpe-private-cloud-ai”
1 parent 80f02b2 commit 792c528

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

content/blog/setting-up-harbor-as-a-local-container-registry-in-hpe-private-cloud-ai.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ From there, you can log into *Harbor* projects page using the default *admin* us
8989

9090
### Harbor project and user creation
9191

92-
*Harbor* manages container images through projects, each of which hosts the image repositories for your application. Before pushing images to *Harbor*, a project must first be created. A default public project named *library* is pre-created, but new projects can be created by clicking *+ NEW PRORJECT*:
92+
*Harbor* manages container images through projects, each of which hosts the image repositories for your application. Before pushing images to *Harbor*, a project must first be created. A default public project named *library* is pre-created, but new projects can be created by clicking *+ NEW PROJECT*:
9393

9494
![](/img/create-project.png)
9595

@@ -100,7 +100,7 @@ After creating the project, users can be created and assigned to projects using
100100
![](/img/two-users-harbor.png)
101101

102102
These users, along with the default *admin* user, are added to the project *demo* with distinct roles:
103-
* *pcai-developer* has **Developer** role (with read/write access to project)
103+
* *pcai-developer* has the **Developer** role (with read/write access to project)
104104
* *pcai-admin* is assigned the **Maintainer** role, with extended privileges including image scanning, replication job visibility and image deletion
105105

106106
![](/img/project-member.png)
@@ -113,7 +113,7 @@ With the project and users set up, you're ready to push the container images to
113113

114114
* *Log in to Harbor registry*
115115

116-
Use the Docker client to authenticate with the *Harbor* registry using the *pcai-admin* user credentials, by running the following command :
116+
Use the Docker client to authenticate with the *Harbor* registry using the *pcai-admin* user credentials by running the following command :
117117

118118
```shell
119119
$ docker login harbor.ingress.pcai0104.ld7.hpecolo.net
@@ -144,7 +144,7 @@ $ sudo systemctl restart docker
144144

145145
* *Tag an existing image*
146146

147-
Rather than building a Docker image from a Dockerfile, we'll pull the sample CFE Nginx image, *'pcaidemo/cfe-nginx'*, from *DockerHub* and tag it with the *Harbor* registry URL and project name:
147+
Rather than building a Docker image from a Dockerfile, pull the sample CFE Nginx image, *'pcaidemo/cfe-nginx'*, from *DockerHub* and tag it with the *Harbor* registry URL and project name:
148148

149149
```shell
150150
$ docker images
@@ -182,7 +182,7 @@ From the *Harbor* UI, the image *cfe-nginx* appears under *Repositories* tab of
182182

183183
![](/img/demo-project.png)
184184

185-
From the Docker client, log in to the *Harbor* registry as the *pcai-developer* user, then pull the image *cfe-nginx* from the registry. The image downloads successfully, confirming that the user has appropriate access and the *Harbor* registry is functioning as expected.
185+
From the Docker client, log in to the *Harbor* registry as the *pcai-developer* user, then pull the image *cfe-nginx* from the registry. The image should download successfully, confirming that the user has appropriate access and the *Harbor* registry is functioning as expected.
186186

187187
```shell
188188
$ docker login harbor.ingress.pcai0104.ld7.hpecolo.net
@@ -217,7 +217,7 @@ harbor.ingress.pcai0104.ld7.hpecolo.net/demo/cfe-nginx v0.1.0 1e5f3c5b981a
217217

218218
## Application deployment using Harbor registry
219219

220-
With the container images pushed to the *Harbor* registry, the next step is to deploy the application to HPE PCAI using the same *Import Framework*, demonstrating how to pull images from *Harbor*.
220+
With the container images pushed to the *Harbor* registry, the next step is to deploy the application to HPE PCAI using the same *Import Framework*. It will demonstrate how to pull images from *Harbor*.
221221

222222
The Helm charts of the sample *CFE Nginx* application are available from *GitHub* repository [pcai-helm-examples](https://github.com/GuopingJia/pcai-helm-examples/tree/main/nginx-chart). Alongside the required *virtualService* and Kyverno *ClusterPolicy* YAML files, the *values.yaml* file includes the *imageCredentials* section that specifies the *Harbor* access credentials for the *pcai-developer* user. It also references the *imagePullSecrets* field that uses the Secret resource *harbor*, which is created during deployment, to securely pull container images from the *Harbor* registry.
223223

@@ -297,7 +297,7 @@ The *Logs* page of the *Harbor* UI provides a comprehensive audit trail, capturi
297297

298298
## Conclusion
299299

300-
In this blog post, we explored how to deploy *Harbor* to HPE Private Cloud AI and configure it as a local container registry. By setting up a private *Harbor* project and assigning user roles, organizations can securely manage, push and pull container images tailored to their application needs.
300+
In this blog post, I explored how to deploy *Harbor* to HPE Private Cloud AI and configure it as a local container registry. By setting up a private *Harbor* project and assigning user roles, organizations can securely manage, push and pull container images tailored to their application needs.
301301

302302
More than just a container registry, *Harbor* strengthens security with built-in vulnerability scanning, image signing, and content trust features, ensuring only verified, compliant images are used across deployments. With *Harbor* integrated into HPE PCAI, organizations can confidently host container images internally, eliminating the need for external registries. The local container registry offers greater control over image provenance and aligns more effectively with organization security policies and regulatory requirements.
303303

0 commit comments

Comments
 (0)