You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/setting-up-harbor-as-a-local-container-registry-in-hpe-private-cloud-ai.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,7 +89,7 @@ From there, you can log into *Harbor* projects page using the default *admin* us
89
89
90
90
### Harbor project and user creation
91
91
92
-
*Harbor* manages container images through projects, each of which hosts the image repositories for your application. Before pushing images to *Harbor*, a project must first be created. A default public project named *library* is pre-created, but new projects can be created by clicking *+ NEW PRORJECT*:
92
+
*Harbor* manages container images through projects, each of which hosts the image repositories for your application. Before pushing images to *Harbor*, a project must first be created. A default public project named *library* is pre-created, but new projects can be created by clicking *+ NEW PROJECT*:
93
93
94
94

95
95
@@ -100,7 +100,7 @@ After creating the project, users can be created and assigned to projects using
100
100

101
101
102
102
These users, along with the default *admin* user, are added to the project *demo* with distinct roles:
103
-
**pcai-developer* has **Developer** role (with read/write access to project)
103
+
**pcai-developer* has the **Developer** role (with read/write access to project)
104
104
**pcai-admin* is assigned the **Maintainer** role, with extended privileges including image scanning, replication job visibility and image deletion
105
105
106
106

@@ -113,7 +113,7 @@ With the project and users set up, you're ready to push the container images to
113
113
114
114
**Log in to Harbor registry*
115
115
116
-
Use the Docker client to authenticate with the *Harbor* registry using the *pcai-admin* user credentials, by running the following command :
116
+
Use the Docker client to authenticate with the *Harbor* registry using the *pcai-admin* user credentials by running the following command :
Rather than building a Docker image from a Dockerfile, we'll pull the sample CFE Nginx image, *'pcaidemo/cfe-nginx'*, from *DockerHub* and tag it with the *Harbor* registry URL and project name:
147
+
Rather than building a Docker image from a Dockerfile, pull the sample CFE Nginx image, *'pcaidemo/cfe-nginx'*, from *DockerHub* and tag it with the *Harbor* registry URL and project name:
148
148
149
149
```shell
150
150
$ docker images
@@ -182,7 +182,7 @@ From the *Harbor* UI, the image *cfe-nginx* appears under *Repositories* tab of
182
182
183
183

184
184
185
-
From the Docker client, log in to the *Harbor* registry as the *pcai-developer* user, then pull the image *cfe-nginx* from the registry. The image downloads successfully, confirming that the user has appropriate access and the *Harbor* registry is functioning as expected.
185
+
From the Docker client, log in to the *Harbor* registry as the *pcai-developer* user, then pull the image *cfe-nginx* from the registry. The image should download successfully, confirming that the user has appropriate access and the *Harbor* registry is functioning as expected.
With the container images pushed to the *Harbor* registry, the next step is to deploy the application to HPE PCAI using the same *Import Framework*, demonstrating how to pull images from *Harbor*.
220
+
With the container images pushed to the *Harbor* registry, the next step is to deploy the application to HPE PCAI using the same *Import Framework*. It will demonstrate how to pull images from *Harbor*.
221
221
222
222
The Helm charts of the sample *CFE Nginx* application are available from *GitHub* repository [pcai-helm-examples](https://github.com/GuopingJia/pcai-helm-examples/tree/main/nginx-chart). Alongside the required *virtualService* and Kyverno *ClusterPolicy* YAML files, the *values.yaml* file includes the *imageCredentials* section that specifies the *Harbor* access credentials for the *pcai-developer* user. It also references the *imagePullSecrets* field that uses the Secret resource *harbor*, which is created during deployment, to securely pull container images from the *Harbor* registry.
223
223
@@ -297,7 +297,7 @@ The *Logs* page of the *Harbor* UI provides a comprehensive audit trail, capturi
297
297
298
298
## Conclusion
299
299
300
-
In this blog post, we explored how to deploy *Harbor* to HPE Private Cloud AI and configure it as a local container registry. By setting up a private *Harbor* project and assigning user roles, organizations can securely manage, push and pull container images tailored to their application needs.
300
+
In this blog post, I explored how to deploy *Harbor* to HPE Private Cloud AI and configure it as a local container registry. By setting up a private *Harbor* project and assigning user roles, organizations can securely manage, push and pull container images tailored to their application needs.
301
301
302
302
More than just a container registry, *Harbor* strengthens security with built-in vulnerability scanning, image signing, and content trust features, ensuring only verified, compliant images are used across deployments. With *Harbor* integrated into HPE PCAI, organizations can confidently host container images internally, eliminating the need for external registries. The local container registry offers greater control over image provenance and aligns more effectively with organization security policies and regulatory requirements.
0 commit comments