You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/containers/images.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ to roll back to a working version.
47
47
Instead, specify a meaningful tag such as `v1.42.0`.
48
48
{{< /caution >}}
49
49
50
-
## Updating Images
50
+
## Updating images
51
51
52
52
The default pull policy is `IfNotPresent` which causes the
53
53
{{< glossary_tooltip text="kubelet" term_id="kubelet" >}} to skip
@@ -61,13 +61,13 @@ you can do one of the following:
61
61
62
62
When `imagePullPolicy` is defined without a specific value, it is also set to `Always`.
63
63
64
-
## Multi-architecture Images with Manifests
64
+
## Multi-architecture images with image indexes
65
65
66
-
As well as providing binary images, a container registry can also serve a [container image manifest](https://github.com/opencontainers/image-spec/blob/master/manifest.md). A manifest can reference image manifests for architecture-specific versions of a container. The idea is that you can have a name for an image (for example: `pause`, `example/mycontainer`, `kube-apiserver`) and allow different systems to fetch the right binary image for the machine architecture they are using.
66
+
As well as providing binary images, a container registry can also serve a [container image index](https://github.com/opencontainers/image-spec/blob/master/image-index.md). An image index can point to multiple [image manifests](https://github.com/opencontainers/image-spec/blob/master/manifest.md) for architecture-specific versions of a container. The idea is that you can have a name for an image (for example: `pause`, `example/mycontainer`, `kube-apiserver`) and allow different systems to fetch the right binary image for the machine architecture they are using.
67
67
68
68
Kubernetes itself typically names container images with a suffix `-$(ARCH)`. For backward compatibility, please generate the older images with suffixes. The idea is to generate say `pause` image which has the manifest for all the arch(es) and say `pause-amd64` which is backwards compatible for older configurations or YAML files which may have hard coded the images with suffixes.
69
69
70
-
## Using a Private Registry
70
+
## Using a private registry
71
71
72
72
Private registries may require keys to read images from them.
73
73
Credentials can be provided in several ways:
@@ -86,7 +86,7 @@ Credentials can be provided in several ways:
86
86
87
87
These options are explaind in more detail below.
88
88
89
-
### Configuring Nodes to authenticate to a Private Registry
89
+
### Configuring nodes to authenticate to a private registry
90
90
91
91
If you run Docker on your nodes, you can configure the Docker container
92
92
runtime to authenticate to a private container registry.
@@ -178,7 +178,7 @@ template needs to include the `.docker/config.json` or mount a drive that contai
178
178
All pods will have read access to images in any private registry once private
179
179
registry keys are added to the `.docker/config.json`.
180
180
181
-
### Pre-pulled Images
181
+
### Pre-pulled images
182
182
183
183
{{< note >}}
184
184
This approach is suitable if you can control node configuration. It
@@ -197,7 +197,7 @@ This can be used to preload certain images for speed or as an alternative to aut
197
197
198
198
All pods will have read access to any pre-pulled images.
199
199
200
-
### Specifying ImagePullSecrets on a Pod
200
+
### Specifying imagePullSecrets on a Pod
201
201
202
202
{{< note >}}
203
203
This is the recommended approach to run containers based on images
@@ -206,7 +206,7 @@ in private registries.
206
206
207
207
Kubernetes supports specifying container image registry keys on a Pod.
208
208
209
-
#### Creating a Secret with a Docker Config
209
+
#### Creating a Secret with a Docker config
210
210
211
211
Run the following command, substituting the appropriate uppercase values:
212
212
@@ -266,7 +266,7 @@ Check [Add ImagePullSecrets to a Service Account](/docs/tasks/configure-pod-cont
266
266
You can use this in conjunction with a per-node `.docker/config.json`. The credentials
267
267
will be merged.
268
268
269
-
## Use Cases
269
+
## Use cases
270
270
271
271
There are a number of solutions for configuring private registries. Here are some
0 commit comments