You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/images-configuration-allowed.adoc
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,12 @@ When the `allowedRegistries` parameter is defined, all registries, including the
18
18
19
19
.Procedure
20
20
21
-
. Edit the `image.config.openshift.io/cluster` CR:
21
+
ifndef::openshift-rosa,openshift-dedicated[]
22
+
. Edit the `image.config.openshift.io/cluster` custom resource:
23
+
endif::openshift-rosa,openshift-dedicated[]
24
+
ifdef::openshift-rosa,openshift-dedicated[]
25
+
* Edit the `image.config.openshift.io/cluster` custom resource:
26
+
endif::openshift-rosa,openshift-dedicated[]
22
27
+
23
28
[source,terminal]
24
29
----
@@ -61,7 +66,9 @@ Either the `allowedRegistries` parameter or the `blockedRegistries` parameter ca
61
66
+
62
67
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` resource for any changes to the registries. When the MCO detects a change, it drains the nodes, applies the change, and uncordons the nodes. After the nodes return to the `Ready` state, the allowed registries list is used to update the image signature policy in the `/host/etc/containers/policy.json` file on each node.
63
68
69
+
ifndef::openshift-rosa,openshift-dedicated[]
64
70
. To check that the registries have been added to the policy file, use the following command on a node:
71
+
// cannot create resource "namespaces"
65
72
+
66
73
[source,terminal]
67
74
----
@@ -157,6 +164,7 @@ The following policy indicates that only images from the example.com, quay.io, a
Copy file name to clipboardExpand all lines: modules/images-configuration-blocked.adoc
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,12 @@ To prevent pod failure, do not add the `registry.redhat.io` and `quay.io` regist
18
18
19
19
.Procedure
20
20
21
-
. Edit the `image.config.openshift.io/cluster` CR:
21
+
ifndef::openshift-rosa,openshift-dedicated[]
22
+
. Edit the `image.config.openshift.io/cluster` custom resource:
23
+
endif::openshift-rosa,openshift-dedicated[]
24
+
ifdef::openshift-rosa,openshift-dedicated[]
25
+
* Edit the `image.config.openshift.io/cluster` custom resource:
26
+
endif::openshift-rosa,openshift-dedicated[]
22
27
+
23
28
[source,terminal]
24
29
----
@@ -58,7 +63,9 @@ Either the `blockedRegistries` registry or the `allowedRegistries` registry can
58
63
+
59
64
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` resource for any changes to the registries. When the MCO detects a change, it drains the nodes, applies the change, and uncordons the nodes. After the nodes return to the `Ready` state, changes to the blocked registries appear in the `/etc/containers/registries.conf` file on each node.
60
65
66
+
ifndef::openshift-rosa,openshift-dedicated[]
61
67
. To check that the registries have been added to the policy file, use the following command on a node:
Copy file name to clipboardExpand all lines: modules/images-configuration-insecure.adoc
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,12 @@ Insecure external registries should be avoided to reduce possible security risks
18
18
19
19
.Procedure
20
20
21
-
. Edit the `image.config.openshift.io/cluster` CR:
21
+
ifndef::openshift-rosa,openshift-dedicated[]
22
+
. Edit the `image.config.openshift.io/cluster` custom resource:
23
+
endif::openshift-rosa,openshift-dedicated[]
24
+
ifdef::openshift-rosa,openshift-dedicated[]
25
+
* Edit the `image.config.openshift.io/cluster` custom resource:
26
+
endif::openshift-rosa,openshift-dedicated[]
22
27
+
23
28
[source,terminal]
24
29
----
@@ -66,7 +71,9 @@ When the `allowedRegistries` parameter is defined, all registries, including the
66
71
+
67
72
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` CR for any changes to the registries, then drains and uncordons the nodes when it detects changes. After the nodes return to the `Ready` state, changes to the insecure and blocked registries appear in the `/etc/containers/registries.conf` file on each node.
68
73
74
+
ifndef::openshift-rosa,openshift-dedicated[]
69
75
. To check that the registries have been added to the policy file, use the following command on a node:
Copy file name to clipboardExpand all lines: modules/images-configuration-shortname.adoc
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,12 @@ The `containerRuntimeSearchRegistries` parameter works only with the Podman and
37
37
38
38
.Procedure
39
39
40
+
ifndef::openshift-rosa,openshift-dedicated[]
40
41
. Edit the `image.config.openshift.io/cluster` custom resource:
42
+
endif::openshift-rosa,openshift-dedicated[]
43
+
ifdef::openshift-rosa,openshift-dedicated[]
44
+
* Edit the `image.config.openshift.io/cluster` custom resource:
45
+
endif::openshift-rosa,openshift-dedicated[]
41
46
+
42
47
[source,terminal]
43
48
----
@@ -90,6 +95,7 @@ status:
90
95
When the `allowedRegistries` parameter is defined, all registries, including the `registry.redhat.io` and `quay.io` registries and the default {product-registry}, are blocked unless explicitly listed. If you use this parameter, to prevent pod failure, add all registries including the `registry.redhat.io` and `quay.io` registries and the `internalRegistryHostname` to the `allowedRegistries` list, as they are required by payload images within your environment. For disconnected clusters, mirror registries should also be added.
91
96
====
92
97
98
+
ifndef::openshift-rosa,openshift-dedicated[]
93
99
. To check that the registries have been added, when a node returns to the `Ready` state, use the following command on the node:
0 commit comments