|
|||
Docker Images DistributionThere are two ways to get Docker images:
Pull Images from GCRThis method is recommended for the production workload in multi-node environments. To gain access to the Edifecs Docker Registry, contact Edifecs Customer Support to get the necessary credentials (key.json). As a result, you get an email with instructions that show how to:
Follow the instructions in the email to pull images from GCR. ![]() You have been granted access to Edifecs Docker Registry! To pull Edifecs Docker images, please copy-paste the italicized text below into key.json and store the file in a secure location (previously issued credentials are now inactive): {"auth_provider_x509_cert_url":"…"}
Sample usage (Linux): 1. User authentication using the key.json file from above: cat key.json | docker login -u _json_key --password-stdin https://us.gcr.io 2. Pulling image: docker pull us.gcr.io/edifecs/test-image:latest 3. Creating a Kubernetes secret for automated Docker registry access by pods: a. Create a file, edifecs-registry-key.yml, with the following contents in a secure location: apiVersion: v1 data: .dockerconfigjson: eyJhdXRocyI6IHsidXMuZ2NyLmlvIjogeyJlb... kind: Secret metadata: name: edifecs-registry-key type: kubernetes.io/dockerconfigjson b. Execute: kubectl apply -f edifecs-registry-key.yml c. You can delete the edifecs-registry-key.yml file Manual Docker Images ImportNote This approach is not maintained anymore and will be deprecated soon. This method suits testing and demonstration purposes if you do not have the necessary credentials to the Edifecs Docker Registry. It is strongly recommended that you do not use this method for production clusters in multi-node Kubernetes environments. Disable AlwaysPullImages for your Kubernetes cluster to bypass the Docker Registry image pulls. The import procedure is as follows:
|