Container/OCI Registry
While container registries are typically used for storing images built by the CI Pipeline, an OCI registry can store container images as well as other artifacts such as helm charts. In other words, all container registries are OCI registries, but not all OCI registries are container registries.
You can configure a container registry using any registry provider of your choice. It allows you to build, deploy, and manage your container images or charts with easy-to-use UI.
Add Container Registry
Assuming your registry type is private, here are a few of the common fields you can expect:
Fields | Description |
---|---|
Name | Provide a name to your registry, this name will appear in the Container Registry drop-down list available within the Build Configuration section of your application |
Registry URL | Provide the URL of your registry in case it doesn't come prefilled (do not include |
Authentication Type | The credential input fields may differ depending on the registry provider, check Registry Providers |
Push container images | Tick this checkbox if you wish to use the repository to push container images. This comes selected by default and you may untick it if you don't intend to push container images after a CI build. If you wish to to use the same repository to pull container images too, read Registry Credential Access. |
Push helm packages | Tick this checkbox if you wish to push helm charts to your registry |
Use as chart repository | Tick this checkbox if you want Devtron to pull helm charts from your registry and display them on its chart store. Also, you will have to provide a list of repositories (present within your registry) for Devtron to successfully pull the helm charts. |
Set as default registry | Tick this checkbox to set your registry as the default registry hub for your images or artifacts |
Supported Registry Providers
ECR
Amazon ECR is an AWS-managed container image registry service. The ECR provides resource-based permissions to the private repositories using AWS Identity and Access Management (IAM). ECR allows both Key-based and Role-based authentications.
Before you begin, create an IAM user and attach the ECR policy according to the authentication type.
Provide the following additional information apart from the common fields:
Fields | Description |
---|---|
Registry URL | Example of URL format: |
Authentication Type | Select one of the authentication types:
|
Last updated