Replies: 1 comment 4 replies
-
|
Hey @millsks — thanks for checking out Nebari!
Great to hear you got a local deployment running. On your question about using a custom container registry: Nebari doesn’t yet have a global registry setting that applies across all components. While Nebari supports For now, the way to achieve this is to add per-component overrides in your security:
keycloak:
initial_root_password: <redacted>
overrides:
postgresql:
image:
registry: docker.io
repository: bitnamilegacy/postgresql
tag: "10"As an alternative (cluster-wide and manifest-agnostic), you can configure your cluster nodes to use a registry mirror/pull-through cache. With containerd/CRI-O you can map Another option: deploy Kyverno (e.g., via Helm) and add a policy that rewrites any external image registry (like |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I’m evaluating the Nebari platform to consolidate several services we currently run separately. I was able to deploy it locally on my personal Mac, but I’m now testing on a Mac behind a corporate firewall on a private network.
My goal is to use the same Docker images but override the default image repositories to pull from our internal repo, which acts as a proxy for Docker Hub and Quay.io.
I noticed there’s an open PR addressing an upstream change in Bitnami image locations. While that PR fixes things internally for Nebari, is there a way to configure this behavior in nebari-config.yaml so that images are always pulled from a custom/internal repo instead?
This is primarily for local deployment now, but we’re also exploring deploying on Kubernetes infrastructure hosted on OCP.
Beta Was this translation helpful? Give feedback.
All reactions