Configure Custom Image Build
Introduction
PrimeHub provides the capability to build custom images. There are two features related to building image
__Image > Build custom image: Allows group admin to create custom image.
__Admin Portal > Images (EE only): Allows system admin to create custom image
Once images are built successfully, they will be pushed into specified repositories of a registry. Here we show how to configure PrimeHub using a remote registry for it.
Path | Description | Default Value |
---|---|---|
| The registry the built image to push |
|
| Login user name for registry |
|
| Login password for registry |
|
| The image repository for the build image. The result image will be |
|
| The image prefix for the build image. The result image will be |
|
| The secret name of the registry push secret |
|
Configure DockerHub Registry
Sign in DockerHub.
Go to
Account Settings
/Security
/Access Tokens
Generate new access token and save it. (REF: Managing access tokens).Create a repository and note down the
<namespace>
and<repo name>
Configuration example of DockerHub registry
Configure Google Container Registry (GCR)
Please reference this official document for GCR to get the username and password
The username is always
_json_key
. The password is the keyfile json. Please make it a one-line json string so that we can put it in the environment variable.Configuration example of GCR
Configure AWS Elastic Container Registry (ECR)
Please reference this official document for ECR to setup IAM role policy with ECR.
Install the tool
aws-ecr-credential
by helm to fetch the latest access token of AWS ECR.The access token of ECR will be generated into a k8s secret
aws-registry
under the target namespace.Configuration example of ECR
Notice
AWS ECR only support push the container image to an existed repository. Please reference the official document to create the corresponding repository on AWS ESC before adding the custom image build.
Last updated