You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Allowing pods to reference images from other secured registries
8
8
9
-
To pull a secured container from other private or secured registries, you must create a pull secret from your container client credentials, such as Docker or Podman, and add it to your service account.
9
+
[role="_abstract"]
10
+
To ensure reliable application deployment on {product-title}, configure image pull secrets. This allows your resources, such as pods and deployments, to authenticate and pull container images successfully from private registries.
11
+
12
+
To pull a secured container from other private or secured registries, you must create a pull secret from your container client credentials, such as Docker or Podman, and add it to your service account.
10
13
11
14
Both Docker and Podman use a configuration file to store authentication details to log in to secured or insecure registry:
You can get general information about the image stream and detailed information about all the tags it is pointing to.
8
+
[role="_abstract"]
9
+
To efficiently manage and monitor your image streams in {product-title}, retrieve information about their versions. You can get general information about the image stream and detailed information about all the tags it is pointing to, ensuring your deployed applications rely on the correct image versions.
Copy file name to clipboardExpand all lines: modules/images-imagestream-adding-tags.adoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@
5
5
[id="images-imagestream-adding-tags_{context}"]
6
6
= Adding tags to an image stream
7
7
8
-
You can add additional tags to image streams.
8
+
[role="_abstract"]
9
+
To accurately manage and track specific versions of your container images, add tags to your image streams within {product-title}, This ensures reliable referencing and deployment throughout your environment.
Copy file name to clipboardExpand all lines: modules/images-imagestream-configure.adoc
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,9 @@
5
5
[id="images-imagestream-configure_{context}"]
6
6
= Configuring image streams
7
7
8
+
[role="_abstract"]
9
+
To customize image retrieval and security policies for your applications, configure image streams within {product-title}. This process lets you define image pull specifications, manage tags, and control access permissions necessary for reliable application deployment.
10
+
8
11
An `ImageStream` object file contains the following elements.
<2> Docker repository path where new images can be pushed to add or update them in this image stream.
43
-
<3> The SHA identifier that this image stream tag currently references. Resources that reference this image stream tag use this identifier.
44
-
<4> The SHA identifier that this image stream tag previously referenced. Can be used to rollback to an older image.
45
-
<5> The image stream tag name.
45
+
`name`:: Specifies the name of the image stream
46
+
`ruby-sample`:: Specifies the Docker repository path where new images can be pushed to add or update them in this image stream.
47
+
`dockerImageReference`:: Specifies the SHA identifier that this image stream tag currently references. Resources that reference this image stream tag use this identifier
48
+
`image`:: Specifies the SHA identifier that this image stream tag previously referenced. You can use it to rollback to an older image.
To enable {product-title} resources to track and consume container images sourced from external registries, add tags to the corresponding image streams. This action integrates external image content securely into your cluster's local image management system.
= Importing images and image streams from private registries
7
7
8
-
An image stream can be configured to import tag and image metadata from private image registries requiring authentication. This procedure applies if you change the registry that the Cluster Samples Operator uses to pull content from to something other than link:https://registry.redhat.io[registry.redhat.io].
8
+
[role="_abstract"]
9
+
To securely manage content from external sources, configure your image streams to import tag and image metadata from private registries requiring authentication. This procedure is essential if you change the registry that the Cluster Samples Operator uses for pulling content to something other than the default link:https://registry.redhat.io[registry.redhat.io].
You can import a single sub-manifest, or all manifests, of a manifest list when using `oc import-image` or `oc tag` CLI commands by adding the `--import-mode` flag.
8
+
[role="_abstract"]
9
+
To precisely manage multi-architecture or variant images contained within a manifest list, use the `--import-mode` flag with `oc import-image` or `oc tag` CLI commands. This functionality allows you to import a single sub-manifest, or all manifests, of a manifest list, providing fine-grained control over your image stream content.
9
10
10
-
Refer to the commands below to create an image stream that includes a single sub-manifest or multi-architecture images.
11
+
In some cases, users might want to use sub-manifests directly. When `oc adm prune images` is run, or the `CronJob` pruner runs, they cannot detect when a sub-manifest list is used. As a result, an administrator using `oc adm prune images`, or the `CronJob` pruner, might delete entire manifest lists, including sub-manifests.
12
+
13
+
To avoid this limitation, you can use the manifest list by tag or by digest instead.
The `--import-mode=` default value is `Legacy`. Excluding this value, or failing to specify either `Legacy` or `PreserveOriginal`, imports a single sub-manifest. An invalid import mode returns the following error: `error: valid ImportMode values are Legacy or PreserveOriginal`.
Working with manifest lists has the following limitations:
52
-
53
-
* In some cases, users might want to use sub-manifests directly. When `oc adm prune images` is run, or the `CronJob` pruner runs, they cannot detect when a sub-manifest list is used. As a result, an administrator using `oc adm prune images`, or the `CronJob` pruner, might delete entire manifest lists, including sub-manifests.
54
-
+
55
-
To avoid this limitation, you can use the manifest list by tag or by digest instead.
Copy file name to clipboardExpand all lines: modules/images-imagestream-import.adoc
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@
5
5
[id="images-imagestream-import_{context}"]
6
6
= Configuring periodic importing of image stream tags
7
7
8
-
When working with an external container image registry, to periodically re-import an image, for example to get latest security updates, you can use the `--scheduled` flag.
8
+
[role="_abstract"]
9
+
To maintain up-to-date image definitions from an external container image registry, configure periodic importing of image stream tags. This process allows you to quickly re-import images for critical security updates by using the `--scheduled` flag.
9
10
10
11
.Procedure
11
12
@@ -36,4 +37,4 @@ This command causes {product-title} to periodically update this particular image
Copy file name to clipboardExpand all lines: modules/images-imagestream-mapping.adoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@
5
5
[id="images-imagestream-mapping_{context}"]
6
6
= Image stream mapping
7
7
8
-
When the integrated registry receives a new image, it creates and sends an image stream mapping to {product-title}, providing the image's project, name, tag, and image metadata.
8
+
[role="_abstract"]
9
+
Manage how {product-title} tracks newly uploaded images by understanding image stream mapping. When the integrated registry receives a new image, it automatically creates and sends an image stream mapping, providing the image's crucial project, name, tag, and metadata.
= Configuring periodic importing of manifest lists
7
7
8
-
To periodically re-import a manifest list, you can use the `--scheduled` flag.
8
+
[role="_abstract"]
9
+
To maintain up-to-date image references for complex, multi-architecture images, configure periodic importing of manifest lists. To periodically re-import a manifest list, you can use the `--scheduled` flag, ensuring your image stream tracks the latest versions from external registries.
9
10
10
11
.Procedure
11
12
@@ -15,4 +16,4 @@ To periodically re-import a manifest list, you can use the `--scheduled` flag.
0 commit comments