Skip to content

Commit

Permalink
Add note on private clusters for Zot ingress (#2287)
Browse files Browse the repository at this point in the history
  • Loading branch information
uvegla authored Sep 3, 2024
1 parent 5ee8ded commit 51a412c
Showing 1 changed file with 27 additions and 0 deletions.
27 changes: 27 additions & 0 deletions src/content/tutorials/registry/zot/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -168,6 +168,33 @@ Finally, enable it via the `"http"` key in the configuration file:

Note how the `"policies"` key is used to define the access control for the repositories. The `"**"` key is a wildcard for all repositories. The `"actions"` key defines the allowed actions for the users.

#### Exposing the registry

In some use-cases you possibly want to expose Zot to be used by let's say workload clusters, so you manage only a single instance by sharing it across multiple workloads.

To enable the ingress in the Giant Swarm managed chart, use these settings matching your cluster:

```yaml
ingress:
enabled: true
hosts:
- host: my-registry.example.org
paths:
- path: /
tls:
- secretName: my-registry-tls
hosts:
- my-registry.example.org
```

For private clusters, the ingress needs to be annotated differently from the default for Cert Manager to generate a proper certificate.

```yaml
ingress:
annotations:
cert-manager.io/cluster-issuer: private-giantswarm
```

### Authenticating with the upstream registry

In case you want to cache container images from private registries, Zot needs credentials for accessing them. In order to provide these credentials, add an entry to the `.secretFiles` key in chart values. Here is an example snippet:
Expand Down

0 comments on commit 51a412c

Please sign in to comment.