Anthos Config Management mithilfe einer privaten Registry aktualisieren

Für jede Version von Anthos Config Management muss ein bestimmter Satz von versionierten Images ausgeführt werden. Wenn Sie eine private Registry verwenden, müssen Sie diese Images per Pull, Tag und Push in die private Registry verschieben, bevor Sie Anthos Config Management-Komponenten installieren oder ein Upgrade der Anthos Config Management-Version ausführen.

Images zu einer privaten Registry hinzufügen

Klicken Sie auf das Plussymbol für die Version, die Sie verwenden möchten, und führen Sie die aufgeführten Schritte aus, um versionsspezifische Anthos Config Management-Images in eine private Registry zu senden.

1.9.0

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210903172607-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210903172607-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210903172607-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.3-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/hydration-controller:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.8.2

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210811235940-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210811235940-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
     
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.8.1

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210715174329-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210715174329-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.8.0

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210609013330-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/reconciler:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.3
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210609013330-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/reconciler:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.3 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.7.2

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.7.1

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.7.0

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210330235755-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.0
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210330235755-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210330235755-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.0 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.0
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.6.2

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210209202053-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210209202053-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.6.1

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20210112004802-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20210112004802-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.6.0

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20201118213152-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20201118213152-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.5.2

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20201031033402-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20201031033402-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.5.1

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20201007005948-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20201007005948-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.

1.5.0

Führen Sie die folgenden Schritte aus, um die Images zu einer privaten Registry hinzuzufügen:

  1. Rufen Sie die Anthos Config Management-Images ab:
    docker pull gcr.io/config-management-release/config-management-operator:20200912002329-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Erstellen Sie eine Variable für Ihre private Registry-URL:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  3. Taggen Sie die Images mit Ihrer privaten Registry-URL:
    docker tag gcr.io/config-management-release/config-management-operator:20200912002329-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Ersetzen Sie PRIVATE_REGISTRY_URL durch Ihre private Registry-URL.
  4. Übertragen Sie die getaggten Images in Ihre private Registry:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Wenn Sie die getaggten Images aus Ihrer privaten Registry abrufen können, war der Vorgang erfolgreich.