Mettre à jour Anthos Config Management à l'aide d'un registre privé

Chaque version d'Anthos Config Management nécessite un ensemble de versions d'images spécifique pour s'exécuter. Si vous utilisez un registre privé, vous devez extraire, ajouter un tag et transférer ces images vers votre registre privé avant de pouvoir installer les composants Anthos Config Management ou de mettre à niveau cette version d'Anthos Config Management.

Ajouter des images à un registre privé

Pour transférer des images Anthos Config Management spécifiques à une version vers un registre privé, cliquez sur l'icône "plus" de la version que vous souhaitez utiliser et suivez les étapes indiquées.

1.9.0

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210903172607-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210903172607-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210903172607-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.3-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/hydration-controller:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.8.2

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210811235940-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210811235940-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
     
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.8.1

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210715174329-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210715174329-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.8.0

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210609013330-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/reconciler:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.3
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210609013330-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/reconciler:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.3 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.7.2

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.7.1

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.7.0

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210330235755-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.0
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210330235755-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210330235755-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.0 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.0
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.6.2

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210209202053-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210209202053-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.6.1

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20210112004802-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20210112004802-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.6.0

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20201118213152-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20201118213152-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.5.2

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20201031033402-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20201031033402-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.5.1

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20201007005948-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20201007005948-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.

1.5.0

Pour ajouter les images à un registre privé, procédez comme suit :

  1. Extrayez les images Anthos Config Management :
    docker pull gcr.io/config-management-release/config-management-operator:20200912002329-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Créez une variable pour l'URL de votre registre privé :
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  3. Ajoutez un tag aux images avec l'URL de votre registre privé :
    docker tag gcr.io/config-management-release/config-management-operator:20200912002329-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Remplacez PRIVATE_REGISTRY_URL par l'URL de votre registre privé.
  4. Transférez les images taguées vers votre registre privé :
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Si vous pouvez extraire les images taguées de votre registre privé, la procédure a été correctement effectuée.