Como atualizar o Anthos Config Management usando um registro particular

Cada versão do Anthos Config Management requer um conjunto específico de imagens com controle de versão para ser executado. Se você estiver usando um registro particular, será necessário extrair, marcar com tag e enviar essas imagens ao registro particular antes de instalar os componentes do Anthos Config Management ou fazer upgrade da versão do Anthos Config Management.

Como adicionar imagens a um registro particular

Para enviar imagens do Anthos Config Management específicas da versão a um registro particular, clique no ícone de mais da versão que você quer usar e conclua as etapas listadas.

1.9.0

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210903172607-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.9.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210903172607-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210903172607-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.3-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.3-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/hydration-controller:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/hydration-controller:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.9.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.9.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.8.2

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210811235940-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210811235940-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.2-07e2fd0.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.3 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
     
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210811235940-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.2-07e2fd0.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.3
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.8.1

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210715174329-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.8.1-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.4
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210715174329-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.1__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.8.1-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.4 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210715174329-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.1-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.4
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.8.0

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210609013330-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker pull gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/reconciler:v1.8.0-rc.8
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.3
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210609013330-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.8.0-f6c2fe8.g1 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker tag gcr.io/config-management-release/git-sync:v3.3.2-gke.0__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.11.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.2 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/reconciler:v1.8.0-rc.8 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.3 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210609013330-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.8.0-f6c2fe8.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.3.2-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.11.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.2
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.8.0-rc.8
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.3
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.7.2

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.7.1

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210513004147-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.7.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210513004147-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.7.1-9b5e4cf.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.8.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.7.2-rc.2 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.1 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210513004147-op
    docker push ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.7.1-9b5e4cf.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.8.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.7.0

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210330235755-op
    docker pull gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/otelcol:v0.22.0
    docker pull gcr.io/config-management-release/otelcontribcol:v0.22.0
    docker pull gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/reconciler:v1.7.0-rc.5
    docker pull gcr.io/config-management-release/resource-group-controller:v0.7.0
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210330235755-op \
     ${PRIVATE_REGISTRY_URL}/config-management-operator:20210330235755-op
    docker tag gcr.io/config-management-release/admission-webhook:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/admission-webhook:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
     ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
     ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.2.2__linux_amd64 \
     ${PRIVATE_REGISTRY_URL}/git-sync:v3.2.2__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
     ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.1 \
     ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
     ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/nomos:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/otelcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcol:v0.22.0
    docker tag gcr.io/config-management-release/otelcontribcol:v0.22.0 \
     ${PRIVATE_REGISTRY_URL}/otelcontribcol:v0.22.0
    docker tag gcr.io/config-management-release/reconciler-manager:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/reconciler:v1.7.0-rc.5 \
     ${PRIVATE_REGISTRY_URL}/reconciler:v1.7.0-rc.5
    docker tag gcr.io/config-management-release/resource-group-controller:v0.7.0 \
     ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.7.0
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.6.2

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210209202053-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/reconciler:v1.6.2-rc.2
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210209202053-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.2-6dd505e.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.10.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/reconciler:v1.6.2-rc.2 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210209202053-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.2-6dd505e.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.10.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.2-rc.2
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.6.1

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20210112004802-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/reconciler:v1.6.1-rc.4
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20210112004802-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.1-5610c59.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.7.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/reconciler:v1.6.1-rc.4 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20210112004802-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.1-5610c59.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.7.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.1-rc.4
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.6.0

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20201118213152-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/reconciler:v1.6.0-rc.3
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20201118213152-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.6.0-acd32ec7.g1 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler-manager:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/reconciler:v1.6.0-rc.3 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201118213152-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.6.0-acd32ec7.g1
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.6.0-rc.3
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.5.2

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20201031033402-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1
    docker pull gcr.io/config-management-release/kube-rbac-proxy:v0.5.0
    docker pull gcr.io/config-management-release/nomos:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/reconciler:v1.5.2-rc.10
    docker pull gcr.io/config-management-release/resource-group-controller:v0.5.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20201031033402-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.6.0-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.6.0-hc.1 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker tag gcr.io/config-management-release/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker tag gcr.io/config-management-release/nomos:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/reconciler:v1.5.2-rc.10 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker tag gcr.io/config-management-release/resource-group-controller:v0.5.1 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201031033402-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.6.0-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.6.0-hc.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.2-rc.10
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.5.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.5.1

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20201007005948-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/reconciler:v1.5.1-rc.7
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20201007005948-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.1__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.3-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/reconciler:v1.5.1-rc.7 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20201007005948-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.1__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.3-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.1-rc.7
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.

1.5.0

Para adicionar as imagens a um registro particular, siga estas etapas:

  1. Extraia as imagens do Anthos Config Management:
    docker pull gcr.io/config-management-release/config-management-operator:20200912002329-op
    docker pull gcr.io/config-management-release/cnrm-controller:0c527ed
    docker pull gcr.io/config-management-release/cnrm-deletiondefender:0c527ed
    docker pull gcr.io/config-management-release/cnrm-recorder:0c527ed
    docker pull gcr.io/config-management-release/cnrm-webhook:0c527ed
    docker pull gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0
    docker pull gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64
    docker pull gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0
    docker pull gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0
    docker pull gcr.io/config-management-release/nomos:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/reconciler:v1.5.0-rc.41
    docker pull gcr.io/config-management-release/resource-group-controller:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
    docker pull gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0
    
  2. Crie uma variável para o URL do registro particular:
    export PRIVATE_REGISTRY_URL=PRIVATE_REGISTRY_URL
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  3. Marque com tag as imagens com o URL do registro particular:
    docker tag gcr.io/config-management-release/config-management-operator:20200912002329-op \
        ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker tag gcr.io/config-management-release/cnrm-controller:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker tag gcr.io/config-management-release/cnrm-deletiondefender:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker tag gcr.io/config-management-release/cnrm-recorder:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker tag gcr.io/config-management-release/cnrm-webhook:0c527ed \
        ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker tag gcr.io/config-management-release/gatekeeper:anthos1.5.0-15d56e3.g0 \
        ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker tag gcr.io/config-management-release/git-sync:v3.1.6-gke.0__linux_amd64 \
        ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker tag gcr.io/config-management-release/gke-hc-manager:v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker tag gcr.io/config-management-release/hnc-manager:hnc-v0.5.2-hc.0 \
        ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker tag gcr.io/config-management-release/nomos:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler-manager:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/reconciler:v1.5.0-rc.41 \
        ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker tag gcr.io/config-management-release/resource-group-controller:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker tag gcr.io/kubebuilder/kube-rbac-proxy:v0.5.0 \
        ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    
    Substitua PRIVATE_REGISTRY_URL pelo URL do registro particular.
  4. Envie as imagens marcadas com tag para o registro particular:
    docker push ${PRIVATE_REGISTRY_URL}/config-management-operator:20200912002329-op
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-controller:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-deletiondefender:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-recorder:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/cnrm-webhook:0c527ed
    docker push ${PRIVATE_REGISTRY_URL}/gatekeeper:anthos1.5.0-15d56e3.g0
    docker push ${PRIVATE_REGISTRY_URL}/git-sync:v3.1.6-gke.0__linux_amd64
    docker push ${PRIVATE_REGISTRY_URL}/gke-hc-manager:v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/hnc-manager:hnc-v0.5.2-hc.0
    docker push ${PRIVATE_REGISTRY_URL}/nomos:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler-manager:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/reconciler:v1.5.0-rc.41
    docker push ${PRIVATE_REGISTRY_URL}/resource-group-controller:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.0
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.4.1
    docker push ${PRIVATE_REGISTRY_URL}/kube-rbac-proxy:v0.5.0
    

Se for possível extrair as imagens marcadas com tag do registro particular, o procedimento foi bem-sucedido.