Custom image registry
If your organization uses custom image registries, you can use them with Airbyte, too. Airbyte supports public image registries without secrets and private or public ones that use secrets.
Implementing Airbyte this way has several advantages.
- Security: Private custom image registries keep images in your network, reducing the risk of external threats.
- Access control: You have more control over who can access and modify images.
- Compliance: By keeping images in a controlled environment, it's easier to prove compliance with regulatory requirements for data storage and handling.
Use a public custom image registry without secrets
-
Add images to your custom image registry. If you don't already use a custom image registry, see the docs for these common options.
Cloud provider Service name Documentation Google Cloud Artifact Registry Quickstart AWS Amazon ECR Getting started with Amazon ECR Azure Container Registry Quickstart DockerHub Repositories DockerHub Quickstart GitHub Container Registry Working with the Container registry Self hosted Open-source Docker Registry Deploy a registry server -
Add the following customization to Airbyte's
values.yaml
file, replacing theregistry
value with your own registry location. This example demonstrates a custom image registry from GitHub.global:
image:
registry: ghcr.io/NAMESPACE
Use a private or public custom image registry with secrets
-
Add images to your custom image registry. If you don't already use a custom image registry, see the docs for these common options.
Cloud provider Service name Documentation Google Cloud Artifact Registry Quickstart AWS Amazon ECR Getting started with Amazon ECR Azure Container Registry Quickstart DockerHub Repositories DockerHub Quickstart GitHub Container Registry Working with the Container registry Self hosted Open-source Docker Registry Deploy a registry server -
Create a Kubernetes secret. In this example, we create a secret called
regcred
from a config file. That file contains authentication information for a private custom image registry. Learn more about Kubernetes secrets.kubectl create secret generic regcred \
--from-file=.dockerconfigjson=<path/to/.docker/config.json> \
--type=kubernetes.io/dockerconfigjson -
Add the following customization to Airbyte's
values.yaml
file, replacing theregistry
value with your own registry location, and the secrets names with your own. This example demonstrates a custom image registry on GitHub and using theregcred
secret, created earlier.global:
image:
registry: ghcr.io/NAMESPACE
imagePullSecrets:
- name: regcred