Habor是由VMWare中国团队开源的容器镜像仓库。事实上,Habor是在Docker Registry上进行了相应的企业级扩展,从而得到了更加普遍的应用,这些新的企业级特性包括:管理用户界面,基于角色的访问控制 ,水平扩展,同步,AD/LDAP集成以及审计日志等linux
一. 手动部署git
curl -L https://github.com/docker/compose/releases/download/1.23.1/docker-compose-`uname -s`-`uname -m` -o /usr/bin/docker-compose chmod +x /usr/local/bin/docker-compose
wget https://storage.googleapis.com/harbor-releases/release-1.6.0/harbor-offline-installer-v1.6.2.tgz tar zxf harbor-offline-installer-v1.6.2.tgz
# mkdir /etc/pki/ca_test //建立CA更证书的目录 # cd /etc/pki/ca_test # mkdir root server client newcerts //建立几个相关的目录 # echo 01 > serial //定义序列号为01 # echo 01 > crlnumber //定义crl号为01 # touch index.txt //建立index.txt # cd .. # vi tls/openssl.cnf //改配置文件 default_ca = CA_default 改成 default_ca = CA_test [ CA_default ] 改成 [ CA_test ] dir = /etc/pki/CA 改成 dir = /etc/pki/ca_test certificate = $dir/cacert.pem 改成 certificate = $dir/root/ca.crt private_key = $dir/private/cakey.pe 改成 private_key = $dir/root/ca.key # openssl genrsa -out /etc/pki/ca_test/root/ca.key //生成私钥 # openssl req -new -key /etc/pki/ca_test/root/ca.key -out /etc/pki/ca_test/root/ca.csr //生成请求文件,会让咱们填写一些指标,这里要注意:若是在这一步填写了相应的指标, 好比Country Name、State or Province Name、hostname。 # openssl x509 -req -days 3650 -in /etc/pki/ca_test/root/ca.csr -signkey /etc/pki/ca_test/root/ca.key -out /etc/pki/ca_test/root/ca.crt //生成crt文件
# cd /etc/pki/ca_test/server # openssl genrsa -out server.key //生成私钥文件 # openssl req -new -key server.key -out server.csr//生成证书请求文件,填写信息须要和ca.csr中的Organization Name保持一致 # openssl ca -in server.csr -cert /etc/pki/ca_test/root/ca.crt -keyfile /etc/pki/ca_test/root/ca.key -out server.crt -days 3650 //用根证书签名server.csr,最后生成公钥文件server.crt,此步骤会有两个地方须要输入y Sign the certificate? [y/n]:y 1 out of 1 certificate requests certified, commit? [y/n]y
若是作ssl的双向认证,还须要给客户端生成一个证书,步骤和上面的基本一致 # cd /etc/pki/ca_test/client # openssl genrsa -out client.key //生成私钥文件 # openssl req -new -key client.key -out client.csr //生成请求文件,填写信息须要和ca.csr中的Organization Name保持一致 # openssl ca -in client.csr -cert /etc/pki/ca_test/root/ca.crt -keyfile /etc/pki/ca_test/root/ca.key -out client.crt -days 3650 //签名client.csr, 生成client.crt,此步若是出现 failed to update database TXT_DB error number 2 需执行: # sed -i 's/unique_subject = yes/unique_subject = no/' /etc/pki/ca_test/index.txt.attr 执行完,再次重复执行签名client.csr那个操做
这两个网址和腾讯云都提供免费的ssl服务github
https://freessl.org/
https://www.trustocean.com/docker
# cd harbor 编辑配置文件 # vim harbor.cfg 1)定义hostname(如 harbor.yuankeedu.com) 2)定义ui_url_protocol为https 3)定义ssl_cert/ssl_key 放置好ssl证书,修改路径 4)定义harbor_admin_password 安装 # sh install.sh //自动安装完成
修改后:vim
hostname = h.uedu.ml ui_url_protocol = https max_job_workers = 10 customize_crt = on ssl_cert = /root/harbor/START-uedu-ml.pem ssl_cert_key = /root/harbor/START-uedu-ml.key secretkey_path = /data admiral_url = NA log_rotate_count = 50 log_rotate_size = 200M http_proxy = https_proxy = no_proxy = 127.0.0.1,localhost,ui,registry
访问api
https://h.uedu.ml/
admin 默认密码为 Harbor12345tomcat
拉取公共镜像bash
docker pull tomcat
docker tag tomcat h.uedu.ml/aikerlinux/tomcat:latest //打标签为上传作准备curl
把tomcat镜像推送到harboride
docker login https://h.uedu.ml
输入用户名和密码
docker push h.uedu.ml/aikerlinux/tomcat:latest
如下操做在master上执行:
1)建立secret
kubectl create secret docker-registry my-secret --docker-server=h.uedu.ml --docker-username=admin --docker-password=Harbor12345
建立完成后,能够用如下命令查看:
# kubectl get secret
2)定义一个pod 首先,须要在harbo私有仓库里推送一个httpd的镜像
,地址为h.uedu.ml/aikerlinux/httpd:latest
docker pull httpd docker tag httpd h.uedu.ml/aikerlinux/httpd:latest docker login https://h.uedu.ml docker push h.uedu.ml/aikerlinux/httpd:latest
而后再定义一个部署http pod的yaml文件
[root@master ~]# vim httpd.yaml apiVersion: v1 kind: Pod metadata: name: httpd-pod spec: containers: - image: h.uedu.ml/aikerlinux/httpd name: httpd-pod imagePullSecrets: - name: my-secret
# kubectl create -f httpd.yaml # kubectl describe pod httpd-pod //查看pod建立过程的信息,可能会存在的问题