Add External Address for Built-in Registry
TOC
Overview
When the global cluster uses the Platform Built-in registry, workload clusters typically also use this registry to pull images. The registry not only serves components within the global cluster but must also be accessible to workload cluster nodes.
In certain scenarios, workload cluster nodes cannot directly access the global cluster's registry address - for example, when the global cluster is in a private data center while workload clusters are in public clouds or edge environments.
This guide explains how to configure an externally accessible address for the platform's default registry to allow workload clusters to pull images.
Prerequisites
Before you begin, prepare the following:
- A domain name accessible by workload cluster nodes
- The IP address that the domain name points to
- A valid SSL certificate for the domain name
- The domain name must be different from the platform access address
- Ensure the domain's IP address can forward traffic to all control plane nodes of the
globalcluster
Procedure
Configure Certificate and Routing Rules for the Platform Registry
-
Copy the domain's valid certificate to any control plane node of the
globalcluster -
Create a TLS secret containing the domain certificate:
Example:
Note: After creating the certificate, monitor the expiration date of the registry-address.tls secret in the kube-system namespace of the
globalcluster. Replace the certificate before it expires. -
Create ingress rules on any control plane node of the
globalcluster:A response similar to
... createdindicates successful ingress creation. -
Check if a Registry Service resource exists:
If the Service doesn't exist, create it with:
-
Test the configuration by pulling an image from the registry using the domain name:
Or