We were not admisn in registry-next after the upgrade. (unclear if we were before)
docker.io/library/python was showing 23 pulls by 0 artifacts. We need to make sure that all proxy-cache artifacts will be preserved.
Notes:
If redis is moved to 2.9.5, then moving back to 2.7.x won't work since the schema of redis will change. (Do we need to move to another HA redis or maybe just remove peristence on redis?)
Download docker.io in the proxy cache:
for i in memcached nginx httpd busybox alpine ubuntu redis postgres python node mongo mysql rabbitmq traefik docker hello-world mariadb openjdk golang registry ruby wordpress debian php centos ; do skopeo copy docker://registry-next.cern.ch/docker.io/library/$i oci://data/foo ; rm -rf /data/foo; done
for i in memcached nginx httpd busybox alpine ubuntu redis postgres python node mongo mysql rabbitmq traefik docker hello-world mariadb openjdk golang registry ruby wordpress debian php centos ; do docker pull registry-next.cern.ch/docker.io/library/$i ; docker system prune -a -f; done
We were not admin in registry-next after the upgrade. (unclear if we were before)
The issue here was not due to the upgrade. The user rules are directly populated from OIDC. I forgot to add the harbor-admin role during the OIDC creation and hence there were no user admin roles even before the upgrade.
But before the upgrade, I manually added myself as admin and this was in place after the upgrade too.
We can verify this when we upgrade it again.
@rbritoda We got the permission to ready groups for registry next, but it looks like this is not the way to get admin access based on an egroup. Do you know how is it done?
number of proxy cache artifacts in docker.io/python
take screenshot before upgrading
quota set to 99GB for the kuberntes project
kubernetes-developers is a maintainer in the kubernetes project
k8s robot accounts can push/pull in the private kubernetes-private project and push to the kubernetes public project.
robot-kubernetes+k8s in kubernetes
robot-kubernetes-private+k8s in kubernetes-private
chart gallery has the the releases/cern-magnum-0.13.2.tgz
[strigazi@aiadm08 s3cmd-profiles]$ helm repo list | grep releasesreleases https://registry.cern.ch/chartrepo/releases [strigazi@aiadm08 s3cmd-profiles]$ helm search repo cern-magnumNAME CHART VERSION APP VERSION DESCRIPTION releases/cern-magnum 0.13.2 A Helm chart for the CERN Magnum deployment
artefacts in registry.cern.ch/kubernetes-private/hyperkube
vulns in registry.cern.ch/kubernetes-private/hyperkube
same as 6
Speed of opening the UI for docker.io/library/python
Not reproducible, when opening in the morning (no one was using registry-next at night), opens in 2.56s, yesterday aftenoon it was slower, in prod takes 38.47s again in the morning.
Verify replication event-based replication rule works from registry-next.cern.ch/kubernetes-next/ to registry-staging.cern.ch/kubernetes-next/