docker 装置harbor
1.下载镜像依赖
docker pull vmware/harbor-jobservice:v1.1.2docker pull vmware/harbor-ui:v1.1.2docker pull vmware/harbor-adminserver:v1.1.2docker pull vmware/harbor-db:v1.1.2docker pull vmware/registry:2.6.1-photondocker pull vmware/harbor-notary-db:mariadb-10.1.10docker pull vmware/nginx:1.11.5-patcheddocker pull vmware/notary-photon:signer-0.5.0docker pull vmware/notary-photon:server-0.5.0docker pull vmware/harbor-log:v1.1.2docker pull photon:1.0
2.Docker-compose 装置
装置形式一
#1、下载指定版本的docker-compose$ curl -L https://github.com/docker/compose/releases/download/1.13.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose#2、对二进制文件赋可执行权限$ sudo chmod +x /usr/local/bin/docker-compose#3、测试下docker-compose是否装置胜利$ docker-compose --versiondocker-compose version 1.13.0, build 1719ceb
装置形式二:
举荐应用pip装置docker-compose
#装置pipyum -y install epel-releaseyum -y install python-pip#确认版本pip --version#更新pippip install --upgrade pip#装置 docker-composepip install docker-composedocker-compose version
3.下载Harbor安装文件
1、在线安装包
$ wget https://github.com/vmware/harbor/releases/download/v1.1.2/harbor-online-installer-v1.1.2.tgz$ tar xvf harbor-online-installer-v1.1.2.tgz
2、离线安装包
$ wget https://github.com/vmware/harbor/releases/download/v1.1.2/harbor-offline-installer-v1.1.2.tgz$ tar xvf harbor-offline-installer-v1.1.2.tgz
咱们这里抉择离线安装包进行装置,因为github 下载地址速度较慢,也可通过上面百度云下载
链接:https://pan.baidu.com/s/1qiln... 明码:py93
4.批改Harbor配置
habor 域名设置为 harbor.demo.com
cd harborvi harbor.cfg## Configuration file of Harbor#The IP address or hostname to access admin UI and registry service.#DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients.hostname = harbor.demo.com#The protocol for accessing the UI and token/notification service, by default it is http.#It can be set to https if ssl is enabled on nginx.ui_url_protocol = http#The password for the root user of mysql db, change this before any production use.db_password = root123#Maximum number of job workers in job service max_job_workers = 3 #Determine whether or not to generate certificate for the registry's token.#If the value is on, the prepare script creates new root cert and private key #for generating token to access the registry. If the value is off the default key/cert will be used.#This flag also controls the creation of the notary signer's cert.customize_crt = on#The path of cert and key files for nginx, they are applied only the protocol is set to httpsssl_cert = /data/cert/server.crtssl_cert_key = /data/cert/server.key#The path of secretkey storagesecretkey_path = /data#Admiral's url, comment this attribute, or set its value to NA when Harbor is standaloneadmiral_url = NA#NOTES: The properties between BEGIN INITIAL PROPERTIES and END INITIAL PROPERTIES#only take effect in the first boot, the subsequent changes of these properties #should be performed on web ui#************************BEGIN INITIAL PROPERTIES************************#Email account settings for sending out password resetting emails.#Email server uses the given username and password to authenticate on TLS connections to host and act as identity.#Identity left blank to act as username.email_identity = email_server = smtp.mxhichina.comemail_server_port = 25email_username = harbor@demo.comemail_password = 123456email_from = harbor <harbor@demo.com>email_ssl = false##The initial password of Harbor admin, only works for the first time when Harbor starts. #It has no effect after the first launch of Harbor.#Change the admin password from UI after launching Harbor.harbor_admin_password = Harbor12345##By default the auth mode is db_auth, i.e. the credentials are stored in a local database.#Set it to ldap_auth if you want to verify a user's credentials against an LDAP server.auth_mode = db_auth#The url for an ldap endpoint.ldap_url = ldaps://ldap.mydomain.com#A user's DN who has the permission to search the LDAP/AD server. #If your LDAP/AD server does not support anonymous search, you should configure this DN and ldap_search_pwd.ldap_searchdn = uid=searchuser,ou=people,dc=mydomain,dc=com#the password of the ldap_searchdnldap_search_pwd = password#The base DN from which to look up a user in LDAP/ADldap_basedn = ou=people,dc=mydomain,dc=com#Search filter for LDAP/AD, make sure the syntax of the filter is correct.ldap_filter = (objectClass=person)# The attribute used in a search to match a user, it could be uid, cn, email, sAMAccountName or other attributes depending on your LDAP/AD ldap_uid = uid #the scope to search for users, 1-LDAP_SCOPE_BASE, 2-LDAP_SCOPE_ONELEVEL, 3-LDAP_SCOPE_SUBTREEldap_scope = 3 #Timeout (in seconds) when connecting to an LDAP Server. The default value (and most reasonable) is 5 seconds.ldap_timeout = 5#Turn on or off the self-registration featureself_registration = on#The expiration time (in minute) of token created by token service, default is 30 minutestoken_expiration = 30#The flag to control what users have permission to create projects#The default value "everyone" allows everyone to creates a project. #Set to "adminonly" so that only admin user can create project.project_creation_restriction = everyone#Determine whether the job service should verify the ssl cert when it connects to a remote registry.#Set this flag to off when the remote registry uses a self-signed or untrusted certificate.verify_remote_cert = on#************************END INITIAL PROPERTIES************************#############
默认是80端口,如果端口占用,咱们能够去批改docker-compose.yml文件中,对应服务映射本地的端口9999。
docker-compose.yml
proxy: image: vmware/nginx:1.11.5-patched container_name: nginx restart: always volumes: - ./common/config/nginx:/etc/nginx:z networks: - harbor ports: - 9999:80 - 443:443 - 4443:4443 depends_on: - mysql - registry - ui - log logging: driver: "syslog" options:
启动 Harbor
批改完配置文件后,在的当前目录执行./install.sh
5.配置NGINX
cd /etc/nginx/vi nginx.confserver { listen 80; server_name harbor.demo.com; root /usr/share/nginx/html; include /etc/nginx/default.d/*.conf; location / { # 设置最大容许上传单个的文件大小 client_max_body_size 1024m; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass http://localhost:9999; index index.html index.htm; } error_page 404 /404.html; location = /40x.html { } error_page 500 502 503 504 /50x.html; location = /50x.html { } }
#查看配置是否正确nginx -t#重启服务sudo systemctl restart nginx
6.拜访harbor 并提交镜像
拜访刚设置的hostname即可 http://harbor.demo.com/
这是因为docker1.3.2版本开始默认docker registry应用的是https,咱们设置Harbor默认http形式,所以当执行用docker login、pull、push等命令操作非https的docker regsitry的时就会报错。
docker login harbor.demo.comUsername: adminPassword: Error response from daemon: Get https://harbor.demo.com/v2/: dial tcp 10.220.107.52:443: connect: connection refused
解决办法:
#批改docker启动配置vi /lib/systemd/system/docker.service#批改前ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock#批改后ExecStart=/usr/bin/dockerd --insecure-registry harbor.demo.com -H fd:// --containerd=/run/containerd/containerd.sock
7.harbor 重启
cd /usr/local/harbor1、进行Harbor$ docker-compose down -vStopping nginx ... doneStopping harbor-jobservice ... done......Removing harbor-log ... doneRemoving network harbor_harbor2、启动Harbor$ docker-compose up -dCreating network "harbor_harbor" with the default driverCreating harbor-log ... ......Creating nginxCreating harbor-jobservice ... done
8.日志查看
日志存储地位 /var/log/harbor/
本文由博客群发一文多发等经营工具平台 OpenWrite 公布