• dockercompose 部署 harbor 镜像仓库


    1、安装 docker(这个就不写了,可以看https://www.cnblogs.com/lfl17718347843/p/13417304.html)
    略......

    2、安装 docker-compose

    [root@master2 ~]# curl -L "https://github.com/docker/compose/releases/download/1.29.2/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose
    
    [root@master2 ~]# chmod +x /usr/local/bin/docker-compose
    

    3、下载 harbor-offline-installer-v1.7.5.tgz 安装包并解压

    [root@master2 ~]# wget https://storage.googleapis.com/harbor-releases/release-1.7.0/harbor-offline-installer-v1.7.5.tgz
    
    [root@master2 ~]# mkdir /data/cert
    
    [root@master2 ~]# tar -zxf harbor-offline-installer-v1.7.5.tgz -C /data/
    

    4、修改 harbor.cfg 配置文件

    [root@master2 ~]# cat /data/harbor/harbor.cfg 
    ## Configuration file of Harbor
    
    #This attribute is for migrator to detect the version of the .cfg file, DO NOT MODIFY!
    _version = 1.7.0
    #The IP address or hostname to access admin UI and registry service.
    #DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients.
    #DO NOT comment out this line, modify the value of "hostname" directly, or the installation will fail.
    hostname = 192.168.200.4                    # 可以写主机名或者IP
    
    #The protocol for accessing the UI and token/notification service, by default it is http.
    #It can be set to https if ssl is enabled on nginx.
    ui_url_protocol = https                     # 根据自己情况配置
    
    #Maximum number of job workers in job service  
    max_job_workers = 10 
    
    #Determine whether or not to generate certificate for the registry's token.
    #If the value is on, the prepare script creates new root cert and private key 
    #for generating token to access the registry. If the value is off the default key/cert will be used.
    #This flag also controls the creation of the notary signer's cert.
    customize_crt = on
    
    #The path of cert and key files for nginx, they are applied only the protocol is set to https
    port: 443                                       # 端口不一样就添加
    ssl_cert = /data/cert/server.crt                # 证书路径根据自己环境创建
    ssl_cert_key = /data/cert/server.key            # 同上
    
    #The path of secretkey storage
    secretkey_path = /data
    
    #Admiral's url, comment this attribute, or set its value to NA when Harbor is standalone
    admiral_url = NA
    
    #Log files are rotated log_rotate_count times before being removed. If count is 0, old versions are removed rather than rotated.
    log_rotate_count = 50
    #Log files are rotated only if they grow bigger than log_rotate_size bytes. If size is followed by k, the size is assumed to be in kilobytes. 
    #If the M is used, the size is in megabytes, and if G is used, the size is in gigabytes. So size 100, size 100k, size 100M and size 100G 
    #are all valid.
    log_rotate_size = 200M
    
    #Config http proxy for Clair, e.g. http://my.proxy.com:3128
    #Clair doesn't need to connect to harbor internal components via http proxy.
    http_proxy =
    https_proxy =
    no_proxy = 127.0.0.1,localhost,core,registry
    
    #NOTES: The properties between BEGIN INITIAL PROPERTIES and END INITIAL PROPERTIES
    #only take effect in the first boot, the subsequent changes of these properties 
    #should be performed on web ui
    
    #************************BEGIN INITIAL PROPERTIES************************
    
    #Email account settings for sending out password resetting emails.
    
    #Email server uses the given username and password to authenticate on TLS connections to host and act as identity.
    #Identity left blank to act as username.
    email_identity = 
    
    email_server = smtp.mydomain.com
    email_server_port = 25
    email_username = sample_admin@mydomain.com
    email_password = abc
    email_from = admin <sample_admin@mydomain.com>
    email_ssl = false
    email_insecure = false
    
    ##The initial password of Harbor admin, only works for the first time when Harbor starts. 
    #It has no effect after the first launch of Harbor.
    #Change the admin password from UI after launching Harbor.
    harbor_admin_password = Harbor12345                # 密码可以自己修改
    
    ##By default the auth mode is db_auth, i.e. the credentials are stored in a local database.
    #Set it to ldap_auth if you want to verify a user's credentials against an LDAP server.
    auth_mode = db_auth
    
    #The url for an ldap endpoint.
    ldap_url = ldaps://ldap.mydomain.com
    
    #A user's DN who has the permission to search the LDAP/AD server. 
    #If your LDAP/AD server does not support anonymous search, you should configure this DN and ldap_search_pwd.
    #ldap_searchdn = uid=searchuser,ou=people,dc=mydomain,dc=com
    
    #the password of the ldap_searchdn
    #ldap_search_pwd = password
    
    #The base DN from which to look up a user in LDAP/AD
    ldap_basedn = ou=people,dc=mydomain,dc=com
    
    #Search filter for LDAP/AD, make sure the syntax of the filter is correct.
    #ldap_filter = (objectClass=person)
    
    # The attribute used in a search to match a user, it could be uid, cn, email, sAMAccountName or other attributes depending on your LDAP/AD  
    ldap_uid = uid 
    
    #the scope to search for users, 0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE
    ldap_scope = 2 
    
    #Timeout (in seconds)  when connecting to an LDAP Server. The default value (and most reasonable) is 5 seconds.
    ldap_timeout = 5
    
    #Verify certificate from LDAP server
    ldap_verify_cert = true
    
    #The base dn from which to lookup a group in LDAP/AD
    ldap_group_basedn = ou=group,dc=mydomain,dc=com
    
    #filter to search LDAP/AD group
    ldap_group_filter = objectclass=group
    
    #The attribute used to name a LDAP/AD group, it could be cn, name
    ldap_group_gid = cn
    
    #The scope to search for ldap groups. 0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE
    ldap_group_scope = 2
    
    #Turn on or off the self-registration feature
    self_registration = on
    
    #The expiration time (in minute) of token created by token service, default is 30 minutes
    token_expiration = 30
    
    #The flag to control what users have permission to create projects
    #The default value "everyone" allows everyone to creates a project. 
    #Set to "adminonly" so that only admin user can create project.
    project_creation_restriction = everyone
    
    #************************END INITIAL PROPERTIES************************
    
    #######Harbor DB configuration section#######
    
    #The address of the Harbor database. Only need to change when using external db.
    db_host = postgresql
    
    #The password for the root user of Harbor DB. Change this before any production use.
    db_password = root123
    
    #The port of Harbor database host
    db_port = 5432
    
    #The user name of Harbor database
    db_user = postgres
    
    ##### End of Harbor DB configuration#######
    
    ##########Redis server configuration.############
    
    #Redis connection address
    redis_host = redis
    
    #Redis connection port
    redis_port = 6379
    
    #Redis connection password
    redis_password = 
    
    #Redis connection db index
    #db_index 1,2,3 is for registry, jobservice and chartmuseum. 
    #db_index 0 is for UI, it's unchangeable
    redis_db_index = 1,2,3
    
    ########## End of Redis server configuration ############
    
    ##########Clair DB configuration############
    
    #Clair DB host address. Only change it when using an exteral DB.
    clair_db_host = postgresql
    #The password of the Clair's postgres database. Only effective when Harbor is deployed with Clair.
    #Please update it before deployment. Subsequent update will cause Clair's API server and Harbor unable to access Clair's database.
    clair_db_password = root123
    #Clair DB connect port
    clair_db_port = 5432
    #Clair DB username
    clair_db_username = postgres
    #Clair default database
    clair_db = postgres
    
    #The interval of clair updaters, the unit is hour, set to 0 to disable the updaters.
    clair_updaters_interval = 12
    
    ##########End of Clair DB configuration############
    
    #The following attributes only need to be set when auth mode is uaa_auth
    uaa_endpoint = uaa.mydomain.org
    uaa_clientid = id
    uaa_clientsecret = secret
    uaa_verify_cert = true
    uaa_ca_cert = /path/to/ca.pem
    
    
    ### Harbor Storage settings ###
    #Please be aware that the following storage settings will be applied to both docker registry and helm chart repository.
    #registry_storage_provider can be: filesystem, s3, gcs, azure, etc.
    registry_storage_provider_name = filesystem
    #registry_storage_provider_config is a comma separated "key: value" pairs, e.g. "key1: value, key2: value2".
    #To avoid duplicated configurations, both docker registry and chart repository follow the same storage configuration specifications of docker registry.
    #Refer to https://docs.docker.com/registry/configuration/#storage for all available configuration.
    registry_storage_provider_config =
    #registry_custom_ca_bundle is the path to the custom root ca certificate, which will be injected into the truststore
    #of registry's and chart repository's containers.  This is usually needed when the user hosts a internal storage with self signed certificate.
    registry_custom_ca_bundle = 
    
    #If reload_config=true, all settings which present in harbor.cfg take effect after prepare and restart harbor, it overwrites exsiting settings.
    #reload_config=true
    #Regular expression to match skipped environment variables
    #skip_reload_env_pattern=(^EMAIL.*)|(^LDAP.*)
    

    5、生成CA证书
    1> 创建key文件

    [root@master2 cert]# openssl genrsa -out ca.key 4096
     Generating RSA private key, 4096 bit long modulus
     ............++
     .........................++
     e is 65537 (0x10001)
    

    2> 生成证书

    [root@master2 cert]# openssl req -x509 -new -nodes -sha512 -days 3650  -subj "/CN=192.168.200.4"  -key ca.key  -out ca.crt
    
    [root@k8s_master2 harbor]# ll /data/cert/
    total 28
    -rw-r--r-- 1 root root 1797 Mar 24 05:37 ca.crt
    -rw-r--r-- 1 root root 3243 Mar 24 05:37 ca.key
    

    6、生成服务器证书
    1> 创建私钥

    [root@master2 cert]# openssl genrsa -out server.key 4096
     Generating RSA private key, 4096 bit long modulus
     ........................................................................................................................................................++
     .............................................................................++
     e is 65537 (0x10001)
    

    2> 生成证书签名请求

    [root@master2 cert]# openssl req  -new -sha512  -subj "/CN=192.168.200.4"  -key server.key  -out server.csr
    

    3> 查看证书

    [root@master2 ~]# ll /data/cert/
    total 28
    -rw-r--r-- 1 root root 1797 Mar 24 05:37 ca.crt
    -rw-r--r-- 1 root root 3243 Mar 24 05:37 ca.key
    -rw-r--r-- 1 root root 1590 Mar 24 05:38 server.csr
    -rw-r--r-- 1 root root 3247 Mar 24 05:38 server.key
    

    7、生成harbor仓库主机的证书
    1> 创建 v3.ext 文件

    [root@master2 cert]# cat v3.ext 
    authorityKeyIdentifier=keyid,issuer
    basicConstraints=CA:FALSE
    keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
    extendedKeyUsage = serverAuth 
    subjectAltName = @alt_names
    
    [alt_names]
    DNS=192.168.200.4
    

    2> 生成harbor仓库主机的证书

    [root@master2 cert]# openssl x509 -req -sha512 -days 3650 -extfile v3.ext -CA ca.crt -CAkey ca.key -CAcreateserial -in server.csr -out server.crt
     Signature ok
     subject=/CN=harbor23.com
     Getting CA Private Key
    

    3> 再次查看生成的所有证书

    [root@master2 ~]# ll /data/cert/
    total 28
    -rw-r--r-- 1 root root 1797 Mar 24 05:37 ca.crt
    -rw-r--r-- 1 root root 3243 Mar 24 05:37 ca.key
    -rw-r--r-- 1 root root   17 Mar 24 05:40 ca.srl
    -rw-r--r-- 1 root root 1834 Mar 24 05:40 server.crt
    -rw-r--r-- 1 root root 1590 Mar 24 05:38 server.csr
    -rw-r--r-- 1 root root 3247 Mar 24 05:38 server.key
    -rw-r--r-- 1 root root  231 Mar 24 05:39 v3.ext
    

    8、为docker配置harbor认证

    mkdir /etc/docker/certs
    
    scp /data/cert/server.crt root@192.168.200.6:/etc/docker/certs
    

    注意:harbor.cfg 配置文件中 server.crt和server.key在哪个路径下就要把这两个证书移动到哪个路径下,必需要一致。

    9、安装

    [root@master2 harbor]# ./prepare 
    Clearing the configuration file: ./common/config/adminserver/env
    Clearing the configuration file: ./common/config/core/env
    Clearing the configuration file: ./common/config/core/app.conf
    Clearing the configuration file: ./common/config/core/private_key.pem
    Clearing the configuration file: ./common/config/db/env
    Clearing the configuration file: ./common/config/jobservice/env
    Clearing the configuration file: ./common/config/jobservice/config.yml
    Clearing the configuration file: ./common/config/registry/config.yml
    Clearing the configuration file: ./common/config/registry/root.crt
    Clearing the configuration file: ./common/config/registryctl/env
    Clearing the configuration file: ./common/config/registryctl/config.yml
    Clearing the configuration file: ./common/config/nginx/nginx.conf
    Clearing the configuration file: ./common/config/log/logrotate.conf
    loaded secret from file: /data/secretkey
    Generated configuration file: ./common/config/nginx/nginx.conf
    Generated configuration file: ./common/config/adminserver/env
    Generated configuration file: ./common/config/core/env
    Generated configuration file: ./common/config/registry/config.yml
    Generated configuration file: ./common/config/db/env
    Generated configuration file: ./common/config/jobservice/env
    Generated configuration file: ./common/config/jobservice/config.yml
    Generated configuration file: ./common/config/log/logrotate.conf
    Generated configuration file: ./common/config/registryctl/env
    Generated configuration file: ./common/config/core/app.conf
    Generated certificate, key file: ./common/config/core/private_key.pem, cert file: ./common/config/registry/root.crt
    The configuration files are ready, please use docker-compose to start the service.
    
    [root@master2 harbor]# ./install.sh 
    
    [Step 0]: checking installation environment ...
    
    Note: docker version: 19.03.15
    
    Note: docker-compose version: 1.29.2
    
    [Step 1]: loading Harbor images ...
    Loaded image: goharbor/harbor-adminserver:v1.7.5
    Loaded image: goharbor/harbor-portal:v1.7.5
    Loaded image: goharbor/harbor-db:v1.7.5
    Loaded image: goharbor/registry-photon:v2.6.2-v1.7.5
    Loaded image: goharbor/harbor-migrator:v1.7.5
    Loaded image: goharbor/harbor-core:v1.7.5
    Loaded image: goharbor/harbor-log:v1.7.5
    Loaded image: goharbor/redis-photon:v1.7.5
    Loaded image: goharbor/nginx-photon:v1.7.5
    Loaded image: goharbor/harbor-registryctl:v1.7.5
    Loaded image: goharbor/chartmuseum-photon:v0.8.1-v1.7.5
    Loaded image: goharbor/harbor-jobservice:v1.7.5
    Loaded image: goharbor/notary-server-photon:v0.6.1-v1.7.5
    Loaded image: goharbor/notary-signer-photon:v0.6.1-v1.7.5
    Loaded image: goharbor/clair-photon:v2.0.8-v1.7.5
    
    
    [Step 2]: preparing environment ...
    Clearing the configuration file: ./common/config/adminserver/env
    Clearing the configuration file: ./common/config/core/env
    Clearing the configuration file: ./common/config/core/app.conf
    Clearing the configuration file: ./common/config/core/private_key.pem
    Clearing the configuration file: ./common/config/db/env
    Clearing the configuration file: ./common/config/jobservice/env
    Clearing the configuration file: ./common/config/jobservice/config.yml
    Clearing the configuration file: ./common/config/registry/config.yml
    Clearing the configuration file: ./common/config/registry/root.crt
    Clearing the configuration file: ./common/config/registryctl/env
    Clearing the configuration file: ./common/config/registryctl/config.yml
    Clearing the configuration file: ./common/config/nginx/nginx.conf
    Clearing the configuration file: ./common/config/log/logrotate.conf
    loaded secret from file: /data/secretkey
    Generated configuration file: ./common/config/nginx/nginx.conf
    Generated configuration file: ./common/config/adminserver/env
    Generated configuration file: ./common/config/core/env
    Generated configuration file: ./common/config/registry/config.yml
    Generated configuration file: ./common/config/db/env
    Generated configuration file: ./common/config/jobservice/env
    Generated configuration file: ./common/config/jobservice/config.yml
    Generated configuration file: ./common/config/log/logrotate.conf
    Generated configuration file: ./common/config/registryctl/env
    Generated configuration file: ./common/config/core/app.conf
    Generated certificate, key file: ./common/config/core/private_key.pem, cert file: ./common/config/registry/root.crt
    The configuration files are ready, please use docker-compose to start the service.
    
    
    [Step 3]: checking existing instance of Harbor ...
    
    Note: stopping existing Harbor instance ...
    Stopping nginx              ... done
    Stopping harbor-portal      ... done
    Stopping harbor-jobservice  ... done
    Stopping harbor-core        ... done
    Stopping registry           ... done
    Stopping harbor-adminserver ... done
    Stopping redis              ... done
    Stopping harbor-db          ... done
    Stopping registryctl        ... done
    Stopping harbor-log         ... done
    Removing nginx              ... done
    Removing harbor-portal      ... done
    Removing harbor-jobservice  ... done
    Removing harbor-core        ... done
    Removing registry           ... done
    Removing harbor-adminserver ... done
    Removing redis              ... done
    Removing harbor-db          ... done
    Removing registryctl        ... done
    Removing harbor-log         ... done
    Removing network harbor_harbor
    
    
    [Step 4]: starting Harbor ...
    Creating network "harbor_harbor" with the default driver
    Creating harbor-log ... done
    Creating redis              ... done
    Creating registryctl        ... done
    Creating registry           ... done
    Creating harbor-adminserver ... done
    Creating harbor-db          ... done
    Creating harbor-core        ... done
    Creating harbor-portal      ... done
    Creating harbor-jobservice  ... done
    Creating nginx              ... done
    
    ✔ ----Harbor has been installed and started successfully.----
    
    Now you should be able to visit the admin portal at http://192.168.200.4. 
    For more details, please visit https://github.com/goharbor/harbor .
    

    10、访问 web

    11、创建项目

    12、在另一台服务器登录 harbor 仓库
    1> 修改另一台服务器 daemon.json 配置文件

    [root@node1 data]# cat /etc/docker/daemon.json 
    {
      "data-root": "/data/docker",
      "registry-mirrors":["https://docker.mirrors.ustc.edu.cn"],
      "insecure-registries": ["192.168.200.4"],                 # 添加这一行(里面的ip是本机的hostname)
      "log-opts": {
        "max-size": "5m",
        "max-file":"3"
      },
      "exec-opts": ["native.cgroupdriver=systemd"]
    }
    

    2> 重启 docker

    systemctl restart docker
    

    3> 登录 harbor

    [root@node1 ~]# docker login 192.168.200.4 或者 docker login https://192.168.200.4
    Username: admin
    Password: 
    WARNING! Your password will be stored unencrypted in /root/.docker/config.json.
    Configure a credential helper to remove this warning. See
    https://docs.docker.com/engine/reference/commandline/login/#credentials-store
    
    Login Succeeded
    

    注意:如果不修改 daemon.json 直接登录 harbor 会提示以下错误

    [root@node1 ~]# docker login 192.168.200.4
    Username: admin
    Password: 
    Error response from daemon: Get https://192.168.200.4/v2/: dial tcp 192.168.200.4:443: connect: connection refused
    

    13、上传镜像到 harbor

    [root@node1 ~]# docker images 
    REPOSITORY                                                         TAG                 IMAGE ID            CREATED             SIZE
    nginx                                                              latest              605c77e624dd        2 months ago        141MB
    
    [root@node1 ~]# docker tag nginx 192.168.200.4/k8s_images/nginx:latest
    
    [root@node1 ~]# docker images 
    REPOSITORY                                                         TAG                 IMAGE ID            CREATED             SIZE
    192.168.200.4/k8s_images/nginx                                     latest              605c77e624dd        2 months ago        141MB
    nginx                                                              latest              605c77e624dd        2 months ago        141MB
    
    
    [root@node1 ~]# docker push 192.168.200.4/k8s_images/nginx
    The push refers to repository [192.168.200.4/k8s_images/nginx]
    d874fd2bc83b: Pushed 
    32ce5f6a5106: Pushed 
    f1db227348d0: Pushed 
    b8d6e692a25e: Pushed 
    e379e8aedd4d: Pushed 
    2edcec3590a4: Pushed 
    latest: digest: sha256:ee89b00528ff4f02f2405e4ee221743ebc3f8e8dd0bfd5c4c20a2fa2aaa7ede3 size: 1570
    

    14、查看已上传的镜像

  • 相关阅读:
    Zabbix设置自定义监控
    mysql数据库表的查询操作-总结
    常用软件编译参数以及软件地址
    # <center>merge表不可用的问题</center>
    不在更新了
    SVN同步大坑
    记一次ftp服务器搭建走过的坑
    详解apache的allow和deny
    libc.so.6被删后导致系统无法使用的原因及解决方法
    puppet学习笔记(二)
  • 原文地址:https://www.cnblogs.com/lfl17718347843/p/16061842.html
Copyright © 2020-2023  润新知