Configure a custom registry for Deployment images
Astronomer Software includes access to a Docker image registry that is managed by Astronomer. Every time a user deploys to Astronomer Software, a Docker image is generated and pushed to this registry. Depending on your deploy method, these Docker images can include OS and Python dependencies, DAG code, and the Airflow service.
Using the Astronomer registry is recommended when you’re getting started and your team is comfortable deploying code. However, the Astronomer registry might not meet your organization’s security requirements.
If your organization can’t support the Astronomer default internal registry, you can configure a custom container image registry. This option is best suited for organizations who require additional control for security and governance reasons. Using a custom registry provides your organization with the opportunity to scan images for CVEs, malicious code, and unapproved Python and OS-level packages contained in Docker images.
These instructions do not apply to images hosted on Amazon Elastic Container Registry (ECR). Credentials for ECR have a limited lifespan and are unsuitable for using on Astronomer Software. To use AWS ECR to serve images for Astronomer, you must grant permissions for the following actions to the Kubernetes Nodes IAM Role.
Prerequisites
- Helm.
- kubectl.
- Astro CLI version 1.3.0+.
- A custom container image registry.
- A process for building and pushing your Astro projects as images to your custom registry.
Setup
Standard
Airgapped
-
Create a secret for the container repository credentials in your Astronomer namespace:
To have Astronomer Software sync the registry credentials to all Deployment namespaces, add the following annotation:
--docker-server
. If you don’t need to synch your secrets between deployments, you don’t need to add the secret annotation.-
Open your
values.yaml
file. See Apply a Config Change. -
Add the following to your
values.yaml
file:
To use different registries for each Deployment, do not set astronomer.houston.config.deployments.registry.protectedCustomRegistry.updateRegistry.host
. When you specify the host, include both the registry and the repository in the format <registry>/<repo-name>/<subdirectory>
, where <repo-name>/<subdirectory>
represents a repository name and optionally a subdirectory within that repository.
-
Push the configuration change. See Apply a config change.
-
For any existing Deployments, run the following command to sync the registry credentials.
Push code to a custom registry
You can use the Astro CLI to push build and push images to your custom registry. Based on the Helm configurations in your Astronomer cluster, the Astro CLI automatically detects your custom image registry and pushes your image to it. It then calls the Houston API to update your Deployment to pull the new image from the registry.
After you configure your custom registry, open your Astro project and run:
Alternatively, you can run a GraphQL query to update the image in your Deployment after manually pushing the image to the custom registry. This can be useful for automating code deploys using CI/CD.
At a minimum, your query has to include the following:
Alternatively, you can run this same query using curl: