New to KubeDB? Please start here.

Using private Docker registry

KubeDB supports using private Docker registry. This tutorial will show you how to run KubeDB managed PostgreSQL database using private Docker images.

Before You Begin

At first, you need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using minikube.

To keep things isolated, this tutorial uses a separate namespace called demo throughout this tutorial.

$ kubectl create ns demo
namespace "demo" created

$ kubectl get ns demo
demo    Active  5s

Note: Yaml files used in this tutorial are stored in docs/examples/postgres folder in GitHub repository kubedb/cli.

Prepare Private Docker Registry

You will also need a docker private registry or private repository. In this tutorial we will use private repository of docker hub.

You have to push the required images from KubeDB’s Docker hub account into your private registry.

For Postgres, push the following images to your private registry.

$ export DOCKER_REGISTRY=<your-registry>

$ docker pull kubedb/operator:0.9.0 ; docker tag kubedb/operator:0.9.0 $DOCKER_REGISTRY/operator:0.9.0 ; docker push $DOCKER_REGISTRY/operator:0.9.0
$ docker pull kubedb/postgres:9.6-v1 ; docker tag kubedb/postgres:9.6-v1 $DOCKER_REGISTRY/postgres:9.6-v1 ; docker push $DOCKER_REGISTRY/postgres:9.6-v1
$ docker pull kubedb/postgres-tools:9.6-v1 ; docker tag kubedb/postgres-tools:9.6-v1 $DOCKER_REGISTRY/postgres-tools:9.6-v1 ; docker push $DOCKER_REGISTRY/postgres-tools:9.6-v1
$ docker pull kubedb/postgres_exporter:v0.4.6 ; docker tag kubedb/postgres_exporter:v0.4.6 $DOCKER_REGISTRY/postgres_exporter:v0.4.6 ; docker push $DOCKER_REGISTRY/postgres_exporter:v0.4.6

Create ImagePullSecret

ImagePullSecrets is a type of a Kubernetes Secret whose sole purpose is to pull private images from a Docker registry. It allows you to specify the url of the docker registry, credentials for logging in and the image name of your private docker image.

Run the following command, substituting the appropriate uppercase values to create an image pull secret for your private Docker registry:

$ kubectl create secret -n demo docker-registry myregistrykey \
  --docker-server=DOCKER_REGISTRY_SERVER \
  --docker-username=DOCKER_USER \
  --docker-email=DOCKER_EMAIL \

secret "myregistrykey" created.

If you wish to follow other ways to pull private images see official docs of kubernetes.

Note; If you are using kubectl 1.9.0, update to 1.9.1 or later to avoid this issue.

Install KubeDB operator

When installing KubeDB operator, set the flags --docker-registry and --image-pull-secret to appropriate value. Follow the steps to install KubeDB operator properly in cluster so that to points to the DOCKER_REGISTRY you wish to pull images from.

Create PostgresVersion CRD

KubeDB uses images specified in PostgresVersion crd for database, backup and exporting prometheus metrics. You have to create a PostgresVersion crd specifying images from your private registry. Then, you have to point this PostgresVersion crd in spec.version field of Postgres object. For more details about PostgresVersion crd, please visit here.

Here, is an example of PostgresVersion crd. Replace <YOUR_PRIVATE_REGISTRY> with your private registy.

kind: PostgresVersion
  name: "pvt-9.6"
    app: kubedb
  version: "9.6"
    image: "<YOUR_PRIVATE_REGISTRY>/postgres:9.6-v1"
    image: "<YOUR_PRIVATE_REGISTRY>/postgres_exporter:v0.4.6"
    image: "<YOUR_PRIVATE_REGISTRY>/postgres-tools:9.6-v1"

Now, create the PostgresVersion crd,

$ kubectl apply -f pvt-postgresversion.yaml created

Deploy PostgreSQL database from Private Registry

While deploying PostgreSQL from private repository, you have to add myregistrykey secret in Postgres spec.podTemplate.spec.imagePullSecrets and specify pvt-9.6 in spec.version field.

Below is the Postgres object we will create in this tutorial

kind: Postgres
  name: pvt-reg-postgres
  namespace: demo
  version: "pvt-9.6"
    storageClassName: "standard"
    - ReadWriteOnce
        storage: 50Mi
      - name: myregistrykey

Now run the command to create this Postgres object:

$ kubectl create -f created

To check if the images pulled successfully from the repository, see if the PostgreSQL is in Running state:

$ kubectl get pods -n demo --selector=""
NAME                 READY     STATUS    RESTARTS   AGE
pvt-reg-postgres-0   1/1       Running   0          3m


You can specify imagePullSecret for Snapshot objects in spec.podTemplate.spec.imagePullSecrets field of Snapshot object. If you are using scheduled backup, you can also provide imagePullSecret in backupSchedule.podTemplate.spec.imagePullSecrets field of Postgres crd. KubeDB also reuses imagePullSecret for Snapshot object from spec.podTemplate.spec.imagePullSecrets field of Postgres crd.

Cleaning up

To cleanup the Kubernetes resources created by this tutorial, run:

$ kubectl patch -n demo pg/pvt-reg-postgres -p '{"spec":{"terminationPolicy":"WipeOut"}}' --type="merge"
$ kubectl delete -n demo pg/pvt-reg-postgres

$ kubectl delete ns demo

If you would like to uninstall KubeDB operator, please follow the steps here.

Next Steps