You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
Using private Docker registry
KubeDB operator supports using private Docker registry. This tutorial will show you how to run KubeDB managed Elasticsearch database using private Docker images.
Before You Begin
At first, you need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using kind.
To keep things isolated, this tutorial uses a separate namespace called demo
throughout this tutorial.
$ kubectl create ns demo
namespace/demo created
$ kubectl get ns demo
NAME STATUS AGE
demo Active 5s
Note: YAML files used in this tutorial are stored in docs/examples/elasticsearch folder in GitHub repository kubedb/docs.
Prepare Private Docker Registry
You will also need a docker private registry or private repository. In this tutorial we will use private repository of docker hub.
You have to push the required images from KubeDB’s Docker hub account into your private registry.
For Elasticsearch, push the following images to your private registry.
$ export DOCKER_REGISTRY=<your-registry>
$ docker pull kubedb/operator:v2022.12.24-rc.1 ; docker tag kubedb/operator:v2022.12.24-rc.1 $DOCKER_REGISTRY/operator:v2022.12.24-rc.1 ; docker push $DOCKER_REGISTRY/operator:v2022.12.24-rc.1
$ docker pull kubedb/elasticsearch:7.3.2 ; docker tag kubedb/elasticsearch:7.3.2 $DOCKER_REGISTRY/elasticsearch:7.3.2 ; docker push $DOCKER_REGISTRY/elasticsearch:7.3.2
$ docker pull kubedb/elasticsearch-tools:7.3.2 ; docker tag kubedb/elasticsearch-tools:7.3.2 $DOCKER_REGISTRY/elasticsearch-tools:7.3.2 ; docker push $DOCKER_REGISTRY/elasticsearch-tools:7.3.2
$ docker pull kubedb/elasticsearch_exporter:1.0.2 ; docker tag kubedb/elasticsearch_exporter:1.0.2 $DOCKER_REGISTRY/elasticsearch_exporter:1.0.2 ; docker push $DOCKER_REGISTRY/elasticsearch_exporter:1.0.2
$ docker pull kubedb/yq:2.4.0 ; docker tag kubedb/yq:2.4.0 $DOCKER_REGISTRY/yq:2.4.0 ; docker push $DOCKER_REGISTRY/yq:2.4.0
Create ImagePullSecret
ImagePullSecrets is a type of a Kubernetes Secret whose sole purpose is to pull private images from a Docker registry. It allows you to specify the url of the docker registry, credentials for logging in and the image name of your private docker image.
Run the following command, substituting the appropriate uppercase values to create an image pull secret for your private Docker registry:
$ kubectl create secret docker-registry myregistrykey \
--docker-server=DOCKER_REGISTRY_SERVER \
--docker-username=DOCKER_USER \
--docker-email=DOCKER_EMAIL \
--docker-password=DOCKER_PASSWORD
secret "myregistrykey" created.
If you wish to follow other ways to pull private images see official docs of Kubernetes.
Note; If you are using
kubectl
1.9.0, update to 1.9.1 or later to avoid this issue.
Create ElasticsearchVersion CRD
KubeDB uses images specified in ElasticsearchVersion crd for database, backup and exporting prometheus metrics. You have to create an ElasticsearchVersion crd specifying images from your private registry. Then, you have to point this ElasticsearchVersion crd in spec.version
field of Elasticsearch object. For more details about ElasticsearchVersion crd, please visit here.
Here, is an example of ElasticsearchVersion crd. Replace <YOUR_PRIVATE_REGISTRY>
with your private registry.
apiVersion: catalog.kubedb.com/v1alpha1
kind: ElasticsearchVersion
metadata:
name: searchguard-7.9.3
spec:
authPlugin: SearchGuard
db:
image: PRIVATE_REGISTRY/elasticsearch:7.9.3-searchguard
distribution: SearchGuard
exporter:
image: PRIVATE_REGISTRY/elasticsearch_exporter:1.1.0
initContainer:
image: PRIVATE_REGISTRY/toybox:0.8.4
yqImage: PRIVATE_REGISTRY/elasticsearch-init:7.9.3-searchguard
podSecurityPolicies:
databasePolicyName: elasticsearch-db
stash:
addon:
backupTask:
name: elasticsearch-backup-7.3.2
params:
- name: args
value: --match=^(?![.])(?!searchguard).+
restoreTask:
name: elasticsearch-restore-7.3.2
version: 7.9.3
Now, create the ElasticsearchVersion crd,
$ kubectl apply -f pvt-elasticsearchversion.yaml
elasticsearchversion.kubedb.com/pvt-7.3.2 created
Install KubeDB operator
When installing KubeDB operator, set the flags --docker-registry
and --image-pull-secret
to appropriate value. Follow the guide for customizing installer to see how to pass those flags from here.
Deploy Elasticsearch database from Private Registry
While deploying Elasticsearch from private repository, you have to add myregistrykey
secret in Elasticsearch spec.podTemplate.spec.imagePullSecrets
.
Below is the YAML for Elasticsearch crd that will be created in this tutorial.
apiVersion: kubedb.com/v1alpha2
kind: Elasticsearch
metadata:
name: pvt-reg-elasticsearch
namespace: demo
spec:
version: "searchguard-7.9.3"
storage:
storageClassName: "standard"
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
podTemplate:
spec:
imagePullSecrets:
- name: myregistrykey
Now run the command to deploy this Elasticsearch object:
$ kubectl create -f https://github.com/kubedb/docs/raw/v2022.12.24-rc.1/docs/examples/elasticsearch/private-registry/private-registry.yaml
elasticsearch.kubedb.com/pvt-reg-elasticsearch created
To check if the images pulled successfully from the repository, see if the Elasticsearch is in running state:
$ kubectl get es -n demo pvt-reg-elasticsearch -o wide
NAME VERSION STATUS AGE
pvt-reg-elasticsearch pvt-7.3.2 Running 33m
Snapshot
You can specify imagePullSecret
for Snapshot objects in spec.podTemplate.spec.imagePullSecrets
field of Snapshot object. If you are using scheduled backup, you can also provide imagePullSecret
in backupSchedule.podTemplate.spec.imagePullSecrets
field of Elasticsearch crd. KubeDB also reuses imagePullSecret
for Snapshot object from spec.podTemplate.spec.imagePullSecrets
field of Elasticsearch crd.
Cleaning up
To cleanup the Kubernetes resources created by this tutorial, run:
kubectl patch -n demo es/pvt-reg-elasticsearch -p '{"spec":{"terminationPolicy":"WipeOut"}}' --type="merge"
kubectl delete -n demo es/pvt-reg-elasticsearch
kubectl delete ns demo
Next Steps
- Learn about backup & restore of Elasticsearch database using Stash.
- Learn how to configure Elasticsearch Topology Cluster.
- Monitor your Elasticsearch database with KubeDB using
out-of-the-box
builtin-Prometheus. - Monitor your Elasticsearch database with KubeDB using
out-of-the-box
Prometheus operator. - Detail concepts of Elasticsearch object.
- Want to hack on KubeDB? Check our contribution guidelines.