This document describes how to pull container images in the TCR Enterprise Edition instance in Elastic Kubernetes Service (EKS ) and to create workloads.
Before using a private image hosted in TCR Enterprise Edition to deploy applications in TKE, complete the following operations:
A new TCR Enterprise Edition instance does not have a default namespace, and a namespace cannot be automatically created through the pushed image. Therefore, create a namespace as required. For more information, see Managing namespaces.
We recommend that the namespace be named based on the project or team name. In this document, docker
is used as an example. The following page appears after the namespace is created.
Container images are hosted in specific image repositories. Create an image repository as required. For more information, see Creating an image repository. Set the image repository name to the name of the container image to be deployed. In this document, getting-started
is used as an example. The following page appears after the image repository is created.
Note:Use
docker cli
or another image tool, such as jenkins, to push the image to the TCR Enterprise Edition instance. If no image repository exists, an image repository will be automatically created. You do not need to create one in advance.
docker cli
or another image building tool, such as jenkins, to push an image to a specific image repository. Here, the docker cli
is used to push images. In this step, you need to use a CVM or CPM with Docker installed and ensure that the target client is in the public or private network access allowlist defined in Network Access Control Overview.demo-tcr
, docker
, and getting-started
with the actual instance, namespace, and image repository names that you created.docker tag getting-started:latest demo-tcr.tencentcloudcr.com/docker/getting-started:latest
docker push demo-tcr.tencentcloudcr.com/docker/getting-started:latest
For your data security, TCR and EKS initially deny all public and private accesses by default. Please configure the network access policies before deploying the images of TCR to EKS.
TCR Enterprise Edition instances support network access control. You can select public network or private network access for an EKS cluster to access a specific instance and pull the container image based on the network configuration of the EKS cluster. If the EKS cluster and TCR instance are deployed in the same region, we recommend that the EKS cluster pull the container image through the private network to accelerate pulling and reduce public network traffic costs.
This document will describe how to access through private network. If you need to access through public network, please see Accessing Internet through NAT Gateway for more information.
For the data security, the new TCR instance denies all external access by default. To allow the specified EKS cluster to access the TCR instance to pull the image, you need to associate the VPC where the cluster is located to the TCR instance, and configure the corresponding private network domain resolutions.
Before pulling container images from TCR instances, you need log in to the instance with credential information. For more information, see Obtaining an Instance Access Credential. Keep the long-term access credential of this instance for later configuration and deployment of TCR images.
latest
will be used by default.
Was this page helpful?