https://github.com/goharbor/harbor/blob/master/docs/installation_guide.md
Harbor can be installed by one of three approaches:
Harbor可以通过以下三种方式之一进行安装:
Online installer: The installer downloads Harbor’s images from Docker hub. For this reason, the installer is very small in size.
在线安装:从Docker hub上下载Harbor镜像进行安装,因此,这个安装包会非常小
Offline installer: Use this installer when the host does not have an Internet connection. The installer contains pre-built images so its size is larger.
离线安装:当我们的主机无法联网时可以使用此安装包,安装包会预先构建镜像,因此会很大
All installers can be downloaded from the official release page.
所有的安装包都可以从官网下载到。
This guide describes the steps to install and configure Harbor by using the online or offline installer. The installation processes are almost the same.
这份指南说明了如何使用在线和离线方式安装和配置软件,安装过程几乎是相同的。
If you run a previous version of Harbor, you may need to update harbor.cfg and migrate the data to fit the new database schema. For more details, please refer to Harbor Migration Guide.
如果你运行的是历史版本的Harbor,你可以升级harbor.cfg和迁移数据用于适应新的数据结构。更多的细节,请参考Harbor迁移指南
In addition, the deployment instructions on Kubernetes has been created by the community. Refer to Harbor on Kubernetes for details.
此外,社区还创建了基于kubernetes的部署指南,更多细节可以访问 Harbor on Kubernetes
Harbor is deployed as several Docker containers, and, therefore, can be deployed on any Linux distribution that supports Docker. The target host requires Python, Docker, and Docker Compose to be installed.
部署Harbor需要多个docker容器,因此,可以部署在任何支持docker的linux发行版上面,目标主机需要安装Python和Docker Compose。
Resource | Capacity | Description |
---|---|---|
CPU | minimal 2 CPU | 4 CPU is preferred |
Mem | minimal | 4GB 8GB is preferred |
Disk | minimal 40GB | 160GB is preferred |
资源 | 容量 | 描述 |
---|---|---|
CPU | 最低 2 CPU | 推荐4 CPU |
内存 | 最低4GB | 推荐8GB |
磁盘 | 最低40GB | 推荐160GB |
Software | Version | Description |
---|---|---|
Python | version 2.7 or higher | Note that you may have to install Python on Linux distributions (Gentoo, Arch) that do not come with a Python interpreter installed by default |
Docker engine | version 1.10 or higher | For installation instructions, please refer to: https://docs.docker.com/engine/installation/ |
Docker Compose | version 1.6.0 or higher | For installation instructions, please refer to: https://docs.docker.com/compose/install/ |
Openssl | latest is preferred | Generate certificate and keys for Harbor |
软件 | 版本 | 描述 |
---|---|---|
Python | version 2.7 或者更高 | 注意,你可以需要在linux发行版(Gentoo, Arch)上面安装Python,默认情况下不用安装Python解释器 |
Docker engine | version 1.10 或者更高 | 安装说明,请参考: https://docs.docker.com/engine/installation/ |
Docker Compose | version 1.6.0 o或者更高r | 安装说明,请参考: https://docs.docker.com/compose/install/ |
Openssl | 推荐最新版 | 为Harbor生成证书和密钥 |
Port | Protocol | Description |
---|---|---|
443 | HTTPS | Harbor portal and core API will accept requests on this port for https protocol |
4443 | HTTPS | Connections to the Docker Content Trust service for Harbor, only needed when Notary is enabled |
80 | HTTP | Harbor portal and core API will accept requests on this port for http protocol |
端口 | 协议 | 描述 |
---|---|---|
443 | HTTPS | Harbor portal 和核心API将通过https协议进行请求 |
4443 | HTTPS | 为Harbor连接docker认证服务,只有在启用公正的时候才启用 |
80 | HTTP | Harbor portal 和核心API将通过http协议进行请求 |
harbor.cfg
; 配置 harbor.cfg
;install.sh
to install and start Harbor; 运行install.sh
进行安装和启动Harborharbor.cfg
;install.sh
进行安装和启动Harbor;The binary of the installer can be downloaded from the release page. Choose either online or offline installer. Use tar command to extract the package.
可以从发布页上下载二进制安装包。选择在线或者离线安装。使用 tar 命令解压安装包
Online installer: 在线安装
$ tar xvf harbor-online-installer-.tgz
Offline installer: 离线安装
$ tar xvf harbor-offline-installer-.tgz
Configuration parameters are located in the file harbor.cfg
.
配置参数位于harbor.cfg
文件中。
There are two categories of parameters in harbor.cfg
, required parameters and optional parameters.
这里有两种类型的参数在harbor.cfg
文件中,必要参数 和 可选参数
required parameters: These parameters are required to be set in the configuration file. They will take effect if a user updates them in harbor.cfg and run the install.sh script to reinstall Harbor.
必要参数:
optional parameters: These parameters are optional for updating, i.e. user can leave them as default and update them on Web Portal after Harbor is started. If they are set in harbor.cfg, they only take effect in the first launch of Harbor. Subsequent update to these parameters in harbor.cfg will be ignored.
Note: If you choose to set these parameters via the Portal, be sure to do so right after Harbor is started. In particular, you must set the desired auth_mode before registering or creating any new users in Harbor. When there are users in the system (besides the default admin user), auth_mode cannot be changed.
The parameters are described below - note that at the very least, you will need to change the hostname attribute.
Email settings: These parameters are needed for Harbor to be able to send a user a “password reset” email, and are only necessary if that functionality is needed. Also, do note that by default SSL connectivity is not enabled - if your SMTP server requires SSL, but does not support STARTTLS, then you should enable SSL by setting email_ssl = true. Setting email_insecure = true if the email server uses a self-signed or untrusted certificate. For a detailed description about “email_identity” please refer to rfc2595
harbor_admin_password: The administrator’s initial password. This password only takes effect for the first time Harbor launches. After that, this setting is ignored and the administrator’s password should be set in the Portal. Note that the default username/password are admin/Harbor12345 .
auth_mode: The type of authentication that is used. By default, it is db_auth, i.e. the credentials are stored in a database. For LDAP authentication, set this to ldap_auth.
IMPORTANT: When upgrading from an existing Harbor instance, you must make sure auth_mode is the same in harbor.cfg before launching the new version of Harbor. Otherwise, users may not be able to log in after the upgrade.
ldap_url: The LDAP endpoint URL (e.g. ldaps://ldap.mydomain.com). Only used when auth_mode is set to ldap_auth .
ldap_searchdn: The DN of a user who has the permission to search an LDAP/AD server (e.g. uid=admin,ou=people,dc=mydomain,dc=com).
ldap_search_pwd: The password of the user specified by ldap_searchdn.
ldap_basedn: The base DN to look up a user, e.g. ou=people,dc=mydomain,dc=com. Only used when auth_mode is set to ldap_auth .
ldap_filter: The search filter for looking up a user, e.g. (objectClass=person).
ldap_uid: The attribute used to match a user during a LDAP search, it could be uid, cn, email or other attributes.
ldap_scope: The scope to search for a user, 0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE. Default is 2.
ldap_timeout: Timeout (in seconds) when connecting to an LDAP Server. Default is 5.
ldap_verify_cert: Verify certificate from LDAP server. Default is true.
ldap_group_basedn: The base dn from which to lookup a group in LDAP/AD, e.g. ou=group,dc=mydomain,dc=com.
ldap_group_filter: The filter to search LDAP/AD group, e.g. objectclass=group.
ldap_group_gid: The attribute used to name a LDAP/AD group, it could be cn, name.
ldap_group_scope: The scope to search for ldap groups. 0-LDAP_SCOPE_BASE, 1-LDAP_SCOPE_ONELEVEL, 2-LDAP_SCOPE_SUBTREE. Default is 2.
self_registration: (on or off. Default is on) Enable / Disable the ability for a user to register himself/herself. When disabled, new users can only be created by the Admin user, only an admin user can create new users in Harbor. NOTE: When auth_mode is set to ldap_auth, self-registration feature is always disabled, and this flag is ignored.
token_expiration: The expiration time (in minutes) of a token created by token service, default is 30 minutes.
project_creation_restriction: The flag to control what users have permission to create projects. By default everyone can create a project, set to “adminonly” such that only admin can create project.
By default, Harbor stores images on your local filesystem. In a production environment, you may consider using other storage backend instead of the local filesystem, like S3, OpenStack Swift, Ceph, etc. These parameters are configurations for registry.
For example, if you use Openstack Swift as your storage backend, the parameters may look like this:
registry_storage_provider_name=swift
registry_storage_provider_config="username: admin, password: ADMIN_PASS, authurl: http://keystone_addr:35357/v3/auth, tenant: admin, domain: default, region: regionOne, container: docker_images"
NOTE: For detailed information on storage backend of a registry, refer to Registry Configuration Reference .
Once harbor.cfg and storage backend (optional) are configured, install and start Harbor using the install.sh script. Note that it may take some time for the online installer to download Harbor images from Docker hub.
Harbor has integrated with Notary and Clair (for vulnerability scanning). However, the default installation does not include Notary or Clair service.
$ sudo ./install.sh
If everything worked properly, you should be able to open a browser to visit the admin portal at http://reg.yourdomain.com (change reg.yourdomain.com to the hostname configured in your harbor.cfg). Note that the default administrator username/password are admin/Harbor12345 .
Log in to the admin portal and create a new project, e.g. myproject. You can then use docker commands to login and push images (By default, the registry server listens on port 80):
$ docker login reg.yourdomain.com
$ docker push reg.yourdomain.com/myproject/myrepo:mytag
IMPORTANT: The default installation of Harbor uses HTTP - as such, you will need to add the option --insecure-registry
to your client’s Docker daemon and restart the Docker service.
To install Harbor with Notary service, add a parameter when you run install.sh:
$ sudo ./install.sh --with-notary
Note: For installation with Notary the parameter ui_url_protocol must be set to “https”. For configuring HTTPS please refer to the following sections.
More information about Notary and Docker Content Trust, please refer to Docker’s documentation: https://docs.docker.com/engine/security/trust/content_trust/
To install Harbor with Clair service, add a parameter when you run install.sh:
$ sudo ./install.sh --with-clair
For more information about Clair, please refer to Clair’s documentation: https://coreos.com/clair/docs/2.0.1/
To install Harbor with chart repository service, add a parameter when you run install.sh
:
$ sudo ./install.sh --with-chartmuseum
Note: If you want to install Notary, Clair and chart repository service, you must specify all the parameters in the same command:
$ sudo ./install.sh --with-notary --with-clair --with-chartmuseum
For information on how to use Harbor, please refer to User Guide of Harbor .
Harbor does not ship with any certificates, and, by default, uses HTTP to serve requests. While this makes it relatively simple to set up and run - especially for a development or testing environment - it is not recommended for a production environment. To enable HTTPS, please refer to Configuring Harbor with HTTPS Access.
You can use docker-compose to manage the lifecycle of Harbor. Some useful commands are listed as follows (must run in the same directory as docker-compose.yml).
Stopping Harbor:
$ sudo docker-compose stop
Stopping nginx ... done
Stopping harbor-portal ... done
Stopping harbor-jobservice ... done
Stopping harbor-core ... done
Stopping registry ... done
Stopping redis ... done
Stopping registryctl ... done
Stopping harbor-db ... done
Stopping harbor-adminserver ... done
Stopping harbor-log ... done
Restarting Harbor after stopping:
$ sudo docker-compose start
Starting log ... done
Starting registry ... done
Starting registryctl ... done
Starting postgresql ... done
Starting adminserver ... done
Starting core ... done
Starting portal ... done
Starting redis ... done
Starting jobservice ... done
Starting proxy ... done
To change Harbor’s configuration, first stop existing Harbor instance and update harbor.cfg
. Then run prepare
script to populate the configuration. Finally re-create and start Harbor’s instance:
$ sudo docker-compose down -v
$ vim harbor.cfg
$ sudo prepare
$ sudo docker-compose up -d
Removing Harbor’s containers while keeping the image data and Harbor’s database files on the file system:
$ sudo docker-compose down -v
Removing Harbor’s database and image data (for a clean re-installation):
$ rm -r /data/database
$ rm -r /data/registry
Managing lifecycle of Harbor when it’s installed with Notary
When Harbor is installed with Notary, an extra template file docker-compose.notary.yml
is needed for docker-compose commands. The docker-compose commands to manage the lifecycle of Harbor are:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.notary.yml [ up|down|ps|stop|start ]
For example, if you want to change configuration in harbor.cfg
and re-deploy Harbor when it’s installed with Notary, the following commands should be used:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.notary.yml down -v
$ vim harbor.cfg
$ sudo prepare --with-notary
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.notary.yml up -d
Managing lifecycle of Harbor when it’s installed with Clair
When Harbor is installed with Clair, an extra template file docker-compose.clair.yml
is needed for docker-compose commands. The docker-compose commands to manage the lifecycle of Harbor are:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.clair.yml [ up|down|ps|stop|start ]
For example, if you want to change configuration in harbor.cfg
and re-deploy Harbor when it’s installed with Clair, the following commands should be used:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.clair.yml down -v
$ vim harbor.cfg
$ sudo prepare --with-clair
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.clair.yml up -d
Managing lifecycle of Harbor when it’s installed with chart repository service
When Harbor is installed with chart repository service, an extra template file docker-compose.chartmuseum.yml
is needed for docker-compose commands. The docker-compose commands to manage the lifecycle of Harbor are:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.chartmuseum.yml [ up|down|ps|stop|start ]
For example, if you want to change configuration in harbor.cfg and re-deploy Harbor when it’s installed with chart repository service, the following commands should be used:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.chartmuseum.yml down -v
$ vim harbor.cfg
$ sudo prepare --with-chartmuseum
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.chartmuseum.yml up -d
_Managing lifecycle of Harbor when it’s installed with Notary, Clair and chart repository service_
If you want to install Notary, Clair and chart repository service together, you should include all the components in the docker-compose and prepare commands:
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.notary.yml -f ./docker-compose.clair.yml -f ./docker-compose.chartmuseum.yml down -v
$ vim harbor.cfg
$ sudo prepare --with-notary --with-clair --with-chartmuseum
$ sudo docker-compose -f ./docker-compose.yml -f ./docker-compose.notary.yml -f ./docker-compose.clair.yml -f ./docker-compose.chartmuseum.yml up -d
Please check the Docker Compose command-line reference for more on docker-compose.
By default, registry data is persisted in the host’s /data/
directory. This data remains unchanged even when Harbor’s containers are removed and/or recreated.
In addition, Harbor uses rsyslog to collect the logs of each container. By default, these log files are stored in the directory /var/log/harbor/
on the target host for troubleshooting.
By default, Harbor listens on port 80(HTTP) and 443(HTTPS, if configured) for both admin portal and docker commands, you can configure it with a customized one.
For HTTP protocol
1.Modify docker-compose.yml
Replace the first “80” to a customized port, e.g. 8888:80.
proxy:
image: goharbor/nginx-photon:v1.6.0
container_name: nginx
restart: always
volumes:
- ./common/config/nginx:/etc/nginx:z
ports:
- 8888:80
- 443:443
depends_on:
- postgresql
- registry
- core
- portal
- log
logging:
driver: "syslog"
options:
syslog-address: "tcp://127.0.0.1:1514"
tag: "proxy"
2.Modify harbor.cfg, add the port to the parameter “hostname”
hostname = 192.168.0.2:8888
3.Re-deploy Harbor referring to previous section “Managing Harbor’s lifecycle”.
1.Enable HTTPS in Harbor by following this guide.
2.Modify docker-compose.yml
Replace the first “443” to a customized port, e.g. 8888:443.
proxy:
image: goharbor/nginx-photon:v1.6.0
container_name: nginx
restart: always
volumes:
- ./common/config/nginx:/etc/nginx:z
ports:
- 80:80
- 8888:443
depends_on:
- postgresql
- registry
- core
- portal
- log
logging:
driver: "syslog"
options:
syslog-address: "tcp://127.0.0.1:1514"
tag: "proxy"
3.Modify harbor.cfg, add the port to the parameter “hostname”
hostname = 192.168.0.2:8888
4.Re-deploy Harbor referring to previous section “Managing Harbor’s lifecycle”.
By default, Harbor limits the CPU usage of Clair container to 150000 and avoids its using up all the CPU resources. This is defined in the docker-compose.clair.yml file. You can modify it based on your hardware configuration.
$ sudo docker-compose ps
Name Command State Ports
-----------------------------------------------------------------------------------------------------------------------------
harbor-adminserver /harbor/start.sh Up
harbor-core /harbor/start.sh Up
harbor-db /entrypoint.sh postgres Up 5432/tcp
harbor-jobservice /harbor/start.sh Up
harbor-log /bin/sh -c /usr/local/bin/ ... Up 127.0.0.1:1514->10514/tcp
harbor-portal nginx -g daemon off; Up 80/tcp
nginx nginx -g daemon off; Up 0.0.0.0:443->443/tcp, 0.0.0.0:4443->4443/tcp, 0.0.0.0:80->80/tcp
redis docker-entrypoint.sh redis ... Up 6379/tcp
registry /entrypoint.sh /etc/regist ... Up 5000/tcp
registryctl /harbor/start.sh Up
If a container is not in UP state, check the log file of that container in directory /var/log/harbor
. For example, if the container harbor-core is not running, you should look at the log file core.log
.
proxy_set_header X-Forwarded-Proto $scheme;
and re-deploy Harbor refer to the previous section “Managing Harbor’s lifecycle”.