-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[ECR]: Pull through cache for authenticated registries #1584
Comments
Would this also enable anonymous access, proxied through the customer's VPC, and some configuration for how frequently image tags (such as Maintaining our own ECR sync lambda system (driven supply-side rather than demand-side) has a tendency to counter-productively retrieve even more image versions than we actually need (e.g. skipped increments, alternate architectures). |
Working around - dockerhub
2.ii. would be solved if EKS/ECR supported setting something like {
"registry-mirrors": ["https://mirror.gcr.io"]
} ideally 1) without editing bootstrap data (just slap it in here maybe it does and I just haven't found the docs. |
Being able to configure our ECR to pull-through our private GitHub Container Registry (ghcr) would be super. |
One more use case we have is several deployments across different aws regions. We need a pull through cache in each each region for images produced by CI into one of the regions, for services like ECS and EKS. Why not ECR replication? Costs. We don't need all of the images in each region to be replicated, only used one. -> #2208 |
Excited to see "Work in Progress" label! |
Bumping question if there's maybe any ETA for pull through caching of private registries hosted on AWS? |
Now ACR has support for pull-through caches (Azure/acr#599), at least for Dockerhub (which still is a whole load more images than ECR pull-through supports). Given the rate things are going it's likely that ACR will build out its support for other registries way before ECR... |
I would like to be able to configure a pull through cache rule in my private ECR registry in one of my AWS accounts to pull images from a private ECR registry in another one of my AWS accounts. It would be nice if this allowed cross region pulling as well. My goal is to have a single registry where all my CI workflows push images to, lets call it I would like to configure a pull through cache rule for each of the accounts where the image is deployed like this:
|
Hard to believe this is not an existing capability. We use artifactory on the corporate build level but it would be great to mirror that docker registry with ECR running in account in which we have our Jenkins and EKS infra running. |
Just tried pull through repository for a private docker repository in GAR, and it worked smoothly. Surprised to see that it's not supported in ECR yet. |
Amazon Elastic Container Registry (ECR) now includes Docker Hub, Azure Container Registry, and GitHub Container Registry as supported upstream registries for ECR’s pull through cache feature. |
Are there plans to support other private registries such as Artifactory? I also noticed this in the doc:
That's our main use case so wondering if that will change in the future. |
I'm confused about this decision. Why couldn't it be a generic solution since the vast majority of Docker registries work in the same way and authenticate in the same way? We're on GitLab, so we can't take advantage of this. |
@rnene100 does the new functionality allows ECR pull-though cache for ECR in another region?
After reading the announcement it sounds like it is still not supported :( |
@wosiu ECR to ECR pull through cache is not part of this but something we are actively considering. I don't have a timeline on that. Thanks for checking. @Sodki Our goal is to continue to add support for additional upstream registries that authenticate in the same way (will add GitLab to the list). @nxf5025 AWS Lambda is looking at adding this support. I don't have timelines on that but I have reached out to the team. Thanks for checking |
Support for authenticated upstream with pull through cache has been launched. We will incrementally add more authenticated upstream registries. Resolving issue. |
@rnene100 I don't this this ticket should be marked as closed. Many people (including me) have been voting for this one because of ECR to ECR pull-through. Now we need to start from 0 when collecting votes, which means tens of months before it gets a critical mass and start being considered by AWS. |
Is there a different open issue for tracking that? I’m here for the ecr to ecr as well as ecr from self-hosted-gitlab-in-private-vpc features. But since the latter feels very far off - the ecr to ecr is really important for folks doing regional deployments on standard aws offerings. |
@mmerickel Please open a separate issue for ECR to ECR pull through cache so that it's easier to track. As mentioned earlier, we are actively considering that feature. Thank you! |
Opened: #2208 fyi @mmerickel |
@rnene100 Any update on Lambda support for this? |
And also on ECS support? ATM cache rules cannot be used directly there, because ECS requires the ECR repository to exist when running tasks, so manual docker pull command is required beforehand, so the repository is initialized first. |
@rnene100 , I'm seeing that Quay.io is not among the providers with support for auth, is it best to open a separate Github Issue for that? Along the lines of Sodki's comment, it's not clear why there isn't a generic provider for Docker-compatible registries supporting basic auth (that's basically what ACR and GCP Artifact Registry did). ACR allows you to override the hostname of registries, so you could coerce an unsupported registry to fit, and Artifact Registry just gives you a full |
Community Note
Tell us about your request
ECR launched pull through cache recently which reliably and anonymously retrieves public images from ECR Public and Quay.io, caches them in a customer's private ECR registry, and keeps the images in sync. Customers also want the same functionality for other private registries that require authentication, and registries need accounts to have higher pull limits
https://aws.amazon.com/blogs/aws/announcing-pull-through-cache-repositories-for-amazon-elastic-container-registry/
Which service(s) is this request for?
ECR
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
To cache images from private registries or images from public registries that require authentication for higher pull limits. Customers need to pass credentials through ECR pull through cache for ECR to access the images from private registries or to let ECR have access to higher pull limits.
Are you currently working around this issue?
Customers need to build tooling to log in to private registries, copy those images into ECR, and keep those images in sync with the upstream private registry, and maintain this entire system.
The text was updated successfully, but these errors were encountered: