-
Notifications
You must be signed in to change notification settings - Fork 323
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[ECR] [request]: ECR to ECR pull-through cache #2208
Labels
Comments
This was referenced Nov 20, 2023
@rnene100 is there already some ETA for this one? |
This is under-consideration and we are working through understanding the scoping and effort for this. We aren't able to provide an ETA at this time. Thank you for your patience! |
Yes
…On Tue, Apr 30, 2024, 09:23 Josephine C. ***@***.***> wrote:
Does this issues fall in line with pulling a cache ECR image from one AWS
ECR registry account and caching it to a different AWS ECR registry
account? @wosiu <https://github.com/wosiu> @mwos-sl
<https://github.com/mwos-sl>
—
Reply to this email directly, view it on GitHub
<#2208 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABF4AJHDDCZE7ZQYPZPXNR3Y75BF5AVCNFSM6AAAAAA7TQL6FSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDAOBUGU3TKMBTGI>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
Community Note
Tell us about your request
ECR launched pull through cache for some docker registries including: ECR Public, Quay.io and recently dockerhub and few more which require authentication. Customers also want the same functionality for another private ECR:
Other people were already mentioning this need in some other ticket that was recently closed without addressing these:
#1584 (comment)
#1584 (comment)
Which service(s) is this request for?
ECR
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Ability to have a regional pull-through cache for docker images stored in an ECR in another aws region.
This is for:
Well, because we don't want to mirror all the docker images produced by our CI system to every region, but only the ones that are actually used. Only ~10% of images we build are eventually deployed on production environments.
Well, it would vastly complicate the deployment process, harder to deploy outside automations, harder to setup retention policies.
Pull-through cache is ideal approach for this. We can have shorter retention policies for images in regional pull-though cache ECRs. If image is kicked out, it can be refetched again if needed from the central region where longer retention policy is applied.
Are you currently working around this issue?
Some alternatives are competitors like GCR, or jFrog Artifactory with jFrog Edge (which doesn't integrate with AWS as nicely as ECR). Or deploy self-managed tools in EKS (like Harbor), which requires additional work to setup and maintenance. Or enable some extra Admission Control in EKS like k8s-image-swapper, but this doesn't currently work nice with signed images.
Additional context
There were many votes already for this feature in the past as a part of: #1584 (including mine), but this one was closed after pull-through cache for authenticated registries was added - which is a separate thing.
The text was updated successfully, but these errors were encountered: