In this page:
Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
The IBM Entitled Registry (cp.icr.io/cp
) contains the software images for of the IBM DPOD Cloud Agent instanceapplication. To allow the IBM DPOD Cloud Agent Operator to automatically pull those software images, you must first obtain your entitlement key, then add create a pull secret with your entitlement key in a pull secret.Finally , and use the pull secret within the IBM DPOC DPOD Cloud Agent CR.
Obtaining your
...
Entitlement Key
Go Navigate to the Container software library.
Click Copy to copy the key.
Copy Keep the entitlement key to in a safe place, so you can use it when you to add the pull secret in the next section.
(Optional) Verify the validity of the key by logging in to the IBM Entitled Registry by using a container tool.executing the following command:
Code Block docker login cp.icr.io --username cp --password entitlement<YOUR_ENTITLEMENT_keyKEY>
Creating the Pull Secret
If you want to create your own Entitlement Key as a Secret, you must create it You must be a namespace administrator to perform this task.
Create a pull secret in the same namespace as the IBM DPOD Cloud Agent instance .(CR):
We recommend that you use the name
ibm-entitlement-key
.Use
cp
as the username.Use your Entitlement Key entitlement key as the password.
Use
cp.icr.io
as the Docker registry server
...
address.
Creating the Pull Secret using the CLI
You must be a namespace administrator to perform this task.
Create a docker registry secret named ibm-entitlement-key
, using The pull secret can be created with the following command . In the third line, replace entitlement_key with the value of your entitlement key from the previous section. In the last line, replace target_namespace with the name of your target namespace:in OCP. Replace <YOUR_ENTITLEMENT_KEY>
with your entitlement key and <TARGET_NAMESPACE>
with the DPOD Cloud Agent instance namespace.
Code Block |
---|
oc create secret docker-registry \ ibm-entitlement-key \ --docker-username=cp \ --docker-password=<entitlement-key><YOUR_ENTITLEMENT_KEY> \ --docker-server=cp.icr.io \ --namespace=target<TARGET_namespaceNAMESPACE> |
For more information on creating Secrets secrets using the Kubernetes command line, please see their the k8s documentation.
Adding the pull secret to a namespace by using the OpenShift web console
...
Creating the Pull Secret using the OpenShift Web Console
Log in to the OpenShift web console and select the Administrator perspective (if not selected by default).
In the left navigation, click Workloads > Secrets.
Ensure that the Project is set to the namespace where you intend to install instances.
Click Create and select Image pull secret.
Set the following parameters for the secret:
Parameter | Value |
---|---|
Secret name |
|
Authentication type | Image registry credentials |
Registry server address |
|
Username |
|
Password | Value of the Your entitlement key you copied when you got your entitlement key. |
(Optional value) |
Click Create to create the secret.
Using the Pull Secret within the DPOD Cloud Agent CR
Each image of the DPOD Cloud Agent can be configured with a pull secret with the imagePullSecrets
property.
See Cloud Agent Operand Installation for more details.