In virtual-machine Docker push to private registry failed under proxy - docker

I want to push a Docker image to a private registry in the local machine.
The docker is running in a virtual-machine CentOS 7 and I'm working a in a network under a proxy.
What I did is to tag my Docker local image "test_bench_image" obtained from building a dockerfile:
docker tag test_bench_image localhost:5000/test_bench_image
and then I tried to push it:
docker push localhost:5000/test_bench_image
What I get is:
The push refers to a repository [localhost:5000/test_bench_image]
Put http://localhost:5000/v1/repositories/test_bench_image/: dial tcp 127.0.0.1:5000: getsockopt: connection refused
I understood that /etc/sysconfig/docker should include the variable no_proxy to allow pushing to private Docker registry under a proxy. So I included in the file:
...
http_proxy="http://myproxy.es:80"
https_proxy="http://myproxy.es:80"
no_proxy="127.0.0.1:5000"
But I get the same error message after reload the daemon and restart the docker service.
Any help will be really welcome.
Note: My original plan was to use the Docker local image in Jenkins. But the Docker plugin cannot pull the local image since it is not publicly available. So I tried to create a private registry and force Jenkins to pull it from there.
Thanks.

I ran into a similar issue and I had to additionally uncomment and add my private registry's host IP in the section INSECURE_REGISTRY='XX.XXX.XXX.XXX:5000' in /etc/sysconfig/docker file.

Related

how to create a Docker local private repository

I created a local docker repository in my server. When I try to push the image into it, there is an error. I need an HTTPS connection. How do I get an HTTPS for my own docker registry?
os: ubuntu 16.x
Docker version: 18.06.1-ce, build e68fc7a
Already Tried:
Adding the below lines into /etc/docker/daemon.json,
{
"insecure-registries" : ["myregistrydomain.com:5000"]
}
Expected: I should be able to push and pull images into my own server containing docker registry
To avoid exposing your registry to the wider internet while still being able to pull images from it you can:
Run a local registry on your dev machine, to which you push images
ssh to your server with a reverse tunnel:
ssh -R 5000:localhost:5000 myhost
(listen on port 5000 of the remote machine (-R 5000) and tunnel back to localhost:5000 on the local machine)
Now, on myhost you can docker pull localhost:5000/someImage, but it's actually seamlessly connecting through an encrypted tunnel back to the registry on your dev machine.
You can have a local unsecured registry.
For that, you need to add an exception in your /etc/docker/daemon.json, this way
{
"insecure-registries" : ["myregistrydomain.com:5000"]
}
The same link shows how to use a self-signed certificate.
Eventually, using an actual certificate is juste a step further, but you may not need one for development purpose.
EDIT :
You need to restart your daemon after that :
service docker restart

Unable to login to private docker registry from Jenkins

I am trying to use Jenkins to build and push docker images to private registry. However, while trying docker login command, I am getting this error:
http: server gave HTTP response to HTTPS client
I know that this might be happening because the private registry is not added as an insecure registry. But, how I can resolve this in CI pipeline?
Jenkins is set up on a Kubernetes cluster and I am trying to automate the deployment of an application on the cluster.
This has nothing to do with the Jenkins CI pipeline or Kubernetes. Jenkins will not be able to push your images until configure follow either of the below steps
You have two options here
1) Configure your docker client to use the secure registry over HTTPS. This will include setting up self signed certificates or getting certificates from your local certificate authority.
2) Second solution is to use your registry over an unencrypted HTTP connection.
So if you are running docker on kubernetes. You will have to configure the daemon.json file in /etc/docker/daemon.json.
PS: This file might not exist. You will have to create it.
Then add in the below content. Make sure you change the url to match your docker registry
{
"insecure-registries" : ["myregistrydomain.com:5000"]
}
Then restart docker using systemctl restart docker or etc/init.d/docker restart depending on the version of linux distro installed on your cluster
Let me know if you have any questions

pushing docker image to registery of docker on a different host machine

I have two computers both have docker, I want to keep my docker image I made to the other host the does not connect to internet but is on local LAN.
so this is my machine (I use hello-world image example)
macHost:~ ciasto$ docker tag hello-world 192.168.0.6:5000/hello-world
then I try docker push 192.168.0.6:5000/hello-world
but this throws error:
The push refers to a repository [192.168.0.6:5000/hello-world]
Get https://192.168.0.6:5000/v2/: dial tcp 192.168.0.6:5000: getsockopt: connection refused
so I tried without 5000 port.
$ docker push 192.168.0.6/hello-world-2
that too throw same error:
The push refers to a repository [192.168.0.6/hello-world-2]
Get https://192.168.0.6/v2/: dial tcp 192.168.0.6:443: getsockopt: connection refused
what am I doing wrong ?
The Docker Registry is a specific piece of software; you can't directly docker push an image to another system.
The best workflow is almost certainly to write a Dockerfile that describes how to build your image. This is a simple text file, not totally unlike a shell script, that you'd typically add to your source code repository. Then on the other system you could check out the repository and run docker build and get a functionally equivalent image.
If you have a semi-isolated network you can always run your own registry. Say you set up your local DNS such that the host name my-registry.local resolves to 192.168.0.123; then you can docker tag your local images as my-registry.local/me/imagename, docker push them from one system, and docker pull them from the other.
The lowest-maintenance, least-reproducible, highest-long-term-effort path is to docker save the image on the first system, scp or otherwise transfer it to the second system, and then docker load it there. If you're motivated, you can even do it with one step
docker save me/imagename | ssh elsewhere docker load
You're forced to do this if the "elsewhere" system is actually disconnected from the network and the "copy it to the other system" step involves copying the image file on to removable media. If you're doing this at all regularly, though, or have more than one target system, you'll probably find setting up a local registry to be a good investment.

Which docker client and daemon is used by openshift origin to pull images when creating new-app?

When executing oc new-app openshift/deployment-example, which docker client and daemon origin uses to pull the image?
It is the docker daemon and client that is installed on that host. (Master and node)
We can setup specific properties in /etc/sysconfig/docker file if we want to modify the default registry.( ADD_REGISTRY..etc)

Docker: Issue with pulling from a private registry from another server

I just started learning docker.
I have a private registry running on one server(server1), and can pull a test image from it on server1 by typing the following:
docker pull 127.0.0.1:5000/test
However, when I type the above command from another server, I get the error message below:
Error: Invalid Registry endpoint: Get http://127.0.0.1:5000/v1/_ping: dial tcp 127.0.0.1:5000: connection refused
Am I missing something in configuration?
Any help is appreciated.
Thanks!
The IP 127.0.0.1 refers always to the local machine. So when you call 'docker pull 127.0.0.1:5000/test' from another machine, you must use the real IP of the server, not 127.0.0.1.
Maybe try to ping the Server first by calling http://XXXXXXX:5000/v1/_ping from the other machine to make sure it is available and you use the correct IP.
Docker 1.3 added '--insecure-registry' parameter which allows you to pull from a remote private registry. Refer this: Setting up a remote private Docker registry

Resources