
The backend type is configurable by setting .backend to s3 and gcs respectively.Ī connection configuration through the .config key must also be provided. A bucket for storing backups ( )Īnd a temporary bucket for preserving existing data during the restore process ( ).Ĭurrently AWS S3-compatible object storage systems and Google Cloud Storage are supported backends
Follow connection details documentation for creating the secret.īackups are also stored in object storage, and need to be configured to pointĮxternally rather than the included MinIO service. Note, the same secret can be used for all of them.Įxamples for AWS (any S3 compatible like Azure using MinIO) and Google providers can be found in See the charts/globals documentation on appConfig for full details.Ĭreate the secret(s) per the connection details documentation, and then configure the chart to use the provided secrets. So,įor the object storage settings for dependencyProxy to take effect, The dependency proxy feature is not enabled by default. So,įor the object storage settings for externalDiffs to take effect, Storing MR diffs on external storage is not enabled by default. Currently a different bucket is needed for each, otherwise performing a restore from backup will not properly function. LFS, Artifacts, Uploads, Packages, External Diffs, Pseudonymizer, Terraform State, Dependency ProxyĬonfiguration of object storage for LFS, artifacts, uploads, packages, externalĭiffs, and pseudonymizer is done via the , Follow registry chart documentation on storage for creating the secret.
Edit with the correct values for the environment. Copy appropriate file to registry-storage.yaml. Decide on which storage service to use.
The secret is used in the registry server, andĬreate the secret per registry chart documentation on storage, then configure the chart to make use of this secret.Įxamples for S3(S3 compatible storages, but Azure MinIO gateway not supported, see Azure Blob Storage), Azure and GCS drivers can be found in Note: The bucket name needs to be set both in the secret, and in.