Adding weightings to order topics

This commit is contained in:
Stuart Clements 2020-02-11 16:24:43 +01:00
parent 75bbf9d0bf
commit 81de40e6b1
59 changed files with 60 additions and 0 deletions

View File

@ -1,5 +1,6 @@
---
title: Harbor Administration
weight: 10
---
This section describes how to configure and maintain Harbor after deployment. These operations are performed by the Harbor system administrator. The Harbor system administrator performs global configuration operations that apply to the whole Harbor instance.

View File

@ -1,5 +1,6 @@
---
title: Configuring Authentication
weight: 5
---
Harbor supports different modes for authenticating users and managing user accounts. You should select an authentication mode as soon as you deploy Harbor.

View File

@ -1,5 +1,6 @@
---
title: Configure Database Authentication
weight: 15
---
In database authentication mode, user accounts are stored in the local database. By default, only the Harbor system administrator can create user accounts to add users to Harbor. You can optionally configure Harbor to allow self-registration.

View File

@ -1,5 +1,6 @@
---
title: Configure LDAP/Active Directory Authentication
weight: 20
---
If you select LDAP/AD authentication, users whose credentials are stored in an external LDAP or AD server can log in to Harbor directly. In this case, you do not create user accounts in Harbor.

View File

@ -1,5 +1,6 @@
---
title: Configure OIDC Provider Authentication
weight: 25
---
If you select OpenID Connect (OIDC) authentication, users log in to the Harbor interface via an OIDC single sign-on (SSO) provider, such as Okta, KeyCloak, or dex. In this case, you do not create user accounts in Harbor.

View File

@ -1,5 +1,6 @@
---
title: Configure Project Quotas
weight: 20
---
To exercise control over resource use, as a Harbor system administrator you can set quotas on projects. You can limit the number of tags that a project can contain and limit the amount of storage capacity that a project can consume. You can set default quotas that apply to all projects globally.

View File

@ -1,5 +1,6 @@
---
title: Configuring Replication
weight: 15
---
Replication allows users to replicate resources, namely images and charts, between Harbor and non-Harbor registries, in both pull or push mode.

View File

@ -1,5 +1,6 @@
---
title: Creating Replication Endpoints
weight: 20
---
To replicate image repositories from one instance of Harbor to another Harbor or non-Harbor registry, you first create replication endpoints.

View File

@ -1,5 +1,6 @@
---
title: Creating a Replication Rule
weight: 25
---
A replication endpoint must exist before you create a replication rule. To create an endpoint, follow the instructions in [Creating Replication Endpoints](create-replication-endpoints.md).

View File

@ -1,5 +1,6 @@
---
title: Running Replication Manually
weight: 30
---
1. Log in to the Harbor interface with an account that has Harbor system administrator privileges.

View File

@ -1,5 +1,6 @@
---
title: Garbage Collection
weight: 25
---
When you delete images from Harbor, space is not automatically freed up. You must run garbage collection to free up space by removing blobs that are no longer referenced by a manifest from the file system.

View File

@ -1,5 +1,6 @@
---
title: Configure Global Settings
weight: 15
---
You can configure Harbor to connect to an email server, set the registry in read-only mode, and configure Harbor so that only system administrators can create projects.

View File

@ -1,3 +1,4 @@
---
title: Managing Users
weight: 10
---

View File

@ -1,5 +1,6 @@
---
title: Create User Accounts in Database Mode
weight: 25
---
In database authentication mode, the Harbor system administrator creates user accounts manually.

View File

@ -1,5 +1,6 @@
---
title: Harbor Role Based Access Control (RBAC)
weight: 15
---
Harbor manages images through projects. You provide access to these images to users by including the users in projects and assigning one of the following roles to them.

View File

@ -1,5 +1,6 @@
---
title: User Permissions By Role
weight: 20
---
Users have different abilities depending on the role they in a project.

View File

@ -1,3 +1,4 @@
---
title: Upgrade
weight: 30
---

View File

@ -1,5 +1,6 @@
---
title: Upgrading Harbor Deployed with Helm
weight: 40
---
This guide is used to upgrade Harbor deployed by chart since version 0.3.0.

View File

@ -1,5 +1,6 @@
---
title: Roll Back from an Upgrade
weight: 45
---
If, for any reason, you need to roll back to the previous version of Harbor, perform the following steps.

View File

@ -1,5 +1,6 @@
---
title: Upgrade Harbor and Migrate Data
weight: 35
---
This guide covers upgrade and migration to version 1.10.0. This guide only covers migration from v1.8.x and later to the current version. If you are upgrading from an earlier version, refer to the migration guide in the `release-1.8.0` branch to upgrade to v1.8.x first, then follow this guide to perform the migration to this version.

View File

@ -1,5 +1,6 @@
---
title: Test Harbor Upgrade
weight: 50
---
## Prepare data

View File

@ -1,5 +1,6 @@
---
title: Vulnerability Scanning
weight: 20
---
Harbor provides static analysis of vulnerabilities in images through the open source [Clair](https://github.com/coreos/clair) project.

View File

@ -1,5 +1,6 @@
---
title: Configure System-Wide CVE Whitelists
weight: 50
---
When you run vulnerability scans, images that are subject to Common Vulnerabilities and Exposures (CVE) are identified. According to the severity of the CVE and your security settings, these images might not be permitted to run. As a Harbor system administrator, you can create whitelists of CVEs to ignore during vulnerability scanning.

View File

@ -1,5 +1,6 @@
---
title: Import Vulnerability Data to an Offline Harbor instance
weight: 45
---
If Harbor is installed in an environment without an internet connection, Clair cannot fetch data from the public vulnerability database. In this case, the Harbor administrator must update the Clair database manually.

View File

@ -1,5 +1,6 @@
---
title: Connect Harbor to Additional Vulnerability Scanners
weight: 25
---
To connect Harbor to additional vulnerability scanners, you must install and configure an instance of the additional scanner according to the scanner vendor's requirements. The scanner must expose an API endpoint to allow Harbor to trigger the scan process or get reports. You can deploy multiple different scanners, and multiple instances of the same type of scanner.

View File

@ -1,5 +1,6 @@
---
title: Scan All Images
weight: 35
---
In addition to scanning individual images in projects, you can run global scans on all of the images in a Harbor instance, across all projects.

View File

@ -1,5 +1,6 @@
---
title: Scan Individual Images
weight: 30
---
1. Log in to the Harbor interface with an account that has at least project administrator privileges.

View File

@ -1,5 +1,6 @@
---
title: Schedule Scans
weight: 40
---
You can set policies to control when vulnerability scanning should run.

View File

@ -1,3 +1,4 @@
---
title: Building, Customizing, and Contributing to Harbor
weight: 20
---

View File

@ -1,5 +1,6 @@
---
title: Harbor Installation and Configuration
weight: 5
---
This section describes how to perform a new installation of Harbor.

View File

@ -1,5 +1,6 @@
---
title: Configure HTTPS Access to Harbor
weight: 30
---
By default, Harbor does not ship with certificates. It is possible to deploy Harbor without security, so that you can connect to it over HTTP. However, using HTTP is acceptable only in air-gapped test or development environments that do not have a connection to the external internet. Using HTTP in environments that are not air-gapped exposes you to man-in-the-middle attacks. In production environments, always use HTTPS. If you enable Content Trust with Notary to properly sign all images, you must use HTTPS.

View File

@ -1,5 +1,6 @@
---
title: Configure Harbor User Settings at the Command Line
weight: 65
---
From release 1.8.0 onwards, user settings are configured separately from the system settings. You do not configure user settings in the `harbor.yml` file, but rather in the Harbor interface or via HTTP requests.

View File

@ -1,5 +1,6 @@
---
title: Configure the Harbor YML File
weight: 35
---
You set system level parameters for Harbor in the `harbor.yml` file that is contained in the installer package. These parameters take effect when you run the `install.sh` script to install or reconfigure Harbor.

View File

@ -1,5 +1,6 @@
---
title: Customize the Harbor Token Service
weight: 60
---
By default, Harbor uses its own private key and certificate to authenticate with Docker clients. This topic describes how to optionally customize your configuration to use your own key and certificate.

View File

@ -1,5 +1,6 @@
---
title: Test Harbor with the Demo Server
weight: 10
---
The Harbor team has made available a demo Harbor instance that you can use to experiment with Harbor and test its functionalities.

View File

@ -1,5 +1,6 @@
---
title: Download the Harbor Installer
weight: 25
---
You download the Harbor installers from the [official releases](https://github.com/goharbor/harbor/releases) page. Download either the online installer or the offline installer.

View File

@ -1,5 +1,6 @@
---
title: Harbor Compatibility List
weight: 15
---
This document provides compatibility information for all Harbor components.

View File

@ -1,5 +1,6 @@
---
title: Deploying Harbor with High Availability via Helm
weight: 40
---
## Goal

View File

@ -1,5 +1,6 @@
---
title: Harbor Installation Prerequisites
weight: 20
---
Harbor is deployed as several Docker containers. You can therefore deploy it on any Linux distribution that supports Docker. The target host requires Docker, and Docker Compose to be installed.

View File

@ -1,5 +1,6 @@
---
title: Deploy Harbor with the Quick Installation Script
weight: 45
---
The Harbor community has provided a script that with a single command prepares an Ubuntu 18.04 machine for Harbor and deploys the latest stable version.

View File

@ -1,5 +1,6 @@
---
title: Reconfigure Harbor and Manage the Harbor Lifecycle
weight: 55
---
You use `docker-compose` to manage the lifecycle of Harbor. This topic provides some useful commands. You must run the commands in the directory in which `docker-compose.yml` is located.

View File

@ -1,5 +1,7 @@
---
title: Run the Installer Script
weight: 35
---
Once you have configured `harbor.yml` and optionally set up a storage backend, you install and start Harbor by using the `install.sh` script. Note that it might take some time for the online installer to download all of the Harbor images from Docker hub.

View File

@ -1,5 +1,6 @@
---
title: Troubleshooting Harbor Installation
weight: 50
---
The following sections help you to solve problems when installing Harbor.

View File

@ -1,5 +1,6 @@
---
title: Working with Projects
weight: 15
---
This section describes how users with the developer, master, and project administrator roles manage and participate in Harbor projects. The Harbor administrator can also perform all of these tasks.

View File

@ -1,5 +1,6 @@
---
title: Access and Search Project Logs
weight: 35
---
Harbor keeps a log of all of the operations that users perform in a project. You can apply filters to help you to search the logs.

View File

@ -1,5 +1,6 @@
---
title: Assign Users to a Project
weight: 25
---
You can add individual users to an existing project and assign a role to them. You can add an LDAP/AD or OIDC user to the project members if you use LDAP/AD or OIDC authentication, or a user that you have already created if you use database authentication. If you use LDAP/AD or OIDC authentication, you can add groups to projects and assign a role to the group.

View File

@ -1,5 +1,6 @@
---
title: Configure a Per-Project CVE Whitelist
weight: 50
---
When you run vulnerability scans, images that are subject to Common Vulnerabilities and Exposures (CVE) are identified. According to the severity of the CVE and your security settings, these images might not be permitted to run. You can create whitelists of CVEs to ignore during vulnerability scanning.

View File

@ -1,5 +1,6 @@
---
title: Configure Webhook Notifications
weight: 45
---
If you are a project administrator, you can configure a connection from a project in Harbor to a webhook endpoint. If you configure webhooks, Harbor notifies the webhook endpoint of certain events that occur in the project. Webhooks allow you to integrate Harbor with other tools to streamline continuous integration and development processes.

View File

@ -1,5 +1,6 @@
---
title: Managing Labels
weight: 70
---
Harbor provides two kinds of labels to isolate different kinds of resources:

View File

@ -1,5 +1,6 @@
---
title: Create Projects
weight: 20
---
A project in Harbor contains all repositories of an application. Images cannot be pushed to Harbor before a project is created. Role-Based Access Control (RBAC) is applied to projects, so that only users with the appropriate roles can perform certain operations.

View File

@ -1,5 +1,6 @@
---
title: Create Robot Accounts
weight: 40
---
You can create robot accounts to run automated operations. Robot accounts have the following limitations:

View File

@ -1,5 +1,6 @@
---
title: Tag Immutability Rules
weight: 85
---
By default, users can repeatedly push an image with the same tag to repositories in Harbor. This causes the previous image to effectively be overwritten with each push, in that the tag now points to a different image and the image that previously used the tag now becomes tagless. This is due to the Docker implementation, that does not enforce the mapping between an image tag and the image digest. This can be undesirable in certain cases, because the tag can no longer be trusted to identify the image version. The sha256 digest remains reliable and always points to the same build, but it is not rendered in a human-readable format.

View File

@ -1,5 +1,6 @@
---
title: Create Tag Retention Rules
weight: 80
---
A repository can rapidly accumulate a large number of image tags, many of which might not be required after a given time or once they have been superseded by a subsequent image build. These excess tags can obviously consume large quantities of storage capacity. As a Harbor system administrator, you can define rules that govern how many tags of a given repository to retain, or for how long to retain certain tags.

View File

@ -1,5 +1,6 @@
---
title: Implementing Content Trust
weight: 55
---
{{< note >}}

View File

@ -1,5 +1,6 @@
---
title: Managing Helm Charts
weight: 95
---
[Helm](https://helm.sh) is a package manager for [Kubernetes](https://kubernetes.io). Helm uses a packaging format called [charts](https://docs.helm.sh/developing_charts). Since version 1.6.0 Harbor is now a composite cloud-native registry which supports both container image management and Helm charts management. Access to Helm charts in Harbor is controlled by [role-based access controls (RBAC)](https://en.wikipedia.org/wiki/Role-based_access_control) and is restricted by projects.

View File

@ -1,5 +1,6 @@
---
title: Project Configuration
weight: 30
---
After the initial creation of a project, you can configure or reconfigure its properties in the **Configuration** tab for that project.

View File

@ -1,5 +1,6 @@
---
title: Pulling and Pushing Images in the Docker Client
weight: 65
---
Harbor optionally supports HTTP connections, however the Docker client always attempts to connect to registries by first using HTTPS. If Harbor is configured for HTTP, you must configure your Docker client so that it can connect to insecure registries. In your Docker client is not configured for insecure registries, you will see the following error when you attempt to pull or push images to Harbor:

View File

@ -1,5 +1,6 @@
---
title: Retagging Images
weight: 75
---
You can retag images in Harbor. Users with sufficient privileges can retag images to different repositories and projects. For example, you can retag images as follows:

View File

@ -1,5 +1,6 @@
---
title: Working with Images and Tags
weight: 60
---
This section describes how to work with images and tags in Harbor.