# Configuration file of Harbor # The IP address or hostname to access admin UI and registry service. # DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients. hostname: {{ hostname }} # http related config {% if http is defined %} http: # port for http, default is 80. If https enabled, this port will redirect to https port port: {{ http.port }} {% else %} # http: # # port for http, default is 80. If https enabled, this port will redirect to https port # port: 80 {% endif %} {% if https is defined %} # https related config https: # https port for harbor, default is 443 port: {{ https.port }} # The path of cert and key files for nginx certificate: {{ https.certificate }} private_key: {{ https.private_key }} # enable strong ssl ciphers (default: false) {% if strong_ssl_ciphers is defined %} strong_ssl_ciphers: {{ strong_ssl_ciphers | lower }} {% else %} strong_ssl_ciphers: false {% endif %} {% else %} # https related config # https: # # https port for harbor, default is 443 # port: 443 # # The path of cert and key files for nginx # certificate: /your/certificate/path # private_key: /your/private/key/path # enable strong ssl ciphers (default: false) # strong_ssl_ciphers: false {% endif %} # # Harbor will set ipv4 enabled only by default if this block is not configured # # Otherwise, please uncomment this block to configure your own ip_family stacks {% if ip_family is defined %} ip_family: # ipv6Enabled set to true if ipv6 is enabled in docker network, currently it affected the nginx related component {% if ip_family.ipv6 is defined %} ipv6: enabled: {{ ip_family.ipv6.enabled | lower }} {% else %} ipv6: enabled: false {% endif %} # ipv4Enabled set to true by default, currently it affected the nginx related component {% if ip_family.ipv4 is defined %} ipv4: enabled: {{ ip_family.ipv4.enabled | lower }} {% else %} ipv4: enabled: true {% endif %} {% else %} # ip_family: # # ipv6Enabled set to true if ipv6 is enabled in docker network, currently it affected the nginx related component # ipv6: # enabled: false # # ipv4Enabled set to true by default, currently it affected the nginx related component # ipv4: # enabled: true {% endif %} {% if internal_tls is defined %} # Uncomment following will enable tls communication between all harbor components internal_tls: # set enabled to true means internal tls is enabled enabled: {{ internal_tls.enabled | lower }} {% if internal_tls.dir is defined %} # put your cert and key files on dir dir: {{ internal_tls.dir }} {% endif %} {% else %} # internal_tls: # # set enabled to true means internal tls is enabled # enabled: true # # put your cert and key files on dir # dir: /etc/harbor/tls/internal {% endif %} # Uncomment external_url if you want to enable external proxy # And when it enabled the hostname will no longer used {% if external_url is defined %} external_url: {{ external_url }} {% else %} # external_url: https://reg.mydomain.com:8433 {% endif %} # The initial password of Harbor admin # It only works in first time to install harbor # Remember Change the admin password from UI after launching Harbor. {% if harbor_admin_password is defined %} harbor_admin_password: {{ harbor_admin_password }} {% else %} harbor_admin_password: Harbor12345 {% endif %} # Harbor DB configuration database: {% if database is defined %} # The password for the root user of Harbor DB. Change this before any production use. password: {{ database.password}} # The maximum number of connections in the idle connection pool. If it <=0, no idle connections are retained. max_idle_conns: {{ database.max_idle_conns }} # The maximum number of open connections to the database. If it <= 0, then there is no limit on the number of open connections. # Note: the default number of connections is 1024 for postgres of harbor. max_open_conns: {{ database.max_open_conns }} # The maximum amount of time a connection may be reused. Expired connections may be closed lazily before reuse. If it <= 0, connections are not closed due to a connection's age. # The value is a duration string. A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". {% if database.conn_max_lifetime is defined %} conn_max_lifetime: {{ database.conn_max_lifetime }} {% else %} conn_max_lifetime: 5m {% endif %} # The maximum amount of time a connection may be idle. Expired connections may be closed lazily before reuse. If it <= 0, connections are not closed due to a connection's idle time. # The value is a duration string. A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". {% if database.conn_max_idle_time is defined %} conn_max_idle_time: {{ database.conn_max_idle_time }} {% else %} conn_max_idle_time: 0 {% endif %} {% else %} # The password for the root user of Harbor DB. Change this before any production use. password: root123 # The maximum number of connections in the idle connection pool. If it <=0, no idle connections are retained. max_idle_conns: 100 # The maximum number of open connections to the database. If it <= 0, then there is no limit on the number of open connections. # Note: the default number of connections is 1024 for postgres of harbor. max_open_conns: 900 # The maximum amount of time a connection may be reused. Expired connections may be closed lazily before reuse. If it <= 0, connections are not closed due to a connection's age. # The value is a duration string. A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". conn_max_lifetime: 5m # The maximum amount of time a connection may be idle. Expired connections may be closed lazily before reuse. If it <= 0, connections are not closed due to a connection's idle time. # The value is a duration string. A duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m". Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h". conn_max_idle_time: 0 {% endif %} {% if data_volume is defined %} # The default data volume data_volume: {{ data_volume }} {% else %} # The default data volume data_volume: /data {% endif %} # Harbor Storage settings by default is using /data dir on local filesystem # Uncomment storage_service setting If you want to using external storage {% if storage_service is defined %} storage_service: {% for key, value in storage_service.items() %} {% if key == 'ca_bundle' %} # # ca_bundle is the path to the custom root ca certificate, which will be injected into the truststore # # of registry's and chart repository's containers. This is usually needed when the user hosts a internal storage with self signed certificate. ca_bundle: {{ value if value is not none else '' }} {% elif key == 'redirect' %} # # set disable to true when you want to disable registry redirect redirect: {% if storage_service.redirect.disabled is defined %} disable: {{ storage_service.redirect.disabled | lower}} {% else %} disable: {{ storage_service.redirect.disable | lower}} {% endif %} {% else %} # # storage backend, default is filesystem, options include filesystem, azure, gcs, s3, swift and oss # # for more info about this configuration please refer https://distribution.github.io/distribution/about/configuration/ # # and https://distribution.github.io/distribution/storage-drivers/ {{ key }}: {% for k, v in value.items() %} {{ k }}: {{ v if v is not none else '' }} {% endfor %} {% endif %} {% endfor %} {% else %} # storage_service: # # ca_bundle is the path to the custom root ca certificate, which will be injected into the truststore # # of registry's and chart repository's containers. This is usually needed when the user hosts a internal storage with self signed certificate. # ca_bundle: # # storage backend, default is filesystem, options include filesystem, azure, gcs, s3, swift and oss # # for more info about this configuration please refer https://distribution.github.io/distribution/about/configuration/ # # and https://distribution.github.io/distribution/storage-drivers/ # filesystem: # maxthreads: 100 # # set disable to true when you want to disable registry redirect # redirect: # disable: false {% endif %} # Trivy configuration # # Trivy DB contains vulnerability information from NVD, Red Hat, and many other upstream vulnerability databases. # It is downloaded by Trivy from the GitHub release page https://github.com/aquasecurity/trivy-db/releases and cached # in the local file system. In addition, the database contains the update timestamp so Trivy can detect whether it # should download a newer version from the Internet or use the cached one. Currently, the database is updated every # 12 hours and published as a new release to GitHub. {% if trivy is defined %} trivy: # ignoreUnfixed The flag to display only fixed vulnerabilities {% if trivy.ignore_unfixed is defined %} ignore_unfixed: {{ trivy.ignore_unfixed | lower }} {% else %} ignore_unfixed: false {% endif %} # skipUpdate The flag to enable or disable Trivy DB downloads from GitHub # # You might want to enable this flag in test or CI/CD environments to avoid GitHub rate limiting issues. # If the flag is enabled you have to download the `trivy-offline.tar.gz` archive manually, extract `trivy.db` and # `metadata.json` files and mount them in the `/home/scanner/.cache/trivy/db` path. {% if trivy.skip_update is defined %} skip_update: {{ trivy.skip_update | lower }} {% else %} skip_update: false {% endif %} {% if trivy.skip_java_db_update is defined %} # skipJavaDBUpdate If the flag is enabled you have to manually download the `trivy-java.db` file and mount it in the # `/home/scanner/.cache/trivy/java-db/trivy-java.db` path skip_java_db_update: {{ trivy.skip_java_db_update | lower }} {% else %} skip_java_db_update: false {% endif %} # {% if trivy.offline_scan is defined %} offline_scan: {{ trivy.offline_scan | lower }} {% else %} offline_scan: false {% endif %} # # Comma-separated list of what security issues to detect. Possible values are `vuln`, `config` and `secret`. Defaults to `vuln`. {% if trivy.security_check is defined %} security_check: {{ trivy.security_check }} {% else %} security_check: vuln {% endif %} # # insecure The flag to skip verifying registry certificate {% if trivy.insecure is defined %} insecure: {{ trivy.insecure | lower }} {% else %} insecure: false {% endif %} # {% if trivy.timeout is defined %} # timeout The duration to wait for scan completion. # There is upper bound of 30 minutes defined in scan job. So if this `timeout` is larger than 30m0s, it will also timeout at 30m0s. timeout: {{ trivy.timeout}} {% else %} timeout: 5m0s {% endif %} # # github_token The GitHub access token to download Trivy DB # # Anonymous downloads from GitHub are subject to the limit of 60 requests per hour. Normally such rate limit is enough # for production operations. If, for any reason, it's not enough, you could increase the rate limit to 5000 # requests per hour by specifying the GitHub access token. For more details on GitHub rate limiting please consult # https://developer.github.com/v3/#rate-limiting # # You can create a GitHub token by following the instructions in # https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line # {% if trivy.github_token is defined %} github_token: {{ trivy.github_token }} {% else %} # github_token: xxx {% endif %} {% else %} # trivy: # # ignoreUnfixed The flag to display only fixed vulnerabilities # ignore_unfixed: false # # skipUpdate The flag to enable or disable Trivy DB downloads from GitHub # # # # You might want to enable this flag in test or CI/CD environments to avoid GitHub rate limiting issues. # # If the flag is enabled you have to download the `trivy-offline.tar.gz` archive manually, extract `trivy.db` and # # `metadata.json` files and mount them in the `/home/scanner/.cache/trivy/db` path. # skip_update: false # # # # skipJavaDBUpdate If the flag is enabled you have to manually download the `trivy-java.db` file and mount it in the # # `/home/scanner/.cache/trivy/java-db/trivy-java.db` path # skip_java_db_update: false # # # #The offline_scan option prevents Trivy from sending API requests to identify dependencies. # # Scanning JAR files and pom.xml may require Internet access for better detection, but this option tries to avoid it. # # For example, the offline mode will not try to resolve transitive dependencies in pom.xml when the dependency doesn't # # exist in the local repositories. It means a number of detected vulnerabilities might be fewer in offline mode. # # It would work if all the dependencies are in local. # # This option doesn’t affect DB download. You need to specify "skip-update" as well as "offline-scan" in an air-gapped environment. # offline_scan: false # # # # insecure The flag to skip verifying registry certificate # insecure: false # # github_token The GitHub access token to download Trivy DB # # # # Anonymous downloads from GitHub are subject to the limit of 60 requests per hour. Normally such rate limit is enough # # for production operations. If, for any reason, it's not enough, you could increase the rate limit to 5000 # # requests per hour by specifying the GitHub access token. For more details on GitHub rate limiting please consult # # https://developer.github.com/v3/#rate-limiting # # # # timeout The duration to wait for scan completion. # # There is upper bound of 30 minutes defined in scan job. So if this `timeout` is larger than 30m0s, it will also timeout at 30m0s. # timeout: 5m0s # # # # You can create a GitHub token by following the instructions in # # https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line # # # # github_token: xxx {% endif %} jobservice: # Maximum number of job workers in job service {% if jobservice is defined %} max_job_workers: {{ jobservice.max_job_workers }} # The jobLoggers backend name, only support "STD_OUTPUT", "FILE" and/or "DB" {% if jobservice.job_loggers is defined %} job_loggers: {% for job_logger in jobservice.job_loggers %} - {{job_logger}} {% endfor %} {% else %} job_loggers: - STD_OUTPUT - FILE # - DB {% endif %} # The jobLogger sweeper duration (ignored if `jobLogger` is `stdout`) {% if jobservice.logger_sweeper_duration is defined %} logger_sweeper_duration: {{ jobservice.logger_sweeper_duration }} {% else %} logger_sweeper_duration: 1 {% endif %} {% else %} max_job_workers: 10 # The jobLoggers backend name, only support "STD_OUTPUT", "FILE" and/or "DB" job_loggers: - STD_OUTPUT - FILE # - DB # The jobLogger sweeper duration (ignored if `jobLogger` is `stdout`) logger_sweeper_duration: 1 {% endif %} notification: # Maximum retry count for webhook job {% if notification is defined %} webhook_job_max_retry: {{ notification.webhook_job_max_retry}} # HTTP client timeout for webhook job {% if notification.webhook_job_http_client_timeout is defined %} webhook_job_http_client_timeout: {{ notification.webhook_job_http_client_timeout }} {% else %} webhook_job_http_client_timeout: 3 #seconds {% endif %} {% else %} webhook_job_max_retry: 3 # HTTP client timeout for webhook job webhook_job_http_client_timeout: 3 #seconds {% endif %} # Log configurations log: # options are debug, info, warning, error, fatal {% if log is defined %} level: {{ log.level }} # configs for logs in local storage local: # Log files are rotated log_rotate_count times before being removed. If count is 0, old versions are removed rather than rotated. rotate_count: {{ log.local.rotate_count }} # Log files are rotated only if they grow bigger than log_rotate_size bytes. If size is followed by k, the size is assumed to be in kilobytes. # If the M is used, the size is in megabytes, and if G is used, the size is in gigabytes. So size 100, size 100k, size 100M and size 100G # are all valid. rotate_size: {{ log.local.rotate_size }} # The directory on your host that store log location: {{ log.local.location }} {% if log.external_endpoint is defined %} external_endpoint: # protocol used to transmit log to external endpoint, options is tcp or udp protocol: {{ log.external_endpoint.protocol }} # The host of external endpoint host: {{ log.external_endpoint.host }} # Port of external endpoint port: {{ log.external_endpoint.port }} {% else %} # Uncomment following lines to enable external syslog endpoint. # external_endpoint: # # protocol used to transmit log to external endpoint, options is tcp or udp # protocol: tcp # # The host of external endpoint # host: localhost # # Port of external endpoint # port: 5140 {% endif %} {% else %} level: info # configs for logs in local storage local: # Log files are rotated log_rotate_count times before being removed. If count is 0, old versions are removed rather than rotated. rotate_count: 50 # Log files are rotated only if they grow bigger than log_rotate_size bytes. If size is followed by k, the size is assumed to be in kilobytes. # If the M is used, the size is in megabytes, and if G is used, the size is in gigabytes. So size 100, size 100k, size 100M and size 100G # are all valid. rotate_size: 200M # The directory on your host that store log location: /var/log/harbor # Uncomment following lines to enable external syslog endpoint. # external_endpoint: # # protocol used to transmit log to external endpoint, options is tcp or udp # protocol: tcp # # The host of external endpoint # host: localhost # # Port of external endpoint # port: 5140 {% endif %} #This attribute is for migrator to detect the version of the .cfg file, DO NOT MODIFY! _version: 2.11.0 {% if external_database is defined %} # Uncomment external_database if using external database. external_database: harbor: host: {{ external_database.harbor.host }} port: {{ external_database.harbor.port }} db_name: {{ external_database.harbor.db_name }} username: {{ external_database.harbor.username }} password: {{ external_database.harbor.password }} ssl_mode: {{ external_database.harbor.ssl_mode }} max_idle_conns: {{ external_database.harbor.max_idle_conns}} max_open_conns: {{ external_database.harbor.max_open_conns}} {% else %} # Uncomment external_database if using external database. # external_database: # harbor: # host: harbor_db_host # port: harbor_db_port # db_name: harbor_db_name # username: harbor_db_username # password: harbor_db_password # ssl_mode: disable # max_idle_conns: 2 # max_open_conns: 0 {% endif %} {% if redis is defined %} redis: # # db_index 0 is for core, it's unchangeable {% if redis.registry_db_index is defined %} registry_db_index: {{ redis.registry_db_index }} {% else %} # # registry_db_index: 1 {% endif %} {% if redis.jobservice_db_index is defined %} jobservice_db_index: {{ redis.jobservice_db_index }} {% else %} # # jobservice_db_index: 2 {% endif %} {% if redis.trivy_db_index is defined %} trivy_db_index: {{ redis.trivy_db_index }} {% else %} # # trivy_db_index: 5 {% endif %} {% if redis.harbor_db_index is defined %} harbor_db_index: {{ redis.harbor_db_index }} {% else %} # # it's optional, the db for harbor business misc, by default is 0, uncomment it if you want to change it. # # harbor_db_index: 6 {% endif %} {% if redis.cache_layer_db_index is defined %} cache_layer_db_index: {{ redis.cache_layer_db_index }} {% else %} # # it's optional, the db for harbor cache layer, by default is 0, uncomment it if you want to change it. # # cache_layer_db_index: 7 {% endif %} {% else %} # Uncomment redis if need to customize redis db # redis: # # db_index 0 is for core, it's unchangeable # # registry_db_index: 1 # # jobservice_db_index: 2 # # trivy_db_index: 5 # # it's optional, the db for harbor business misc, by default is 0, uncomment it if you want to change it. # # harbor_db_index: 6 # # it's optional, the db for harbor cache layer, by default is 0, uncomment it if you want to change it. # # cache_layer_db_index: 7 {% endif %} {% if external_redis is defined %} external_redis: # support redis, redis+sentinel # host for redis: : # host for redis+sentinel: # :,:,: host: {{ external_redis.host }} password: {{ external_redis.password }} # Redis AUTH command was extended in Redis 6, it is possible to use it in the two-arguments AUTH form. {% if external_redis.username is defined %} username: {{ external_redis.username }} {% else %} # username: {% endif %} # sentinel_master_set must be set to support redis+sentinel #sentinel_master_set: # db_index 0 is for core, it's unchangeable registry_db_index: {{ external_redis.registry_db_index }} jobservice_db_index: {{ external_redis.jobservice_db_index }} trivy_db_index: 5 idle_timeout_seconds: 30 {% if external_redis.harbor_db_index is defined %} harbor_db_index: {{ redis.harbor_db_index }} {% else %} # # it's optional, the db for harbor business misc, by default is 0, uncomment it if you want to change it. # # harbor_db_index: 6 {% endif %} {% if external_redis.cache_layer_db_index is defined %} cache_layer_db_index: {{ redis.cache_layer_db_index }} {% else %} # # it's optional, the db for harbor cache layer, by default is 0, uncomment it if you want to change it. # # cache_layer_db_index: 7 {% endif %} {% else %} # Uncomments external_redis if using external Redis server # external_redis: # # support redis, redis+sentinel # # host for redis: : # # host for redis+sentinel: # # :,:,: # host: redis:6379 # password: # # Redis AUTH command was extended in Redis 6, it is possible to use it in the two-arguments AUTH form. # # username: # # sentinel_master_set must be set to support redis+sentinel # #sentinel_master_set: # # db_index 0 is for core, it's unchangeable # registry_db_index: 1 # jobservice_db_index: 2 # trivy_db_index: 5 # idle_timeout_seconds: 30 # # it's optional, the db for harbor business misc, by default is 0, uncomment it if you want to change it. # # harbor_db_index: 6 # # it's optional, the db for harbor cache layer, by default is 0, uncomment it if you want to change it. # # cache_layer_db_index: 7 {% endif %} {% if uaa is defined %} # Uncomment uaa for trusting the certificate of uaa instance that is hosted via self-signed cert. uaa: ca_file: {{ uaa.ca_file }} {% else %} # Uncomment uaa for trusting the certificate of uaa instance that is hosted via self-signed cert. # uaa: # ca_file: /path/to/ca {% endif %} # Global proxy # Config http proxy for components, e.g. http://my.proxy.com:3128 # Components doesn't need to connect to each others via http proxy. # Remove component from `components` array if want disable proxy # for it. If you want use proxy for replication, MUST enable proxy # for core and jobservice, and set `http_proxy` and `https_proxy`. # Add domain to the `no_proxy` field, when you want disable proxy # for some special registry. {% if proxy is defined %} proxy: http_proxy: {{ proxy.http_proxy or ''}} https_proxy: {{ proxy.https_proxy or ''}} no_proxy: {{ proxy.no_proxy or ''}} {% if proxy.components is defined %} components: {% for component in proxy.components %} {% if component != 'clair' %} - {{component}} {% endif %} {% endfor %} {% endif %} {% else %} proxy: http_proxy: https_proxy: no_proxy: components: - core - jobservice - trivy {% endif %} {% if metric is defined %} metric: enabled: {{ metric.enabled }} port: {{ metric.port }} path: {{ metric.path }} {% else %} # metric: # enabled: false # port: 9090 # path: /metrics {% endif %} # Trace related config # only can enable one trace provider(jaeger or otel) at the same time, # and when using jaeger as provider, can only enable it with agent mode or collector mode. # if using jaeger collector mode, uncomment endpoint and uncomment username, password if needed # if using jaeger agetn mode uncomment agent_host and agent_port {% if trace is defined %} trace: enabled: {{ trace.enabled | lower}} sample_rate: {{ trace.sample_rate }} # # namespace used to differentiate different harbor services {% if trace.namespace is defined %} namespace: {{ trace.namespace }} {% else %} # namespace: {% endif %} # # attributes is a key value dict contains user defined attributes used to initialize trace provider {% if trace.attributes is defined%} attributes: {% for name, value in trace.attributes.items() %} {{name}}: {{value}} {% endfor %} {% else %} # attributes: # application: harbor {% endif %} {% if trace.jaeger is defined%} jaeger: endpoint: {{trace.jaeger.endpoint or '' }} username: {{trace.jaeger.username or ''}} password: {{trace.jaeger.password or ''}} agent_host: {{trace.jaeger.agent_host or ''}} agent_port: {{trace.jaeger.agent_port or ''}} {% else %} # jaeger: # endpoint: # username: # password: # agent_host: # agent_port: {% endif %} {% if trace. otel is defined %} otel: endpoint: {{trace.otel.endpoint or '' }} url_path: {{trace.otel.url_path or '' }} compression: {{trace.otel.compression | lower }} insecure: {{trace.otel.insecure | lower }} timeout: {{trace.otel.timeout or '' }} {% else %} # otel: # endpoint: hostname:4318 # url_path: /v1/traces # compression: false # insecure: true # # timeout is in seconds # timeout: 10 {% endif%} {% else %} # trace: # enabled: true # # set sample_rate to 1 if you wanna sampling 100% of trace data; set 0.5 if you wanna sampling 50% of trace data, and so forth # sample_rate: 1 # # # namespace used to differentiate different harbor services # # namespace: # # # attributes is a key value dict contains user defined attributes used to initialize trace provider # # attributes: # # application: harbor # # jaeger: # # endpoint: http://hostname:14268/api/traces # # username: # # password: # # agent_host: hostname # # agent_port: 6831 # # otel: # # endpoint: hostname:4318 # # url_path: /v1/traces # # compression: false # # insecure: true # # # timeout is in seconds # # timeout: 10 {% endif %} # enable purge _upload directories {% if upload_purging is defined %} upload_purging: enabled: {{ upload_purging.enabled | lower}} age: {{ upload_purging.age }} interval: {{ upload_purging.interval }} dryrun: {{ upload_purging.dryrun | lower}} {% else %} upload_purging: enabled: true # remove files in _upload directories which exist for a period of time, default is one week. age: 168h # the interval of the purge operations interval: 24h dryrun: false {% endif %} # Cache layer related config {% if cache is defined %} cache: enabled: {{ cache.enabled | lower}} expire_hours: {{ cache.expire_hours }} {% else %} cache: enabled: false expire_hours: 24 {% endif %} # Harbor core configurations # Uncomment to enable the following harbor core related configuration items. {% if core is defined %} core: # The provider for updating project quota(usage), there are 2 options, redis or db, # by default is implemented by db but you can switch the updation via redis which # can improve the performance of high concurrent pushing to the same project, # and reduce the database connections spike and occupies. # By redis will bring up some delay for quota usage updation for display, so only # suggest switch provider to redis if you were ran into the db connections spike aroud # the scenario of high concurrent pushing to same project, no improvment for other scenes. quota_update_provider: {{ core.quota_update_provider }} {% else %} # core: # # The provider for updating project quota(usage), there are 2 options, redis or db, # # by default is implemented by db but you can switch the updation via redis which # # can improve the performance of high concurrent pushing to the same project, # # and reduce the database connections spike and occupies. # # By redis will bring up some delay for quota usage updation for display, so only # # suggest switch provider to redis if you were ran into the db connections spike around # # the scenario of high concurrent pushing to same project, no improvement for other scenes. # quota_update_provider: redis # Or db {% endif %}