Summary
Let’s review what we have covered in this chapter. First, we discussed several benefits and the use cases of Harbor while explaining the Why behind using it. We looked at the different security-related benefits of Harbor, including image scanning, robust RBAC capabilities, and the ability to restrict public repository access requirements using image replications. For the operational control aspect, we discussed the benefits, such as on-premises and air-gapped deployment, a popular open source project under CNCF, comprehensive multi-tenancy, and administrative configurations. For the extensibility aspect, we saw how Harbor can be used with its replication feature of extending image library contents. Harbor’s pluggable model for vulnerability scanners and authentication providers was also discussed in this category.
After that, we covered details of Harbor’s architecture and learned about the different components that make up Harbor in detail. Following...