Registry Tutorials
This page provides step-by-step tutorials for working with popular container registries. Select a registry below to get started.
IBM Cloud Container Registry
IBM Cloud Container Registry provides a multi-tenant, highly available, and scalable private image registry with integrated vulnerability scanning.
Prerequisites
- Docker or Podman installed and running
- IBM Cloud account (Sign up here)
- IBM Cloud CLI installed
Tutorial
1. Install the IBM Cloud CLI
2. Install the Container Registry plugin
3. Login to IBM Cloud
For federated accounts, use:
4. Set up a namespace
Create a namespace to organize your images:
Namespace Names
Namespace names must be unique across all IBM Cloud accounts in the same region. Choose a descriptive name like mycompany-dev.
Verify the namespace was created:
5. Login to the registry
6. Pull a base image
7. Tag for IBM Cloud Registry
Tag the image with your region and namespace:
Regional Endpoints
| Region | Endpoint |
|---|---|
| US South | us.icr.io |
| EU Central | de.icr.io |
| UK South | uk.icr.io |
| AP North | jp.icr.io |
| AP South | au.icr.io |
8. Push to IBM Cloud Registry
9. Verify your push
10. Scan for vulnerabilities
IBM Cloud Registry includes Vulnerability Advisor:
You can also view your images in the IBM Cloud Console.
1. Install the IBM Cloud CLI
2. Install the Container Registry plugin
3. Login to IBM Cloud
For federated accounts, use:
4. Set up a namespace
Create a namespace to organize your images:
Namespace Names
Namespace names must be unique across all IBM Cloud accounts in the same region. Choose a descriptive name like mycompany-dev.
Verify the namespace was created:
5. Login to the registry
6. Pull a base image
7. Tag for IBM Cloud Registry
Tag the image with your region and namespace:
Regional Endpoints
| Region | Endpoint |
|---|---|
| US South | us.icr.io |
| EU Central | de.icr.io |
| UK South | uk.icr.io |
| AP North | jp.icr.io |
| AP South | au.icr.io |
8. Push to IBM Cloud Registry
9. Verify your push
10. Scan for vulnerabilities
IBM Cloud Registry includes Vulnerability Advisor:
You can also view your images in the IBM Cloud Console.
IBM Cloud Registry Features
| Feature | Description |
|---|---|
| Vulnerability Advisor | Automatic security scanning with detailed reports |
| IAM Integration | Fine-grained access control with IBM Cloud IAM |
| Multi-Region | Deploy images across multiple regions |
| Retention Policies | Automatic cleanup of old images |
| Private Network | Access via IBM Cloud private network |
Resources
Red Hat Quay
Red Hat Quay is an enterprise container registry that provides security scanning, geo-replication, and detailed access controls. It's commonly used in OpenShift environments.
Prerequisites
- Docker or Podman installed and running
- A free Quay.io account (Sign up here)
Tutorial
1. Login to Quay.io
Enter your Quay.io username and password when prompted:
2. Pull a base image
Pull an image from Docker Hub to use as a starting point:
3. Create a simple container
Run a container and make a small modification:
Inside the container, create a file:
4. Commit the container to a new image
5. Tag for Quay.io
Tag the image with your Quay.io username and repository name:
Replace your_username
Replace your_username with your actual Quay.io username.
6. Push to Quay.io
7. Verify your push
Visit Quay.io Repositories to see your pushed image.
Repository Visibility
By default, new repositories on Quay.io are private. You can change visibility in the repository settings.
8. Clean up
1. Login to Quay.io
Enter your Quay.io username and password when prompted:
2. Pull a base image
Pull an image from Docker Hub to use as a starting point:
3. Create a simple container
Run a container and make a small modification:
Inside the container, create a file:
4. Commit the container to a new image
5. Tag for Quay.io
Tag the image with your Quay.io username and repository name:
Replace your_username
Replace your_username with your actual Quay.io username.
6. Push to Quay.io
7. Verify your push
Visit Quay.io Repositories to see your pushed image.
Repository Visibility
By default, new repositories on Quay.io are private. You can change visibility in the repository settings.
8. Clean up
Quay.io Features
Once your image is pushed, Quay.io automatically provides:
| Feature | Description |
|---|---|
| Security Scanning | Automatic vulnerability scanning of your images |
| Build Triggers | Automatically build images from Git repositories |
| Robot Accounts | Service accounts for CI/CD automation |
| Teams & Permissions | Fine-grained access control |
| Image Expiration | Automatic cleanup of old tags |
Resources
Docker Hub
Docker Hub is the default registry for Docker and contains millions of public images. It's the easiest way to get started with container registries.
Prerequisites
- Docker or Podman installed and running
- A free Docker Hub account (Sign up here)
Tutorial
1. Search for images
2. Pull an image
3. Login to Docker Hub
Enter your Docker Hub username and password when prompted.
4. Tag your image
5. Push to Docker Hub
6. Verify your push
Visit Docker Hub and navigate to your repositories to see your pushed image.
1. Search for images
2. Pull an image
3. Login to Docker Hub
Enter your Docker Hub username and password when prompted.
4. Tag your image
5. Push to Docker Hub
6. Verify your push
Visit Docker Hub and navigate to your repositories to see your pushed image.