Jump To Close Expand all Collapse all Table of contents Configure Red Hat Quay 1. Getting started with Red Hat Quay configuration 2. Red Hat Quay configuration disclaimer Expand section "2. Red Hat Quay configuration disclaimer" Collapse section "2. Red Hat Quay configuration disclaimer" 2.1. Configuration updates for Red Hat Quay 3.9 Expand section "2.1. Configuration updates for Red Hat Quay 3.9" Collapse section "2.1. Configuration updates for Red Hat Quay 3.9" 2.1.1. Action log audit configuration 2.1.2. Addition of Splunk action logs Expand section "2.1.2. Addition of Splunk action logs" Collapse section "2.1.2. Addition of Splunk action logs" 2.1.2.1. LOGS_MODEL_CONFIG additions 2.1.2.2. Example configuration for Splunk 2.1.3. Quota management configuration fields Expand section "2.1.3. Quota management configuration fields" Collapse section "2.1.3. Quota management configuration fields" 2.1.3.1. Possible quota management configuration settings 2.1.3.2. Suggested quota management configuration settings 2.1.4. PostgreSQL PVC backup environment variable Expand section "2.1.4. PostgreSQL PVC backup environment variable" Collapse section "2.1.4. PostgreSQL PVC backup environment variable" 2.1.4.1. Example configuration for PostgreSQL PVC backup 2.2. Editing the configuration file 2.3. Location of configuration file in a standalone deployment 2.4. Minimal configuration Expand section "2.4. Minimal configuration" Collapse section "2.4. Minimal configuration" 2.4.1. Sample minimal configuration file 2.4.2. Local storage 2.4.3. Cloud storage 3. Configuration fields Expand section "3. Configuration fields" Collapse section "3. Configuration fields" 3.1. Required configuration fields 3.2. Automation options 3.3. Optional configuration fields 3.4. General required fields 3.5. Database configuration Expand section "3.5. Database configuration" Collapse section "3.5. Database configuration" 3.5.1. Database URI 3.5.2. Database connection arguments Expand section "3.5.2. Database connection arguments" Collapse section "3.5.2. Database connection arguments" 3.5.2.1. PostgreSQL SSL/TLS connection arguments 3.5.2.2. MySQL SSL/TLS connection arguments 3.6. Image storage Expand section "3.6. Image storage" Collapse section "3.6. Image storage" 3.6.1. Image storage features 3.6.2. Image storage configuration fields 3.6.3. Local storage 3.6.4. OCS/NooBaa 3.6.5. Ceph / RadosGW Storage / Hitachi HCP 3.6.6. AWS S3 storage 3.6.7. Google Cloud Storage 3.6.8. Azure Storage 3.6.9. Swift storage 3.6.10. Nutanix object storage 3.7. Redis configuration fields Expand section "3.7. Redis configuration fields" Collapse section "3.7. Redis configuration fields" 3.7.1. Build logs 3.7.2. User events 3.7.3. Example Redis configuration 3.8. ModelCache configuration options Expand section "3.8. ModelCache configuration options" Collapse section "3.8. ModelCache configuration options" 3.8.1. Memcache configuration option 3.8.2. Single Redis configuration option 3.8.3. Clustered Redis configuration option 3.9. Tag expiration configuration fields Expand section "3.9. Tag expiration configuration fields" Collapse section "3.9. Tag expiration configuration fields" 3.9.1. Example tag expiration configuration 3.10. Quota management configuration fields Expand section "3.10. Quota management configuration fields" Collapse section "3.10. Quota management configuration fields" 3.10.1. Example quota management configuration 3.11. Proxy cache configuration fields 3.12. Pre-configuring Red Hat Quay for automation Expand section "3.12. Pre-configuring Red Hat Quay for automation" Collapse section "3.12. Pre-configuring Red Hat Quay for automation" 3.12.1. Allowing the API to create the first user 3.12.2. Enabling general API access 3.12.3. Adding a superuser 3.12.4. Restricting user creation 3.12.5. Enabling new functionality in Red Hat Quay 3.8 3.12.6. Enabling new functionality in Red Hat Quay 3.7 3.12.7. Suggested configuration for automation 3.12.8. Deploying the Red Hat Quay Operator using the initial configuration Expand section "3.12.8. Deploying the Red Hat Quay Operator using the initial configuration" Collapse section "3.12.8. Deploying the Red Hat Quay Operator using the initial configuration" 3.12.8.1. Using the API to create the first user 3.12.8.2. Using the OAuth token 3.12.8.3. Using the API to create an organization 3.13. Basic configuration fields 3.14. SSL configuration fields Expand section "3.14. SSL configuration fields" Collapse section "3.14. SSL configuration fields" 3.14.1. Configuring SSL 3.15. Adding TLS Certificates to the Red Hat Quay Container Expand section "3.15. Adding TLS Certificates to the Red Hat Quay Container" Collapse section "3.15. Adding TLS Certificates to the Red Hat Quay Container" 3.15.1. Add TLS certificates to Red Hat Quay 3.16. LDAP configuration fields Expand section "3.16. LDAP configuration fields" Collapse section "3.16. LDAP configuration fields" 3.16.1. LDAP configuration references Expand section "3.16.1. LDAP configuration references" Collapse section "3.16.1. LDAP configuration references" 3.16.1.1. Basic LDAP configuration 3.16.1.2. LDAP restricted user configuration 3.16.1.3. LDAP superuser configuration reference 3.17. Mirroring configuration fields 3.18. Security scanner configuration fields Expand section "3.18. Security scanner configuration fields" Collapse section "3.18. Security scanner configuration fields" 3.18.1. Re-indexing with Clair v4 3.18.2. Example security scanner configuration 3.19. Helm configuration fields Expand section "3.19. Helm configuration fields" Collapse section "3.19. Helm configuration fields" 3.19.1. Configuring Helm 3.20. Open Container Initiative configuration fields Expand section "3.20. Open Container Initiative configuration fields" Collapse section "3.20. Open Container Initiative configuration fields" 3.20.1. Configuring additional artifact types 3.21. Unknown media types Expand section "3.21. Unknown media types" Collapse section "3.21. Unknown media types" 3.21.1. Configuring unknown media types 3.22. Action log configuration fields Expand section "3.22. Action log configuration fields" Collapse section "3.22. Action log configuration fields" 3.22.1. Action log storage configuration 3.22.2. Action log rotation and archiving configuration 3.22.3. Action log audit configuration 3.23. Build logs configuration fields 3.24. Dockerfile build triggers fields Expand section "3.24. Dockerfile build triggers fields" Collapse section "3.24. Dockerfile build triggers fields" 3.24.1. GitHub build triggers 3.24.2. BitBucket build triggers 3.24.3. GitLab build triggers 3.25. OAuth configuration fields Expand section "3.25. OAuth configuration fields" Collapse section "3.25. OAuth configuration fields" 3.25.1. GitHub OAuth configuration fields 3.25.2. Google OAuth configuration fields 3.26. OIDC configuration fields Expand section "3.26. OIDC configuration fields" Collapse section "3.26. OIDC configuration fields" 3.26.1. OIDC configuration 3.27. Nested repositories configuration fields 3.28. Mail configuration fields 3.29. User configuration fields Expand section "3.29. User configuration fields" Collapse section "3.29. User configuration fields" 3.29.1. User configuration fields references Expand section "3.29.1. User configuration fields references" Collapse section "3.29.1. User configuration fields references" 3.29.1.1. FEATURE_SUPERUSERS_FULL_ACCESS configuration reference 3.29.1.2. GLOBAL_READONLY_SUPER_USERS configuration reference 3.29.1.3. FEATURE_RESTRICTED_USERS configuration reference 3.29.1.4. RESTRICTED_USERS_WHITELIST configuration reference 3.30. Recaptcha configuration fields 3.31. ACI configuration fields 3.32. JWT configuration fields 3.33. App tokens configuration fields 3.34. Miscellaneous configuration fields 3.35. Legacy configuration fields 3.36. User interface v2 configuration field Expand section "3.36. User interface v2 configuration field" Collapse section "3.36. User interface v2 configuration field" 3.36.1. v2 user interface configuration 3.37. IPv6 configuration field 3.38. Branding configuration fields Expand section "3.38. Branding configuration fields" Collapse section "3.38. Branding configuration fields" 3.38.1. Example configuration for Red Hat Quay branding 3.39. Session timeout configuration field Expand section "3.39. Session timeout configuration field" Collapse section "3.39. Session timeout configuration field" 3.39.1. Example session timeout configuration 4. Environment variables Expand section "4. Environment variables" Collapse section "4. Environment variables" 4.1. Geo-replication 4.2. Database connection pooling 4.3. HTTP connection counts 4.4. Worker count variables 4.5. Debug variables 5. Clair for Red Hat Quay Expand section "5. Clair for Red Hat Quay" Collapse section "5. Clair for Red Hat Quay" 5.1. Clair configuration overview Expand section "5.1. Clair configuration overview" Collapse section "5.1. Clair configuration overview" 5.1.1. Clair configuration reference 5.1.2. Clair general fields 5.1.3. Clair indexer configuration fields 5.1.4. Clair matcher configuration fields 5.1.5. Clair matchers configuration fields 5.1.6. Clair updaters configuration fields 5.1.7. Clair notifier configuration fields 5.1.8. Clair authorization configuration fields 5.1.9. Clair trace configuration fields 5.1.10. Clair metrics configuration fields Legal Notice Settings Close Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 简体中文 日本語 English Language: 简体中文 日本語 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Configure Red Hat Quay Red Hat Quay 3.9Customizing Red Hat Quay using configuration optionsRed Hat OpenShift Documentation TeamLegal NoticeAbstract Configure Red Hat Quay Next