Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
  1. Manage Red Hat Quay
  2. Preface
  3. 1. Advanced Red Hat Quay configuration
    1. 1.1. Using Red Hat Quay Config Tool to modify Red Hat Quay
      1. 1.1.1. Running the Config Tool from the Red Hat Quay Operator
      2. 1.1.2. Running the Config Tool from the command line
      3. 1.1.3. Deploying the config tool using TLS certificates
    2. 1.2. Using the API to modify Red Hat Quay
    3. 1.3. Editing the config.yaml file to modify Red Hat Quay
      1. 1.3.1. Add name and company to Red Hat Quay sign-in
      2. 1.3.2. Disable TLS Protocols
      3. 1.3.3. Rate limit API calls
      4. 1.3.4. Adjust database connection pooling
        1. 1.3.4.1. Database connection arguments
        2. 1.3.4.2. Database SSL configuration
          1. 1.3.4.2.1. PostgreSQL SSL connection arguments
          2. 1.3.4.2.2. MySQL SSL connection arguments
        3. 1.3.4.3. HTTP connection counts
        4. 1.3.4.4. Dynamic process counts
        5. 1.3.4.5. Environment variables
        6. 1.3.4.6. Turning off connection pooling
  4. 2. Using the configuration API
    1. 2.1. Retrieving the default configuration
    2. 2.2. Retrieving the current configuration
    3. 2.3. Validating configuration using the API
    4. 2.4. Determining the required fields
  5. 3. Getting Red Hat Quay release notifications
  6. 4. Using SSL to protect connections to Red Hat Quay
    1. 4.1. Introduction to using SSL
    2. 4.2. Create a Certificate Authority and sign a certificate
      1. 4.2.1. Create a Certificate Authority
      2. 4.2.2. Sign a certificate
    3. 4.3. Configuring SSL using the command line
    4. 4.4. Configuring SSL using the UI
    5. 4.5. Testing SSL configuration using the command line
    6. 4.6. Testing SSL configuration using the browser
    7. 4.7. Configuring podman to trust the Certificate Authority
    8. 4.8. Configuring the system to trust the certificate authority
  7. 5. Adding TLS Certificates to the Red Hat Quay Container
    1. 5.1. Add TLS certificates to Red Hat Quay
    2. 5.2. Add certs when deployed on Kubernetes
  8. 6. Configuring action log storage for Elasticsearch
  9. 7. Clair Security Scanning
    1. 7.1. Setting Up Clair on a Red Hat Quay OpenShift deployment
      1. 7.1.1. Deploying Via the Quay Operator
      2. 7.1.2. Manually Deploying Clair
    2. 7.2. Setting up Clair on a non-OpenShift Red Hat Quay deployment
    3. 7.3. Advanced Clair configuration
      1. 7.3.1. Unmanaged Clair configuration
        1. 7.3.1.1. Unmanaging a Clair database
        2. 7.3.1.2. Configuring a custom Clair database
      2. 7.3.2. Running a custom Clair configuration with a managed database
    4. 7.4. Clair CRDA configuration
      1. 7.4.1. Enabling Clair CRDA
    5. 7.5. Using Clair
    6. 7.6. CVE ratings from the National Vulnerability Database
    7. 7.7. Configuring Clair for disconnected environments
      1. 7.7.1. Mapping repositories to Common Product Enumeration (CPE) information
    8. 7.8. Clair updater URLs
    9. 7.9. Additional Information
  10. 8. Scanning pod images with the Container Security Operator
    1. 8.1. Downloading and running the Container Security Operator in OpenShift Container Platform
    2. 8.2. Query image vulnerabilities from the CLI
  11. 9. Integrating Red Hat Quay into OpenShift Container Platform with the Quay Bridge Operator
    1. 9.1. Setting up Red Hat Quay for the Quay Bridge Operator
    2. 9.2. Installing the Quay Bridge Operator on OpenShift Container Platform
    3. 9.3. Creating an OpenShift Container Platform secret for the OAuth token
    4. 9.4. Creating the QuayIntegration custom resource
      1. 9.4.1. Optional: Creating the QuayIntegration custom resource using the CLI
      2. 9.4.2. Optional: Creating the QuayIntegration custom resource using the web console
    5. 9.5. QuayIntegration configuration fields
  12. 10. Repository mirroring
    1. 10.1. Repository mirroring
    2. 10.2. Repository mirroring versus geo-replication
    3. 10.3. Using repository mirroring
    4. 10.4. Mirroring configuration UI
    5. 10.5. Mirroring configuration fields
    6. 10.6. Mirroring worker
    7. 10.7. Creating a mirrored repository
      1. 10.7.1. Repository mirroring settings
      2. 10.7.2. Advanced settings
      3. 10.7.3. Synchronize now
    8. 10.8. Event notifications for mirroring
    9. 10.9. Mirroring tag patterns
      1. 10.9.1. Pattern syntax
      2. 10.9.2. Example tag patterns
    10. 10.10. Working with mirrored repositories
    11. 10.11. Repository mirroring recommendations
  13. 11. IPv6 and dual-stack deployments
    1. 11.1. Enabling the IPv6 protocol family
    2. 11.2. Enabling the dual-stack protocol family
    3. 11.3. IPv6 and dua-stack limitations
  14. 12. LDAP Authentication Setup for Red Hat Quay
    1. 12.1. Considerations prior to enabling LDAP
      1. 12.1.1. Existing Quay deployments
      2. 12.1.2. Manual User Creation and LDAP authentication
    2. 12.2. Set Up LDAP Configuration
      1. 12.2.1. Full LDAP URI
      2. 12.2.2. Team Synchronization
      3. 12.2.3. Base and Relative Distinguished Names
      4. 12.2.4. Additional User Filters
        1. 12.2.4.1. Enabling the LDAP_RESTRICTED_USER_FILTER configuration field
      5. 12.2.5. Administrator DN
      6. 12.2.6. UID and Mail attributes
      7. 12.2.7. Validation
    3. 12.3. Common Issues
    4. 12.4. Configure an LDAP user as superuser
    5. 12.5. Enabling the LDAP_SUPERUSER_FILTER configuration field
  15. 13. Prometheus and Grafana metrics under Red Hat Quay
    1. 13.1. Exposing the Prometheus endpoint
      1. 13.1.1. Standalone Red Hat Quay
      2. 13.1.2. Red Hat Quay Operator
      3. 13.1.3. Setting up Prometheus to consume metrics
      4. 13.1.4. DNS configuration under Kubernetes
      5. 13.1.5. DNS configuration for a manual cluster
    2. 13.2. Introduction to metrics
      1. 13.2.1. General registry statistics
      2. 13.2.2. Queue items
      3. 13.2.3. Garbage collection metrics
        1. 13.2.3.1. Multipart uploads metrics
      4. 13.2.4. Image push / pull metrics
        1. 13.2.4.1. Image pulls total
        2. 13.2.4.2. Image bytes pulled
        3. 13.2.4.3. Image pushes total
        4. 13.2.4.4. Image bytes pushed
      5. 13.2.5. Authentication metrics
  16. 14. Red Hat Quay quota management and enforcement
    1. 14.1. Quota management configuration
      1. 14.1.1. Default quota
    2. 14.2. Quota management architecture
    3. 14.3. Establishing quota in Red Hat Quay UI
    4. 14.4. Establishing quota with the Red Hat Quay API
      1. 14.4.1. Setting the quota
      2. 14.4.2. Viewing the quota
      3. 14.4.3. Modifying the quota
      4. 14.4.4. Pushing images
        1. 14.4.4.1. Pushing ubuntu:18.04
        2. 14.4.4.2. Using the API to view quota usage
        3. 14.4.4.3. Pushing another image
      5. 14.4.5. Rejecting pushes using quota limits
        1. 14.4.5.1. Setting reject and warning limits
        2. 14.4.5.2. Viewing reject and warning limits
        3. 14.4.5.3. Pushing an image when the reject limit is exceeded
        4. 14.4.5.4. Notifications for limits exceeded
    5. 14.5. Quota management limitations
  17. 15. Geo-replication
    1. 15.1. Geo-replication features
    2. 15.2. Geo-replication requirements and constraints
    3. 15.3. Geo-replication using standalone Red Hat Quay
      1. 15.3.1. Enable storage replication - standalone Quay
      2. 15.3.2. Run Red Hat Quay with storage preferences
    4. 15.4. Geo-replication using the Red Hat Quay Operator
      1. 15.4.1. Setting up geo-replication on Openshift
        1. 15.4.1.1. Configuration
      2. 15.4.2. Mixed storage for geo-replication
  18. 16. Backing up and restoring Red Hat Quay managed by the Red Hat Quay Operator
    1. 16.1. Backing up Red Hat Quay
      1. 16.1.1. Red Hat Quay configuration backup
      2. 16.1.2. Scale down your Red Hat Quay deployment
      3. 16.1.3. Red Hat Quay managed database backup
        1. 16.1.3.1. Red Hat Quay managed object storage backup
      4. 16.1.4. Scale the Red Hat Quay deployment back up
    2. 16.2. Restoring Red Hat Quay
      1. 16.2.1. Restoring Red Hat Quay and its configuration from a backup
      2. 16.2.2. Scale down your Red Hat Quay deployment
      3. 16.2.3. Restore your Red Hat Quay database
      4. 16.2.4. Restore your Red Hat Quay object storage data
      5. 16.2.5. Scale up your Red Hat Quay deployment
  19. 17. Migrating a standalone Quay deployment to a Red Hat Quay Operator managed deployment
    1. 17.1. Backing up a standalone deployment of Red Hat Quay
    2. 17.2. Using backed up standalone content to migrate to OpenShift Container Platform.
  20. 18. Backing up and restoring Red Hat Quay on a standalone deployment
    1. 18.1. Backing up Red Hat Quay on standalone deployments
    2. 18.2. Restoring Red Hat Quay on standalone deployments
  21. 19. Red Hat Quay garbage collection
    1. 19.1. About Red Hat Quay garbage collection
    2. 19.2. Red Hat Quay garbage collection in practice
      1. 19.2.1. Measuring storage reclamation
    3. 19.3. Garbage collection configuration fields
    4. 19.4. Disabling garbage collection
    5. 19.5. Garbage collection and quota management
    6. 19.6. Garbage collection in practice
    7. 19.7. Red Hat Quay garbage collection metrics
  22. 20. Red Hat Quay Troubleshooting
  23. 21. Schema for Red Hat Quay configuration
  24. Legal Notice

Chapter 20. Red Hat Quay Troubleshooting

Common failure modes and best practices for recovery.

  • I’m receiving HTTP Status Code 429
  • I’m authorized but I’m still getting 403s
  • Base image pull in Dockerfile fails with 403
  • Cannot add a build trigger
  • Build logs are not loading
  • I’m receiving "Cannot locate specified Dockerfile" * Could not reach any registry endpoint
  • Cannot access private repositories using EC2 Container Service
  • Docker is returning an i/o timeout
  • Docker login is failing with an odd error
  • Pulls are failing with an odd error
  • I just pushed but the timestamp is wrong
  • Pulling Private Quay.io images with Marathon/Mesos fails
  1. Previous
  2. Next
Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter