Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products

Table of contents

  1. Manage Red Hat Quay
  2. Preface
  3. 1. Getting Red Hat Quay release notifications
  4. 2. Using SSL to protect connections to Red Hat Quay
    1. 2.1. Create a CA and sign a certificate
    2. 2.2. Configure Red Hat Quay to use the new certificate
      1. 2.2.1. Configure SSL from the Red Hat Quay Setup screen
      2. 2.2.2. Configure with the command line
      3. 2.2.3. Test the secure connection
    3. 2.3. Configuring Docker to Trust a Certificate Authority
  5. 3. Adding TLS Certificates to the Red Hat Quay Container
    1. 3.1. Add TLS certificates to Red Hat Quay
    2. 3.2. Add certs when deployed on Kubernetes
  6. 4. Configuring action log storage for Elasticsearch
  7. 5. Red Hat Quay Security Scanning with Clair
    1. 5.1. Set up Clair in the Red Hat Quay config tool
      1. 5.1.1. Enabling Clair on a Red Hat Quay OpenShift deployment
      2. 5.1.2. Enabling Clair on a Red Hat Quay Basic or HA deployment
  8. 6. Setting Up Clair Security Scanning
    1. 6.1. Run Clair on a Red Hat Quay OpenShift deployment
    2. 6.2. Run Clair on a Red Hat Quay Basic or HA deployment
      1. 6.2.1. Get Postgres and Clair
      2. 6.2.2. Configure Clair
        1. 6.2.2.1. Clair configuration: High availability
        2. 6.2.2.2. Clair configuration: Single instance
      3. 6.2.3. Configuring Clair for TLS
        1. 6.2.3.1. Using certificates from a public CA
        2. 6.2.3.2. Configuring trust of self-signed SSL
      4. 6.2.4. Using Clair data sources
      5. 6.2.5. Run Clair
  9. 7. Using Clair V4 Security Scanning
    1. 7.1. What is Clair v4?
    2. 7.2. Configuring Clair v4
    3. 7.3. Using Clair v4
  10. 8. Scan pod images with the Container Security Operator
    1. 8.1. Run the CSO in OpenShift
    2. 8.2. Query image vulnerabilities from the CLI
  11. 9. Integrate Red Hat Quay into OpenShift with the Bridge Operator
    1. 9.1. Running the Quay Bridge Operator
      1. 9.1.1. Prerequisites
      2. 9.1.2. Setting up and configuring OpenShift and Red Hat Quay
        1. 9.1.2.1. Red Hat Quay setup
        2. 9.1.2.2. OpenShift Setup
  12. 10. Repository Mirroring in Red Hat Quay
    1. 10.1. Overview of repository mirroring
    2. 10.2. Prerequisites
    3. 10.3. Create a mirrored repository
    4. 10.4. Working with mirrored repositories
    5. 10.5. Tag Patterns
  13. 11. LDAP Authentication Setup for Red Hat Quay
    1. 11.1. Set Up LDAP Configuration
      1. 11.1.1. Full LDAP URI
      2. 11.1.2. Team Synchronization
      3. 11.1.3. Base and Relative Distinguished Names
      4. 11.1.4. Additional User Filters
      5. 11.1.5. Administrator DN
      6. 11.1.6. UID and Mail attributes
      7. 11.1.7. Validation
    2. 11.2. Common Issues
    3. 11.3. Configure an LDAP user as superuser
  14. 12. Prometheus and Grafana metrics under Red Hat Quay
    1. 12.1. Exposing the Prometheus endpoint
      1. 12.1.1. Setting up Prometheus to consume metrics
      2. 12.1.2. DNS configuration under Kubernetes
      3. 12.1.3. DNS configuration for a manual cluster
  15. 13. Georeplication of storage in Red Hat Quay
    1. 13.1. Prerequisites
    2. 13.2. Visit the Config Tool
    3. 13.3. Enable storage replication
    4. 13.4. Run Red Hat Quay with storage preferences
  16. 14. Red Hat Quay Troubleshooting
  17. 15. Schema for Red Hat Quay
  18. Legal Notice

Chapter 14. Red Hat Quay Troubleshooting

Common failure modes and best practices for recovery.

  • I’m receiving HTTP Status Code 429
  • I’m authorized but I’m still getting 403s
  • Base image pull in Dockerfile fails with 403
  • Cannot add a build trigger
  • Build logs are not loading
  • I’m receiving "Cannot locate specified Dockerfile" * Could not reach any registry endpoint
  • Cannot access private repositories using EC2 Container Service
  • Docker is returning an i/o timeout
  • Docker login is failing with an odd error
  • Pulls are failing with an odd error
  • I just pushed but the timestamp is wrong
  • Pulling Private Quay.io images with Marathon/Mesos fails
  1. Previous
  2. Next
Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Statement effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter