Skip to content

Commit

Permalink
chore: update wording and add dedicated section (#446)
Browse files Browse the repository at this point in the history
  • Loading branch information
acarranoqovery authored Jul 12, 2024
1 parent 1a10766 commit 4e66bec
Show file tree
Hide file tree
Showing 2 changed files with 26 additions and 12 deletions.
19 changes: 13 additions & 6 deletions website/docs/using-qovery/deployment/image-mirroring.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
last_modified_on: "2024-06-19"
last_modified_on: "2024-07-11"
title: "Image Mirroring"
description: "Learn how images are mirrored within your cloud account"
---
Expand Down Expand Up @@ -49,11 +49,6 @@ Given this isolation mechanism, if the same application is cloned (via the [clon

The Qovery behaviour in this case will depend on the chosen [mirroring mode][docs.using-qovery.configuration.cluster-advanced-settings#image-registry] within the cluster advanced settings.

<Alert type="info">

This mirroring operation is skipped if the "source registry" is the same as the "Mirroring registry" (i.e.: you push your built images directly on the mirroring registry). This is the suggested setup since it makes you reduce your deployment time!

</Alert>

** Service (Default) **

Expand Down Expand Up @@ -118,6 +113,18 @@ When working with containerized applications, it is crucial to employ unique ima

In summary, maintaining unique image tags is a critical aspect of effective version control and ensuring that your applications run the intended versions without disruptions caused by caching mechanisms.

### Disabling the mirroring

If you want to reduce the deployment time by avoiding the mirroring operation, you can push your built images directly into the `Mirroring registry`.

Push the images in a image registry `repository` having the same name of the image you want to deploy.

**Example on AWS**

Let's say you have a container image called `nginx` that you build on your CI and the container registry associated with your cluster is https://32432542.dkr.ecr.eu-west-3.amazonaws.com.

You can push this image on the mirroring registry within the repository `nginx`, avoiding the mirroring operation: https://32432542.dkr.ecr.eu-west-3.amazonaws.com/nginx


[docs.using-qovery.configuration.cluster-advanced-settings#image-registry]: /docs/using-qovery/configuration/cluster-advanced-settings/#image-registry
[docs.using-qovery.configuration.environment#clone-environment]: /docs/using-qovery/configuration/environment/#clone-environment
Expand Down
19 changes: 13 additions & 6 deletions website/docs/using-qovery/deployment/image-mirroring.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -40,11 +40,6 @@ Given this isolation mechanism, if the same application is cloned (via the [clon

The Qovery behaviour in this case will depend on the chosen [mirroring mode][docs.using-qovery.configuration.cluster-advanced-settings#image-registry] within the cluster advanced settings.

<Alert type="info">

This mirroring operation is skipped if the "source registry" is the same as the "Mirroring registry" (i.e.: you push your built images directly on the mirroring registry). This is the suggested setup since it makes you reduce your deployment time!

</Alert>

** Service (Default) **

Expand Down Expand Up @@ -107,4 +102,16 @@ When working with containerized applications, it is crucial to employ unique ima
- Mirroring Registry: Qovery’s mirroring system stores images in a registry. If an image tag remains the same between two versions, the new version will not be mirrored. Consequently, the new version will not be deployed, affecting the overall application.
- Kubernetes: Applications deployed by Qovery on Kubernetes adhere to the “ifNotPresent” image pull policy. This policy means that if the image already exists on the Kubernetes node’s local disk, Kubernetes will not attempt to pull it again. However, if the image tag remains unchanged, the new image version will not be fetched, resulting in your pods running the outdated application code.

In summary, maintaining unique image tags is a critical aspect of effective version control and ensuring that your applications run the intended versions without disruptions caused by caching mechanisms.
In summary, maintaining unique image tags is a critical aspect of effective version control and ensuring that your applications run the intended versions without disruptions caused by caching mechanisms.

### Disabling the mirroring

If you want to reduce the deployment time by avoiding the mirroring operation, you can push your built images directly into the `Mirroring registry`.

Push the images in a image registry `repository` having the same name of the image you want to deploy.

**Example on AWS**

Let's say you have a container image called `nginx` that you build on your CI and the container registry associated with your cluster is https://32432542.dkr.ecr.eu-west-3.amazonaws.com.

You can push this image on the mirroring registry within the repository `nginx`, avoiding the mirroring operation: https://32432542.dkr.ecr.eu-west-3.amazonaws.com/nginx

0 comments on commit 4e66bec

Please sign in to comment.