Downloading certified container images from IBM Entitled Registry
You can pull the IBM Transformation Extender Advanced Certified Container images from IBM Entitled Registry into the cluster or mirror the images if an air-gapped environment is available. For more information, see Mirroring Certified Container images in an air-gapped environment.
The following certified container images are available for download from IBM Entitled
Registry:
Note: The certified container images for v10.0.1.9 are available for the following platform architectures:
- Linux® on x86-64 bit CPU architecture (AMD64)
- IBM® Transformation Extender Advanced 10.0.1.9 Certified Container
cp.icr.io/cp/ibm-itxa/itxa-init-db:10.0.1.9-x86_64
cp.icr.io/cp/ibm-itxa/itxa-ui-server:10.0.1.9-x86_64
cp.icr.io/cp/ibm-itxa/itxa-runtime:10.0.1.9-x86_64
cp.icr.io/cp/ibm-itxa/itxa-resources:10.0.1.9-x86_64
Complete the following steps to download Certified Container images from IBM Entitled
Registry:
- Ensure that the entitlement key is obtained.
- Log in to MyIBM Container Software Library with the IBMid and Password that are associated with the entitled software. In case, you are not directed to the entitlement page, click Get an entitlement key to obtain the entitlement key.
- In the Entitlement key section, click Copy key to copy the entitlement key to the clipboard.
- Save the entitlement key to a safe location for later use.
To confirm your Entitlement Key is valid, click View library from the left of the page. You can view the list of products that you are entitled to. If IBM Transformation Extender Advanced is not listed, or if the View library link is disabled, it indicates that the identity that you are logged in to the container library does not entitle for IBM Transformation Extender Advanced. In this case, the entitlement key is not valid for installing the software.
- Set Entitled Registry information by completing the following steps:
- Run export commands that set ENTITLED_REGISTRY to
cp.icr.io
. - Set ENTITLED_REGISTRY_USER to
cp
. - Set ENTITLED_REGISTRY_KEY to the entitlement key that you saved to a safe location.
- Run export commands that set ENTITLED_REGISTRY to
- This step is optional - log in to Entitled Registry by using the following
docker login
command to validate the Entitled Registry credentials:
Configure Helm to Pull images directly from the IBM entitled Registrydocker login "$ENTITLED_REGISTRY" -u "$ENTITLED_REGISTRY_USER" -p "$ENTITLED_REGISTRY_KEY
- Run the following command to create Docker pull Secret for pulling the images from IBM Entitled
Registry:
kubectl create secret docker-registry <secret name> --docker-username="cp" --docker-password="<Entitled registry API key>" --docker-email="<email address" --docker-server="cp.icr.io" -n <namespace>
- Update the service account or Helm Chart image pull secret configurations with the secret name
that is stated in step 7. For
example:
Pull images manually and push to an internal registryvalues.global.pullSecret: ibm-entitlement-key
- Follow these steps to download and push images to an Red Hat OpenShift or a local image registry.
- Download the image that uses the
docker or podman pull
command.docker pull cp.icr.io/ibm-itxa/itxa-ui-server:10.0.1.9 podman pull cp.icr.io/ibm-itxa/itxa-ui-server:10.0.1.9
- Tag the downloaded image with the correct local or Red Hat OpenShift registry.
For example:docker tag <imageid> <registry URL>:<tag> podman tag <imageid> <registry URL>:<tag>
docker tag 76b3dc4c111 my-registry/my-namespace/itxa-ui-server:10.0.1.9
- Push the Docker image that uses the
docker or podman push
command.
For example:docker push <registry URL>:<tag> podman push <registry URL>:<tag>
docker push 76b3dc4c111 my-registry/my-namespace/itxa-ui-server:10.0.1.9
- Download the image that uses the
- Run the following command to create a Docker pull Secret for pulling the images from the
Registry.
Configure this pull secret in the service account that is used for deployment that uses this command:kubectl create secret docker-registry <name of secret> --docker-server= <your-registry-server> --docker-username=<your-username> --docker-password=<your-password> --docker-email=<your-email>
kubectl patch serviceaccount <service-account-name> -p '{"imagePullSecrets": [{"name": "<pull-secret-name>"}]}'
Note: If you do not create a separate service account, the service account name is "default." - Optionally update the Helm Chart image to pull secret configurations with the Secret name. For
example:
values.global.pullSecret: <pull-secret-name>