Harbor Administration

This section describes how to configure and maintain Harbor after deployment. These operations are performed by the Harbor system administrator. The Harbor system administrator performs global configuration operations that apply to the whole Harbor instance.

The operations that are performed by the Harbor system administrator are the following.

  • Select database, LDAP/Active Directory, or OIDC based authentication. For information, see Configuring Authentication.
  • Add users in database authentication mode and assign the system administrator role to other users. For information, see Managing Users.
  • Configure global settings, such as setting the registry to read-only mode, and restriction who can create projects. For information, see Configure Global Settings.
  • Apply resource quotas to projects. For information, see Configure Project Quotas.
  • Set up replication of images between Harbor and another Harbor instance or a 3rd party replication target. For information, see Configuring Replication.
  • Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see Vulnerability Scanning.
  • Perform garbage collection, to remove unnecessary data from Harbor. For information, see Garbage Collection.
  • Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs.For information, see Log Rotation.
  • Upgrade Harbor when a new version becomes available. For information, see Upgrading Harbor.
  • Set up P2P preheat provider instances to preheat the specified images into the P2P network. For information, see P2P preheat.
  • Details of defining a user-defined OCI artifact so that Harbor can manage it. For information, see user-defined OCI artifact.

Subsections