Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/administration/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ The operations that are performed by the Harbor system administrator are the fol
- Set up replication of images between Harbor and another Harbor instance or a 3rd party replication target. For information, see [Configuring Replication](configuring-replication).
- Set up vulnerability scanners to check the images in the registry for CVE vulnerabilities. For information, see [Vulnerability Scanning](vulnerability-scanning).
- Perform garbage collection, to remove unnecessary data from Harbor. For information, see [Garbage Collection](garbage-collection).
- Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs.For information, see [Log Rotation](log-rotation).
- Manage audit logs by configuring an audit log retention window and setting a syslog endpoint to forward audit logs. For information, see [Log Rotation](log-rotation).
- Upgrade Harbor when a new version becomes available. For information, see [Upgrading Harbor](upgrade).
- Set up P2P preheat provider instances to preheat the specified images into the P2P network. For information, see [P2P preheat](p2p-preheat).
- Details of defining a user-defined OCI artifact so that Harbor can manage it. For information, see [user-defined OCI artifact](user-defined-OCI-artifact).
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ You can also use an endpoint in a proxy cache project. Read more about how to [C

## Access ID and Secret Configuration

- AWS ECR adapters should use access keys, not a username and password.The access key should have sufficient permissions, such as storagepermission.
- AWS ECR adapters should use access keys, not a username and password. The access key should have sufficient permissions, such as storage permission.
- Google GCR adapters should use the entire JSON key generated in the service account. The namespace should start with the project ID.
- Quay Registry
- Supported scope
Expand Down