Skip to content

Commit 6e6e4ed

Browse files
authored
Merge pull request #39731 from sftim/20230228_update_registry_k8s_io_change
Update registry.k8s.io announcement article
2 parents 8053f6a + 9100a22 commit 6e6e4ed

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

content/en/blog/_posts/2022-11-28-registry-k8s-io-change.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Starting with Kubernetes 1.25, our container image registry has changed from k8s
1111

1212
## TL;DR: What you need to know about this change
1313

14-
* Container images for Kubernetes releases from 1.25 onward are no longer published to k8s.gcr.io, only to registry.k8s.io.
14+
* Container images for Kubernetes releases from <del>1.25</del> 1.27 onward are not published to k8s.gcr.io, only to registry.k8s.io.
1515
* In the upcoming December patch releases, the new registry domain default will be backported to all branches still in support (1.22, 1.23, 1.24).
1616
* If you run in a restricted environment and apply strict domain/IP address access policies limited to k8s.gcr.io, the __image pulls will not function__ after the migration to this new registry. For these users, the recommended method is to mirror the release images to a private registry.
1717

@@ -68,8 +68,15 @@ The image used by kubelet for the pod sandbox (`pause`) can be overridden by set
6868
kubelet --pod-infra-container-image=k8s.gcr.io/pause:3.5
6969
```
7070
71+
## Legacy container registry freeze {#registry-freeze}
72+
73+
[k8s.gcr.io Image Registry Will Be Frozen From the 3rd of April 2023](/blog/2023/02/06/k8s-gcr-io-freeze-announcement/) announces the freeze of the
74+
legacy k8s.gcr.io image registry. Read that article for more details.
75+
7176
## Acknowledgments
7277
7378
__Change is hard__, and evolving our image-serving platform is needed to ensure a sustainable future for the project. We strive to make things better for everyone using Kubernetes. Many contributors from all corners of our community have been working long and hard to ensure we are making the best decisions possible, executing plans, and doing our best to communicate those plans.
7479
7580
Thanks to Aaron Crickenberger, Arnaud Meukam, Benjamin Elder, Caleb Woodbine, Davanum Srinivas, Mahamed Ali, and Tim Hockin from SIG K8s Infra, Brian McQueen, and Sergey Kanzhelev from SIG Node, Lubomir Ivanov from SIG Cluster Lifecycle, Adolfo García Veytia, Jeremy Rickard, Sascha Grunert, and Stephen Augustus from SIG Release, Bob Killen and Kaslin Fields from SIG Contribex, Tim Allclair from the Security Response Committee. Also a big thank you to our friends acting as liaisons with our cloud provider partners: Jay Pipes from Amazon and Jon Johnson Jr. from Google.
81+
82+
_This article was updated on the 28th of February 2023._

0 commit comments

Comments
 (0)