History
The metadata database provides several enhancements to the container registry that improve performance and add new features. The work on the GitLab Self-Managed release of the registry metadata database feature is tracked in epic 5521.
By default, the container registry uses object storage to persist metadata related to container images. This method to store metadata limits how efficiently the data can be accessed, especially data spanning multiple images, such as when listing tags. By using a database to store this data, many new features are possible, including online garbage collection which removes old data automatically with zero downtime.
This database works in conjunction with the object storage already used by the registry, but does not replace object storage. You must continue to maintain an object storage solution even after performing a metadata import to the metadata database.
For Helm Charts installations, see Manage the container registry metadata database in the Helm Charts documentation.
EnhancementsThe metadata database architecture supports performance improvements, bug fixes, and new features that are not available with the object storage metadata architecture. These enhancements include:
Due to technical constraints of the object storage metadata architecture, new features are only implemented for the metadata database version. Non-security bug fixes might be limited to the metadata database version.
Known limitationsYou can import metadata from existing registries to the metadata database, and use online garbage collection.
Some database-enabled features are only enabled for GitLab.com and automatic database provisioning for the registry database is not available. Review the feature support table in the feedback issue for the status of features related to the container registry database.
Prerequisites:
Follow the instructions that match your situation:
For installations that have never written data to the container registry, no import is required. You must only enable the database before writing data to the registry.
To enable the database:
Enable the database by editing /etc/gitlab/gitlab.rb
and setting enabled
to true
:
registry['database'] = {
'enabled' => true,
}
Save the file and reconfigure GitLab.
Prerequisites:
To enable the database:
Edit /etc/gitlab/gitlab.rb
by adding your database connection details, but start with the metadata database disabled:
registry['database'] = {
'enabled' => false,
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
Save the file and reconfigure GitLab.
Enable the database by editing /etc/gitlab/gitlab.rb
and setting enabled
to true
:
registry['database'] = {
'enabled' => true,
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
You can import your existing container registry metadata using either a one-step import method or three-step import method. A few factors affect the duration of the import:
You do not need to do the following in preparation before importing:
The metadata import only targets tagged images. Untagged and unreferenced manifests, and the layers exclusively referenced by them, are left behind and become inaccessible. Untagged images were never visible through the GitLab UI or API, but they can become “dangling” and left behind in the backend. After import to the new registry, all images are subject to continuous online garbage collection, by default deleting any untagged and unreferenced manifests and layers that remain for longer than 24 hours.
How to choose the right import methodIf you regularly run offline garbage collection, use the one-step import method. This method should take a similar amount of time and is a simpler operation compared to the three-step import method.
If your registry is too large to regularly run offline garbage collection, use the three-step import method to minimize the amount of read-only time significantly.
One-step importThe registry must be shut down or remain in read-only
mode during the import. Otherwise, data written during the import becomes inaccessible or leads to inconsistencies.
Ensure the database is disabled in the registry['database']
section of your /etc/gitlab/gitlab.rb
file:
registry['database'] = {
'enabled' => false, # Must be false!
}
Ensure the registry is set to read-only
mode.
Edit your /etc/gitlab/gitlab.rb
and add the maintenance
section to the registry['storage']
configuration. For example, for a gcs
backend registry using a gs://my-company-container-registry
bucket, the configuration could be:
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => true # Must be set to true.
}
}
}
Save the file and reconfigure GitLab.
Run the following command:
sudo -u registry gitlab-ctl registry-database import --log-to-stdout
If the command completed successfully, the registry is fully imported. You can enable the database, turn off read-only mode in the configuration, and start the registry service:
registry['database'] = {
'enabled' => true, # Must be enabled now!
}
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => false
}
}
}
Save the file and reconfigure GitLab.
Prerequisites:
Add the database
section to your /etc/gitlab/gitlab.rb
file, but start with the metadata database disabled:
registry['database'] = {
'enabled' => false, # Must be false!
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
Ensure the registry is set to read-only
mode.
Edit your /etc/gitlab/gitlab.rb
and add the maintenance
section to the registry['storage']
configuration. For example, for a gcs
backed registry using a gs://my-company-container-registry
bucket, the configuration could be:
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => true # Must be set to true.
}
}
}
Save the file and reconfigure GitLab.
Apply database migrations if you have not done so.
Run the following command:
sudo gitlab-ctl registry-database import
If the command completed successfully, the registry is now fully imported. You can now enable the database, turn off read-only mode in the configuration, and start the registry service:
registry['database'] = {
'enabled' => true, # Must be enabled now!
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => false
}
}
}
Save the file and reconfigure GitLab.
You can now use the metadata database for all operations!
Three-step importFollow this guide to import your existing container registry metadata. The following procedure is recommended for larger registries (200 GiB or more) or if you are trying to minimize downtime while completing the import.
Pre-import repositories (step one)Users have reported step one import completed at rates of 2 to 4 TB per hour. At the slower speed, registries with over 100TB of data could take longer than 48 hours. You may continue to use the registry as normal while step one is being completed.
It is not yet possible to restart the import, so it’s important to let the import run to completion. If you must halt the operation, you have to restart this step.
Ensure the database is disabled in the database
section to your /etc/gitlab/gitlab.rb
file:
registry['database'] = {
'enabled' => false, # Must be false!
}
Save the file and reconfigure GitLab.
Run the first step to begin the import:
sudo -u registry gitlab-ctl registry-database import --step-one --log-to-stdout
Prerequisites:
Add the database
section to your /etc/gitlab/gitlab.rb
file, but start with the metadata database disabled:
registry['database'] = {
'enabled' => false, # Must be false!
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
Save the file and reconfigure GitLab.
Apply database migrations if you have not done so.
Run the first step to begin the import:
sudo gitlab-ctl registry-database import --step-one
You should try to schedule the following step as soon as possible to reduce the amount of downtime required. Ideally, less than one week after step one completes. Any new data written to the registry between steps one and two, causes step two to take more time.
Import all repository data (step two)This step requires the registry to be shut down or set in read-only
mode; however, you can expect this step to complete around 90% faster than step one. Allow enough time for downtime while step two is being executed.
Ensure the registry is set to read-only
mode.
Edit your /etc/gitlab/gitlab.rb
and add the maintenance
section to the registry['storage']
configuration. For example, for a gcs
backend registry using a gs://my-company-container-registry
bucket, the configuration could be:
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => true # Must be set to true.
}
}
}
Save the file and reconfigure GitLab.
Run step two of the import:
sudo -u registry gitlab-ctl registry-database import --step-two --log-to-stdout
If the command completed successfully, all images are now fully imported. You can now enable the database, turn off read-only mode in the configuration, and start the registry service:
registry['database'] = {
'enabled' => true, # Must be set to true!
}
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => { # This section can be removed.
'readonly' => {
'enabled' => false
}
}
}
Save the file and reconfigure GitLab.
Ensure the registry is set to read-only
mode.
Edit your /etc/gitlab/gitlab.rb
and add the maintenance
section to the registry['storage']
configuration. For example, for a gcs
backed registry using a gs://my-company-container-registry
bucket, the configuration could be:
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => {
'readonly' => {
'enabled' => true # Must be set to true.
}
}
}
Save the file and reconfigure GitLab.
Run step two of the import:
sudo gitlab-ctl registry-database import --step-two
If the command completed successfully, all images are now fully imported. You can now enable the database, turn off read-only mode in the configuration, and start the registry service:
registry['database'] = {
'enabled' => true, # Must be set to true!
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
## Object Storage - Container Registry
registry['storage'] = {
'gcs' => {
'bucket' => '<my-company-container-registry>',
'chunksize' => 5242880
},
'maintenance' => { # This section can be removed.
'readonly' => {
'enabled' => false
}
}
}
Save the file and reconfigure GitLab.
You can now use the metadata database for all operations!
Import remaining data (step three)Even though the registry is now fully using the database for its metadata, it does not yet have access to any potentially unused layer blobs, preventing these blobs from being removed by the online garbage collector. You may continue to use the registry as normal while step three is being completed.
To complete the process, run the final step of the migration:
sudo -u registry gitlab-ctl registry-database import --step-three --log-to-stdout
sudo gitlab-ctl registry-database import --step-three
After that command exists successfully, registry metadata is now fully imported to the database.
Post importIt may take approximately 48 hours post import to see your registry storage decrease. This is a normal and expected part of online garbage collection, as this delay ensures that online garbage collection does not interfere with image pushes. Check out the monitor online garbage collection section to see how to monitor the progress and health of the online garbage collector.
Database migrationsThe container registry supports two types of migrations:
Regular schema migrations: Changes to the database structure that must run before deploying new application code, also known as pre-deployment migrations. These should be fast (no more than a few minutes) to avoid deployment delays.
Post-deployment migrations: Changes to the database structure that can run while the application is running. Used for longer operations like creating indexes on large tables, avoiding startup delays and extended upgrade downtime.
By default, the registry applies both regular schema and post-deployment migrations simultaneously. To reduce downtime during upgrades, you can skip post-deployment migrations and apply them manually after the application starts.
Apply database migrationsTo apply both regular schema and post-deployment migrations before the application starts:
Run database migrations:
sudo -u registry gitlab-ctl registry-database migrate up
To skip post-deployment migrations:
Run regular schema migrations only:
sudo -u registry gitlab-ctl registry-database migrate up --skip-post-deployment
As an alternative to the --skip-post-deployment
flag, you can also set the SKIP_POST_DEPLOYMENT_MIGRATIONS
environment variable to true
:
SKIP_POST_DEPLOYMENT_MIGRATIONS=true sudo -u registry gitlab-ctl registry-database migrate up
After starting the application, apply any pending post-deployment migrations:
sudo -u registry gitlab-ctl registry-database migrate up
The migrate up
command offers some extra flags that can be used to control how the migrations are applied. Run sudo gitlab-ctl registry-database migrate up --help
for details.
The initial runs of online garbage collection following the import process varies in duration based on the number of imported images. You should monitor the efficiency and health of your online garbage collection during this period.
Monitor database performanceAfter completing an import, expect the database to experience a period of high load as the garbage collection queues drain. This high load is caused by a high number of individual database calls from the online garbage collector processing the queued tasks.
Regularly check PostgreSQL and registry logs for any errors or warnings. In the registry logs, pay special attention to logs filtered by component=registry.gc.*
.
Use monitoring tools like Prometheus and Grafana to visualize and track garbage collection metrics, focusing on metrics with a prefix of registry_gc_*
. These include the number of objects marked for deletion, objects successfully deleted, run intervals, and durations. See enable the registry debug server for how to enable Prometheus.
Check the size of the queues by counting the rows in the gc_blob_review_queue
and gc_manifest_review_queue
tables. Large queues are expected initially, with the number of rows proportional to the number of imported blobs and manifests. The queues should reduce over time, indicating that garbage collection is successfully reviewing jobs.
SELECT COUNT(*) FROM gc_blob_review_queue;
SELECT COUNT(*) FROM gc_manifest_review_queue;
Interpreting Queue Sizes:
Shrinking queues: Indicate garbage collection is successfully processing tasks.
Near-Zero gc_manifest_review_queue
: Most images flagged for potential deletion have been reviewed and classified either as still in use or removed.
Overdue Tasks: Check for overdue GC tasks by running the following queries:
SELECT COUNT(*) FROM gc_blob_review_queue WHERE review_after < NOW();
SELECT COUNT(*) FROM gc_manifest_review_queue WHERE review_after < NOW();
A high number of overdue tasks indicates a problem. Large queue sizes are not concerning as long as they are decreasing over time and the number of overdue tasks is close to zero. A high number of overdue tasks should prompt an urgent inspection of logs.
Check GC logs for messages indicating that blobs are still in use, for example msg=the blob is not dangling
, which implies they will not be deleted.
If the size of your gc_blob_review_queue
is high, and you want to increase the frequency between the garbage collection blob or manifest worker runs, update your interval configuration from the default (5s
) to 1s
:
registry['gc'] = {
'blobs' => {
'interval' => '1s'
},
'manifests' => {
'interval' => '1s'
}
}
After the import load has been cleared, you should fine-tune these settings for the long term to avoid unnecessary CPU load on the database and registry instances. You can gradually increase the interval to a value that balances performance and resource usage.
Validate data consistencyTo ensure data consistency after the import, use the crane validate
tool. This tool checks that all image layers and manifests in your container registry are accessible and correctly linked. By running crane validate
, you confirm that the images in your registry are complete and accessible, ensuring a successful import.
If most of your images are tagged, garbage collection won’t significantly reduce storage space because it only deletes untagged images.
Implement cleanup policies to remove unneeded tags, which eventually causes images to be removed through garbage collection and storage space being recovered.
Using an external databaseBy default, GitLab 18.3 and later preprovisions a logical database within the main GitLab database for container registry metadata. However, you may want to use a dedicated external database for the container registry if you want to scale your registry.
StepsAfterward, follow the same steps for the default database, substituting your own database values. Start with the database disabled, taking care to enable and disable the database as instructed:
registry['database'] = {
'enabled' => false,
'host' => '<registry_database_host_placeholder_change_me>',
'port' => 5432, # Default, but set to the port of your database instance if it differs.
'user' => '<registry_database_username_placeholder_change_me>',
'password' => '<registry_database_placeholder_change_me>',
'dbname' => '<registry_database_name_placeholder_change_me>',
'sslmode' => 'require', # See the PostgreSQL documentation for additional information https://www.postgresql.org/docs/16/libpq-ssl.html.
'sslcert' => '</path/to/cert.pem>',
'sslkey' => '</path/to/private.key>',
'sslrootcert' => '</path/to/ca.pem>'
}
When using an external database, omit the -u registry
option from the commands throughout this documentation.
If you have configured your own database for container registry metadata, you must manage backups manually. gitlab-backup
does not backup the metadata database. For progress on automatic database backups see issue 532507.
When the metadata database is enabled, backups must capture both the object storage used by the registry, as before, but also the database. Backups of object storage and the database should be coordinated to capture the state of the registry as close as possible to each other. To restore the registry, you must apply both backups together.
Downgrade a registryTo downgrade the registry to a previous version after the import is complete, you must restore to a backup of the desired version in order to downgrade.
Database architecture with GeoWhen using GitLab Geo with the container registry, you must configure separate database and object storage stacks for the registry at each site. Geo replication to the container registry uses events generated from registry notifications, rather than by database replication.
PrerequisitesEach Geo site requires a separate, site-specific:
This diagram illustrates the data flow and basic architecture:
flowchart TB subgraph "Primary site" P_Rails[GitLab Rails] P_Reg[Container registry] P_RegDB[(Registry database)] P_Obj[(Object storage)] P_Reg --> P_RegDB P_RegDB --> P_Obj end subgraph "Secondary site" S_Rails[GitLab Rails] S_Reg[Container registry] S_RegDB[(Registry database)] S_Obj[(Object storage)] S_Reg --> S_RegDB S_RegDB --> S_Obj end P_Reg -- "Notifications" --> P_Rails P_Rails -- "Events" --> S_Rails S_Rails --> S_Reg classDef primary fill:#d1f7c4 classDef secondary fill:#b8d4ff class P_Rails,P_Reg,P_MainDB,P_RegDB,P_Obj primary class S_Rails,S_Reg,S_MainDB,S_RegDB,S_Obj secondary
Use separate database instances on each site because:
You can revert your registry to use object storage metadata after completing a metadata import.
When you revert to object storage metadata, any container images, tags, or repositories added or deleted between the import completion and this revert operation are not available.
To revert to object storage metadata:
Restore a backup taken before the migration.
Add the following configuration to your /etc/gitlab/gitlab.rb
file:
registry['database'] = {
'enabled' => false,
}
Save the file and reconfigure GitLab.
there are pending database migrations
If the registry has been updated and there are pending schema migrations, the registry fails to start with the following error message:
FATA[0000] configuring application: there are pending database migrations, use the 'registry database migrate' CLI command to check and apply them
To fix this issue, follow the steps to apply database migrations.
Prior to version 18.3, you must manually apply database migrations on each version upgrade.
Error:offline garbage collection is no longer possible
If the registry uses the metadata database and you try to run offline garbage collection, the registry fails with the following error message:
ERRO[0000] this filesystem is managed by the metadata database, and offline garbage collection is no longer possible, if you are not using the database anymore, remove the file at the lock_path in this log message lock_path=/docker/registry/lockfiles/database-in-use
You must either:
lock_path
shown in the error message. For example, remove the /docker/registry/lockfiles/database-in-use
file.cannot execute <STATEMENT> in a read-only transaction
The registry could fail to apply database migrations with the following error message:
err="ERROR: cannot execute CREATE TABLE in a read-only transaction (SQLSTATE 25006)"
Also, the registry could fail with the following error message if you try to run online garbage collection:
error="processing task: fetching next GC blob task: scanning GC blob task: ERROR: cannot execute SELECT FOR UPDATE in a read-only transaction (SQLSTATE 25006)"
You must verify that read-only transactions are disabled by checking the values of default_transaction_read_only
and transaction_read_only
in the PostgreSQL console. For example:
# SHOW default_transaction_read_only;
default_transaction_read_only
-------------------------------
on
(1 row)
# SHOW transaction_read_only;
transaction_read_only
-----------------------
on
(1 row)
If either of these values is set to on
, you must disable it:
Edit your postgresql.conf
and set the following value:
default_transaction_read_only=off
Restart your Postgres server to apply these settings.
Try to apply database migrations again, if applicable.
Restart the registry sudo gitlab-ctl restart registry
.
cannot import all repositories while the tags table has entries
If you try to import existing registry metadata and encounter the following error:
ERRO[0000] cannot import all repositories while the tags table has entries, you must truncate the table manually before retrying,
see https://docs.gitlab.com/ee/administration/packages/container_registry_metadata_database.html#troubleshooting
common_blobs=true dry_run=false error="tags table is not empty"
This error happens when there are existing entries in the tags
table of the registry database, which can happen if you:
To resolve this issue, you must delete the existing entries in the tags table. You must truncate the table manually on your PostgreSQL instance:
Edit /etc/gitlab/gitlab.rb
and ensure the metadata database is disabled:
registry['database'] = {
'enabled' => false,
}
Connect to your registry database using a PostgreSQL client.
Truncate the tags
table to remove all existing entries:
TRUNCATE TABLE tags RESTART IDENTITY CASCADE;
After truncating the tags
table, try running the import process again.
database-in-use lockfile exists
If you try to import existing registry metadata and encounter the following error:
| [0s] step two: import tags failed to import metadata: importing all repositories: 1 error occurred:
* could not restore lockfiles: database-in-use lockfile exists
This error means that you have previously imported the registry and completed importing all repository data (step two) and the database-in-use
exists in the registry file system. You should not run the importer again if you encounter this issue.
If you must proceed, you must delete the database-in-use
lock file manually from the file system. The file is located at /path/to/rootdirectory/docker/registry/lockfiles/database-in-use
.
pre importing all repositories: AccessDenied:
You might receive an AccessDenied
error when importing existing registries and using AWS S3 as your storage backend:
/opt/gitlab/embedded/bin/registry database import --step-one /var/opt/gitlab/registry/config.yml
[0s] step one: import manifests
[0s] step one: import manifests failed to import metadata: pre importing all repositories: AccessDenied: Access Denied
Ensure that the user executing the command has the correct permission scopes.
Registry fails to start due to metadata management issuesThe registry could fail to start with of the following errors:
Error:registry filesystem metadata in use, please import data before enabling the database
This error happens when the database is enabled in your configuration registry['database'] = { 'enabled' => true}
but you have not imported existing registry metadata to the metadata database yet.
registry metadata database in use, please enable the database
This error happens when you have completed the import of existing registry metadata to the metadata database, but you have not enabled the database in your configuration.
Problems checking or creating the lock filesIf you encounter any of the following errors:
could not check if filesystem metadata is locked
could not check if database metadata is locked
failed to mark filesystem for database only usage
failed to mark filesystem only usage
The registry cannot access the configured rootdirectory
. This error is unlikely to happen if you had a working registry previously. Review the error logs for any misconfiguration issues.
By default, the online garbage collector will only start deleting unreferenced layers 48 hours from the time that all tags they were associated with were deleted. This delay ensures that the garbage collector does not interfere with long-running or interrupted image pushes, as layers are pushed to the registry before they are associated with an image and tag.
Error:permission denied for schema public (SQLSTATE 42501)
During a registry migration, you might get one of the following errors:
ERROR: permission denied for schema public (SQLSTATE 42501)
ERROR: relation "public.blobs" does not exist (SQLSTATE 42P01)
These types of errors are due to a change in PostgreSQL 15+, which removes the default CREATE privileges on the public schema for security reasons. By default, only database owners can create objects in the public schema in PostgreSQL 15+.
To resolve the error, run the following command to give a registry user owner privileges of the registry database:
ALTER DATABASE <registry_database_name> OWNER TO <registry_user>;
This gives the registry user the necessary permissions to create tables and run migrations successfully.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4