The Quay team at Red Hat is proud to announce that Red Hat Quay 3.5 is generally available as of today. The Quay 3.4 release was announced just back in February and we are looking to get a new Quay release into your hands every quarter. Here is what you can expect from Red Hat Quay 3.5:

FIPS Readiness and Compliance

A lot of customers in the public sector as well as other heavily regulated industries like banking or health care look at FIPS (Federal Information Processing Standard developed by the National Institute of Standards and Technology, NIST) as the gold standard for securing and encrypting sensitive data. Red Hat Enterprise Linux and Red Hat OpenShift Container Platform do support this standard by providing a FIPS mode in which the system would only allow usage of certain, FIPS-validated cryptographic modules, like openssl. This ensures FIPS compliance.

Red Hat Quay 3.5 now supports running on RHEL and OCP in FIPS mode in production. Furthermore, Quay itself also commits to exclusively using cryptography libraries that are validated or are in the process of being validated by NIST. Quay 3.5 has pending FIPS 140-2 validation based on the RHEL 8.3 cryptography libraries. As soon as that validation is finalized, Quay 3.5 is officially FIPS compliant.

Quay Observability through OpenShift Monitoring

Running Quay on OpenShift via the Operator brings many benefits. Scheduling and scaling decisions as well as configuration injection can be delegated to the lower Kubernetes layer while providing the administrator a clean control interface to deploy and manage their Quay registry via an API. Updates are fully automated and initiated by simply updating the Quay Operator.

But there is more: OpenShift ships with an onboard monitoring stack that is supported via the graphical OpenShift Console by an embedded dashboard. This is where you can observe the healthiness and performance of various OpenShift subsystems. The Quay Operators adds a Quay Dashboard there that allows administrators to track vital data about their Quay registry like the push and pull rates, API latency and the CPU utilization of various Quay sub processes to quickly spot bottlenecks and potential performance issues that may cause a degraded user experience.

pasted image 0 (12)

Also several statistics of your Quay registry like the amount of users, organizations or image repositories is captured. If you manage multiple Quay deployments via the Operator then you will get one dashboard per registry.

pasted image 0 (11)

Having visual observability of your registry is one further step into integration of Quay with OpenShift. You can expect more to happen in this space in the future, where we ship pre-configured alert thresholds so that OpenShift proactively warns administrators when certain metrics exceed well-known limits.

Helm Chart Support

Helm v3 supports delivering charts packaged via OCI images. The capability to store these images is already present in Quay but the necessary configuration flags to enable OCI support and accept the Helm image type were off by default and the feature was officially designated as Technology Preview. We are now transitioning this to general availability and the features flags are set to enabled by default.

You can learn more about how this feature works in this blog post.

Quay Operator managing custom TLS certificates

Quay 3.5 brings a lot of improvements to the Operator. A particular aspect of that is enabling deployments in environments where a certificate signing service like Let’s Encrypt is used to generate trusted TLS certificates. 

The Operator validates custom certificates and previously required cluster-internal domains to be part of the Subject Alternate Name (SAN) fields of the certificate to be set as well. Those domains cannot be validated by public services like Let’s Encrypt however and a certificate missing those domains would be rejected by the Operator. In 3.5 it is no longer required to provide a certificate with cluster internal domains in those fields and thus it should be easier to get trusted certificates from public or corporate-internal providers.

How to get Quay 3.5

Customers using the Quay Operator can easily update their existing 3.4 deployments by switching the channels on which the Operator is installed from, as explained in the previous blog post. The Operator automates all required update steps and only a minimal downtime is required. Customers deploying Quay manually can obtain the required container images from the Red Hat Container Catalog and follow the standalone upgrade instructions.


저자 소개

UI_Icon-Red_Hat-Close-A-Black-RGB

채널별 검색

automation icon

오토메이션

기술, 팀, 인프라를 위한 IT 자동화 최신 동향

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

open hybrid cloud icon

오픈 하이브리드 클라우드

하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Virtualization icon

가상화

온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래