Skip to content

Releases: jfrog/jfrog-registry-operator

jfrog-registry-operator-1.3.0

17 Jul 11:10
0fa5f53
Compare
Choose a tag to compare

JFrog Registry Operator 1.3.0 includes:

Added TLS support for jfrog-registry-operator.

  1. Enhanced security in the resource .security.enabled must be set to true if either custom certification or insecureSkipVerify is required.

Reference for tls security: here

    security:
      enabled: false
      secretNamespace:
      ## NOTE: You can provide either a ca.pem or ca.crt. But make sure that key needs to same as ca.crt or ca.pem in secret
      certificateSecretName:
      insecureSkipVerify: false

Sample certificate secret ref

  1. Added service monitor support. By default, it is set to false in values.yaml.
    This will be part of the Helm chart here
  serviceMonitor:
    enabled: false

To enable the service monitor, you need to configure the monitoring setup

jfrog-registry-operator-1.0.0

11 Dec 07:47
493a5d6
Compare
Choose a tag to compare

The integration of Assume Role and JFrog Access presents a powerful solution. By leveraging Assume Role, AWS Identity and Access Management (IAM) users can temporarily assume permissions to perform actions in a secure and controlled manner.

Furthermore, incorporating third-party tools like JFrog Artifactory into AWS environments, enables seamlessly pulling images from the JFrog Docker private registry, thereby tightenging access control mechanisms to ensure fluid integration that aligns with established industry practices.

Some of the key benefits of the AWS AssumeRole and JFrog Access solution includes:

Some of the key benefits of the AWS AssumeRole and JFrog Access solution includes:

  1. Automated Token Rotation: JFrog Access can now manage token rotation seamlessly within your EKS cluster. This eliminates the need for manual intervention, reducing the risk of unauthorized access due to neglected or forgotten credentials.

  2. Enhanced Security: With AssumeRole, you can enforce fine-grained access controls, ensuring that only authorized entities have access to your EKS cluster and JFrog Artifactory. This enhances security by minimizing the attack surface and adhering to the principle of least privilege.

  3. AWS Environment Integration: The integration of Assume Role and JFrog Access makes your Artifactory repository a first-class citizen in your AWS environment. This means that you can seamlessly fetch images from your Artifactory repository as if it were a native component of your EKS cluster.