►
From YouTube: Quay Operator Setup
Description
Quay Operator Setup
Simplifing the Installation and Configuration of Red Hat Quay on OpenShift
Additional Resources:
https://github.com/redhat-cop/quay-operator
https://projectquay.io
A
It
also
allows
you
to
provide
custom
certificates
for
both
Quay
and
Claire
to
ensure
secure
communication,
as
well
as
the
ability
to
leverage
different
storage
backends,
either
through
local
directory
mounts
or
as
required,
in
a
production
step
through
object
storage,
as
well
as
creating
externalized
routes,
with
an
open
shift
to
an
extent
to
enable
access
to
the
user,
interface
and
back-end
storage
for
our
demo.
Today,
we're
going
to
showcase
how
to
deploy
and
see
the
integration
between
Red,
Hat,
Quay
and
Claire,
using
only
a
few
steps
to
streamline
the
process.
A
A
A
A
By
default,
you're,
given
a
very
simplistic
example
for
which
you
can
deploy
Quay,
since,
if
you
also
want
to
deploy
Claire,
let's
go
ahead
and
modify
the
quay.
Echo
system
object.
As
you
see
here,
we've
added
a
little
bit
more
to
our
spec,
we're
specifying
that
we
want
to
deploy
Quay
and
utilize.
The
Red
Hat
pull
secret
that
we
created
in
a
prior
step.
A
Let's
go
ahead
and
create
a
new
repository
for
an
image
that
we're
going
to
push
to
Quay
we're
going
to
go
ahead
and
deploy
the
universal
base.
Image
version
7,
so
ubi
7
is
what
we'll
call
it
will
create
the
repository
we
can
then
use
the
scope,
yo
command
to
go
in
and
deploy
or
pardon
me
copy.
The
registry
or
the
image
to
the
registry.
A
With
the
image
now
pushed
successfully,
let's
refresh
the
page
go
to
our
tags,
we'll
see.
We
now
have
a
new
tag
called
latest.
We
are
going
to
give
it
a
moment
and
in
a
second,
our
security
scan
over
here
will
go
in
and
complete.
This
is
Claire
going
in
and
scanning
our
image
for
any
vulnerabilities.
A
As
you
can
see,
our
security
scan
has
passed.
If
we
go
in
and
see
that
no
vulnerabilities
are
found,
we
can
see
all
the
different
packages
that
are
part
of
this
image
and
see
that
there
are
no
current
vulnerabilities,
ensuring
we
are
utilizing
a
secure
image
for
all
of
the
users
who
are
leveraging
our
image.