Running our Docker registry on-prem with Harbor(dev.37signals.com)
149 points byairblade4 days ago |15 comments
lijok22 hours ago
We self-host Harbor as well, it’s fairly painless. Has SSO out of the box, a Terraform provider that covers everything, and for the most part just works.

The issues we’ve had so far:

- No programmatic way to retrieve your token that’s required for ‘docker login’. So we had to create a robot account per user and pop their creds into our secrets store.

- Migrating between sites by cloning the underlying S3 bucket and spinning up the new Harbor instance on top of it, does not work. Weird issues with dropping pulls.

- RBAC goes down to project, not repository level, complicating some of our SDLC controls.

- CSRF errors every time you try to do anything in the UI

- Lenient API and lack of docs means things like setting up tag immutability rules via Terraform was a bit of a PITA to figure out the right syntax

So some small issues, but definitely a great piece of software.

tedivm19 hours ago
The lack of OIDC support for Harbor has been the biggest annoyance for me. I'd love to be able to push from Github Actions to Harbor without needing robot users.
mdaniel9 hours ago
I was shocked to read such a thing in 2025 but either there is some nuance to your observation or your information is outdated https://goharbor.io/docs/2.13.0/administration/#:~:text=or%2...
delusional21 hours ago
What the upgrade story like? Their official website makes it sound like a pain (stopping the software, backing up the database, changing the settings syntax, running some installer). I would expect something built for kubernetes to just do the right thing on startup (such that upgrading is simply switching out the image).
yorwba15 hours ago
I upgraded Harbor before, it was a pain. I think you're encouraged to use their official Helm chart and then it's supposed to be fairly seamless https://goharbor.io/docs/2.13.0/administration/upgrade/helm-... but if your predecessor decided against that option, separately adjusting the configuration for all the moving pieces is fairly annoying. Also, I misconfigured something and ended having to read Harbor source code because the error messages weren't very helpful. Fortunately, I had the presence of mind to first practice on a secondary installation created from a backup. It's definitely not something where you can stop production, install the update, and expect it to come back up in working order.
fastest9631 day ago
Why does the Harbor VM need 32 cores and 64GB of RAM? Especially if it's only serving 32,000 pulls over 2 months.
Symbiote19 hours ago
For what it's worth, I have an on-prem Nexus server with a Docker repository. It has 8 cores and 16GB RAM. It has 82000 hits/day in the webserver log, though 99.9% of them transfer only a few kB, so I assume it's a metadata check and the client already has the correct version.

The same Nexus is also hosting our Maven and NodeJS repositories. That has 1,800,000 hits per day, although all but 120,000 of them return HTTP 404. (I think one of our clients has misconfigured their build server to use our Maven repository as a mirror of Maven Central, but as it's just an AWS IP I don't know who it is.)

I'm sure it's overprovisioned, but the marginal cost of 2, 4 or 8 cores and 4, 8 or 16GB RAM isn't much when we buy our own hardware.

nchmy10 hours ago
> the marginal cost of 2, 4 or 8 cores and 4, 8 or 16GB RAM isn't much when we buy our own hardware

this is the crux of it all. RENTING bare metal (eg from hetzner) is 10x cheaper than aws ec2. So, I can only imagine how much cheaper it is when you buy the hardware directly.

nchmy1 day ago
It does seem like a lot. Though, it's also a rounding error for them. It is probably sized to optimize for something else than just $
maratc23 hours ago
FWIW,

   > During this time, Harbor has served more than 32,000 pulls under company-wide use in day-to-day business.
It is possible to read this as the "32,000 pulls" is a daily number, not a total one.
marginalia_nu21 hours ago
Even if it is a daily number, it's not very much. There are 86,400 seconds in a day. Even limiting the time to an 8 hour business day, this is only around 1 pull per second.
mystifyingpoi19 hours ago
> Why does the Harbor VM need ...

They never say that it needs these resources, they say that the current VM has this config. Probably overkill by 1000%.

01HNNWZ0MV43FF1 day ago
I want something like "This could have been an email" but "This could have been a Caddy instance and static files"

Hell Git doesn't even need the Git protocol if you do `update-server-info`

mcpherrinm1 day ago
It does seem mostly possible to host a Docker registry with static files and a bit of config:

https://github.com/jpetazzo/registrish

I haven’t tried running this yet, but it seems worth keeping in mind. It’s relatively simple software so the idea could probably be pretty easily adapted to other situations.

arccy22 hours ago
It's certainly possible with s3, so probably for any other static host https://news.ycombinator.com/item?id=40942732
adolph17 hours ago
I recall mentioned here ttl.sh, which as I looked it up [0], uses through Docker a CNCF project called Distribution Registry [1] which implements the core container registry functions (and appears to have additional utility, like being a pull-through cache).

0. https://github.com/replicatedhq/ttl.sh/blob/main/registry/en...

1. https://distribution.github.io/distribution/

nodesocket1 day ago
Agree that seems insanely inefficient. That's less than a pull a minute.
CBLT1 day ago
I also run Harbor. I use the official Helm chart; it's a little jank, doesn't support a couple of things we want. It only works with one of ArgoCD/ExternalSecretsOperator, and it doesn't support Redis TLS.

Contrary to the author of this post, we just run one (the "source of truth") and use caching proxies in other regions. Works fine for us.

BlackjackCF1 day ago
What’s jank about it?
CBLT1 day ago
I mentioned two things that were broken:

1. Doesn't work with ExternalSecretsOperator and ArgoCD, which I happen to use. This is because the author of the Harbor chart decided not to use k8s concepts like secretRef in a podTemplate. Instead, at Helm template time, it looks up the secret data and writes it into another secret, which is then included as a envFrom. This interacts poorly with ExternalSecretsOperator in general, because it breaks the lifecycle control that ESO has. It's completely broken with ArgoCD because ArgoCD disables secret lookups by charts for pretty valid security concerns. No other chart I've come across does secret lookups during helm template time. Even the helm docs tell you it's not correct.

2. Harbor requires redis, but the Helm chart doesn't correctly pipe in the connection configuration. Redis can't be behind TLS, or the chart won't work.

dwroberts1 day ago
You could always put the helm chart in a Kustomize and change the things you don’t like.

—-enable-helm isn't supported everywhere but Argo definitely allows it

lijok22 hours ago
We just went through this whole Kustomize shenanigan in our company. Seems completely asinine. Why not just fork the chart, fix it yourself?
p_l21 hours ago
... or the quite common case, make helm write the template once, fix, port to your own process, delete helm, live happy
MPSimmons16 hours ago
Is there no Argo plugin for your secret store? In a previous life, we used Argo Vault Plugin to good effect.
denysvitali1 day ago
I'm confused on why they decided to populate the cache by replicating the entirety of Docker Hub instead of using a sort of cache that gets populated on the first pull
justincormack1 day ago
That was just confusing but it seems like it was 80 repos, all their stuff on Docker Hub not all of Docker Hub.
Loic1 day ago
Because they have money to burn?
nickjj21 hours ago
> pulling and pushing our images over the internet dozens of times a day caused us to hit the contracted bandwidth limit with our datacenter provider Deft repeatedly

I wonder what they were doing that resulted in blowing out their Docker layer cache on every pull and push.

Normally only a layer diff would be sent over the wire, such as a code change that didn't change your dependencies.

prmoustache15 hours ago
I'd rather have the agents prune their docker cache (or destroying and recreating agent) every night but it is not uncommon to see pipelines use the --no-cache option at every run to make sure they get the latest security updates.
tempest_17 hours ago
We run a docker registry on prem as a pull through cache (none of our containers are stored in there) to keep the rate limit reasonable.

It is pretty easy to just run the basic registry for this purpose.

We have a similar setup for NPM and Pypi on the same machine. It doesnt really need a lot of attention. Some upgrades every once and a while.

KronisLV20 hours ago
So what are the thoughts of folks who have used Nexus and moved to Harbor?

In my experience Nexus is a bit weird to administer and sometimes the Docker cleanup policies straight up don't work (junk left over in the blob stores even if you try to clean everything), but it also supports all sorts of other formats, such as repositories for Maven and NuGet. Kind of hungry in regards to resources, though.

mystifyingpoi19 hours ago
Nexus can be flaky, but it's pretty universal as you say. Harbor is a hard sell for me, since generally in any organization you'll need non-OCI artifact storage at some point, and maintaining 2 tools is always a pain.
firesteelrain19 hours ago
We run both Nexus and Harbor. I am about to dump Harbor because teams don’t use it and frankly Nexus provides the same functionality.
qmarchi1 day ago
Would be interested to see a cost breakdown for the ECR vs S3 and compute cost.
dwedge1 day ago
Unless I totally misread it, it's their own S3 cluster
nickjj21 hours ago
ECR is kind of hard to beat if you're ok with being in the cloud.

The last time I used it earlier this year for a company already on AWS, it was ~$3 / month per region to store 8 private repos and it was really painless to have a flexible and automated life cycle policy that deleted old image tags. It supports cross region replication too. All of that comes without maintenance or compute costs and if you're already familiar with Terraform, etc. you can automate all of that in a few hours of dev time.

o_m19 hours ago
Naive question: why not put the effort into building the RoR apps into a binary and run the all services with systemd? No need to deal with Docker and the entire ecosystem around it
muhehe1 day ago
This looks nice. What would be good on-prem S3 companion for this? I know if minio but I think there was some recent drama about it (I don't know specifics, just a feeling)
Jedd9 hours ago
Do you actually need S3-alike?

I run distribution [0] / registry [1] as a docker (via Nomad) job, and it just uses a shared nfs mount in my cluster - ie. EXT4 FS underneath.

Currently has 12GB and 52 repositories, and is very performant. It's just a file server.

Unless your size requirements are huge, the complexity of having your registry rely on a self-hosted S3-alike sounds like a lot of pain for future-muhehe to contend with if / when the S3-alike hiccups.

[0] https://github.com/distribution/distribution

[1] https://github.com/Joxit/docker-registry-ui

muhehe1 hour ago
For image registry...probably not that much. But it is quite common for other software, often those that target containers/k8s/... I already have few of those and that would be quite handy to have some good local s3.
redblueflame1 day ago
If you want to have replication built in, you can give https://garagehq.deuxfleurs.fr/ a try
mdaniel9 hours ago
Just make sure the AGPLv3 is compatible with your policies https://git.deuxfleurs.fr/Deuxfleurs/garage/src/tag/v2.0.0/L...
muhehe1 day ago
Thanks, that looks good. Do you have some real experience with this in production?
arccy22 hours ago
mdaniel9 hours ago
https://github.com/seaweedfs/seaweedfs#compared-to-other-fil... is handy, and I like that they support "sane" metadata stores and don't just do something dumb like make me run etcd
phireal1 day ago
Minio used to be de facto here, but they did a bait and switch recently and removed the UI from the free version. Garage is probably closest to best in class for open source on prem.
Jedd9 hours ago
Does garage-dev have a GUI? I thought it did not.

I'm using it in my lab, along with an older instance of minio, and both are excellent choices I think. (I'm running both as HA jobs within a Hashicorp Nomad cluster, which complicates / eases various things.)

I had a vague memory of minio losing some favour a while back because they switched their underlying storage from basic object : normal file mapping to something more complex. A lot of home users, and I guess developers, liked the ability to navigate their S3-esque buckets via normal linux file system tooling.

muhehe15 hours ago
But isn't it still available separately?

https://github.com/minio/object-browser?tab=readme-ov-file

stephenlf1 day ago
The article mentions Pure Flashblade. Looks like dedicated hardware. https://www.purestorage.com/products/unstructured-data-stora...
muhehe1 day ago
Yes, but I'd rather some self hosted software solution
opless23 hours ago
Not S3, but I use longhorn to store persistent data on my clusters.

Sometimes you'll need admin skills, but only if you spread your cluster out over availability zones or poor connections

AtomicOrbital1 day ago
harbor is great ... simple to install ... it's the only container registry I ever use
fuomag91 day ago
And in my experience is the only one that has RBAC and can be deployed on premise and that actually works, I’ve tried everything at this point
kirici22 hours ago
I am currently looking into zot, what were your blockers/hiccups with it?
tetha21 hours ago
When we looked at modernizing our image hosting, it came down to Zot vs Harbor, and we preferred Zot as it looked easier to deploy. Just a go binary with a few environment variables connecting to our minio, what could be easier?

However, when getting the config prod-ready, we started to trip over one thing after the other. First, my colleague was struggling to get the scale-out clustering to work in our container management. Right, use the other deployment way for HA. Then we found that apparently, if you enable OIDC, all other authentication methods get deactivated, so suddenly container hosts would have to login with tokens... somehow? And better hope your OIDC provider never goes down. And then we found a bug on top that Zot possibly doesn't remove blobs from minio during GC.

At that point we reconsidered and went with Harbor.

cyberpunk23 hours ago
? GitLab?
silverwind1 day ago
for simple use cases, the official registry is good enough too
hn_throw20251 day ago
If you use paid S3 as the storage layer, then you want to control size.

With the self hosted official registry, the stop-GC-restart process is a PITA.

phillebaba20 hours ago
I am not to familiar with Kamal but it seems possible to integrate it with my project Spegel to remove some of the load from upstream. Especially if they are running clusters of servers physically located close to each other they could avoid some of the replication complexity with multiple Harbor instances.
reilly30001 day ago
I would have expected that they also started saving on bandwidth, although they still have to pay for intra-regional transfer.
easton1 day ago
Do they? If all this is in their DC then it’s going over their wires, unless their colo provider somehow had visibility into their traffic (which I’d guess they don’t).
E39M5S621 day ago
It's in Deft's ORD and IAD data centers, using their network for ingress/egress. Still has to go over transit between those two locations.
reactordev20 hours ago
But that might be baked into their enterprise pricing. Since it’s still “within” Deft. Site to site is common.
E39M5S6217 hours ago
It's not within Deft because they rely on transit between ORD and IAD. That was the case a few years ago when I worked there, it's probably still the same.
branon16 hours ago
> our new on-premise registry

This is incorrect, the word you are looking for here is "on-premises" - a "premise" is something entirely different.

inglor_cz19 hours ago
We run our own Docker registry on-prem with Harbor as well.

One issue to solve is auto-deletion of old images, so that the storage does not swell. Any tips?