Image Overview: harbor-db

Overview: harbor-db Chainguard Image

A Wolf-based image for Harbor - an open-source container registry with policies and RBAC, vulnerability scans, and provides trusted image signing.

Download this Image

The image is available on

docker pull

Deploying Harbor with Helm

The easiest way to get up and running with Chainguard’s Harbor images is via deployment with Harbor’s official Helm chart.

To get started, we need to add Harbor’s Helm repository:

helm repo add harbor

Now that we’ve added the repository, we can deploy Harbor!:

helm install harbor harbor/harbor \
  --set,core.image.tag=latest \
  --set,database.internal.image.tag=latest \
  --set,jobservice.image.tag=latest \
  --set,portal.image.tag=latest \
  --set,registry.registry.image.tag=latest \
  --set,registry.registryctl.image.tag=latest \

You will need to override the image and tag values for each image like we’ve done here to point to Chainguard’s Harbor images and tags.

Also, please note that in a production environment, you’ll likely want to use an external database instead of the one provided with Harbor. Additional information on how to configure an external database may be found in Harbor’s Helm documentation found here.

Additionally, you may fetch Harbor’s Helm chart after adding the repository and edit values directly without overriding them on installation:

helm fetch harbor/harbor --untar

Afterwards, edit values.yml and substitute in Chainguard’s images/tags. For instance, for harbor-core, the following changes should be made:

  tag: latest

And then deploy after configuration:

helm install harbor .

For more information on deploying Harbor via Helm, see the official documentation here.

Deploying Harbor with Docker Compose

Harbor provides an online installer that can be retrieved from their releases on GitHub here.

Follow all of their steps for installation up until you’ve successfully generated your docker-compose.yml. At this point, you can swap the upstream images out for Chainguard’s.

For instance, to switch out harbor-core with Chainguard’s image, edit docker-compose.yml and make the following change:


Then run the following in the terminal:

docker-compose up

Now you’re up and running with Harbor powered by Chainguard images!


Now that you’ve deployed Harbor, the portal should be accessible on whatever host you’ve opted to use. For example, if configured to use localhost, the portal will be accessible at localhost:80 via HTTP or localhost:443 via HTTPS, if setup.

You may now login with the username and password you’ve set or via the default username and password, admin and Harbor12345. You’ll be presented with several options, including the ability to create a new project in the registry.

Additionally, you can now login to the registry with Docker! To do so, open a terminal and run:

docker login localhost

Where localhost should be substituted with the hostname or external URL you’ve chosen for Harbor.

Now let’s push an image using Chainguard’s base container for Wolfi!

Pull Wolfi:

docker pull

Tag Wolfi using the registry and project path (library is created by default):

docker tag locahost/library/wolfi-base:latest

And finally, push Wolfi to the registry!:

docker push localhost/library/wolfi-base:latest

Wolfi is now being pushed to the registry and will be viewable in the portal.

Last updated: 2024-04-30 00:52