Tencent Container Registry (TCR) is a container image cloud hosting service provided by Tencent Cloud. It has the following features:
Cloud native artifacts hosting: TCR supports the hosting of multi-architecture container images, such as Linux, Windows, ARM, etc. It also supports the management of Helm Chart v2/v3 and other cloud native artifacts that meet the OCI specifications.
Multi-dimensional security protection: TCR supports the encryption and storage of image data. It can perform image security scanning and block the high-risk image deployment. It also supports the network access control. It provides fine-grained permission management and operation audit to ensure the compliance of the business data operations.
Multi-regional fast distribution: TCR supports on-demand synchronization in global multi-region and fast image replication in domestic multi-region, implementing the image pulling from the nearest region. It supports P2P accelerated distribution and on-demand image mounting, significantly reducing the image pulling time for large-scale clusters, and ensuring the quick deployment and update of services.
Container DevSecOps: TCR is closely integrated with other products such as CODING DevOps and TKE. It provide delivery assembly line. With simple configuration, the code updates can automatically trigger image building, image scanning, and then update container applications, improving the delivery efficiency of enterprise cloud native applications, and ensuring the business safety.
With the TCR service, you can enjoy secure and efficient image hosting and distribution services in the cloud, without building or maintaining the image hosting service. In addition, you can use TCR together with Tencent Kubernetes Engine to smoothly deploy containers in the cloud.
TCR provides the Enterprise Edition and Personal Edition:
TCR Enterprise Edition provides an enterprise-class, exclusive, and secure image hosting service. It is suitable for individual or enterprise users who need to use the hosting service of cloud native artifacts in their businesses. TCR supports the preceding features and is constantly updated. TCR Enterprise Edition currently supports pay-as-you-go billing mode.
TCR Personal Edition provides basic on-cloud image hosting and distribution services. With limited usage quotas, it is only applicable to temporary R&D process testing of individual or enterprise users. TCR Personal Edition is a shared service in the cloud. That is, all TCR Personal Edition users share the service backend and data storage, and quotas are imposed on image hosting, uploading, and downloading. TCR Personal Edition is free of charge. You can start using it directly .
The TCR specifications are as follows (✓: supported; -: not supported).
NoteWhen the instance is using the features of Standard Edition or Advanced Edition, it is not allowed to degrade the instance specifications to editions which do not support the features. If you want to degrade the specifications, please delete related feature configurations manually first.
Feature Module | Features | TCR Individual | TCR Enterprise | ||
---|---|---|---|---|---|
Basic | Standard | Advanced | |||
Service guarantee | SLA | Not supported | 99.9% (compensation supported) | 99.9% (compensation supported) | 99.9% (compensation supported) |
Instance management | Dedicated registry service | - | ✓ | ✓ | ✓ |
Dedicated domain name access | - | ✓ | ✓ | ✓ | |
Custom access domain name | - | ✓ | ✓ | ✓ | |
Dedicated data storage backend | - | ✓ | ✓ | ✓ | |
Temporary/long-term access credential management | - | ✓ | ✓ | ✓ | |
Repository management | Multi-level repository directory | - | ✓ | ✓ | ✓ |
Helm chart hosting | - | ✓ | ✓ | ✓ | |
Namespace quota | 10 | 50 | 100 | 500 Submit a ticket to increase the quota. |
|
Image repository quota | Guangzhou region: 500, Other regions: 100 | 1000 | 3000 | 5000 Submit a ticket to increase the quota. |
|
Helm repository quota | - | 1000 | 3000 | 5000 Submit a ticket to increase the quota. |
|
Data security | Encrypted storage of data | - | ✓ | ✓ | ✓ |
Image vulnerability scanning | - | ✓ | ✓ | ✓ | |
Block Vulnerable Images | - | - | ✓ | ✓ | |
Image tag protection | - | ✓ | ✓ | ✓ | |
Public network access control | - | ✓ | ✓ | ✓ | |
VPC access control | - | ✓ | ✓ | ✓ | |
VPC access quota | - | 5 | 10 | 20 | |
Operation log retention | - | 7 days | 15 days | 30 days | |
Synchronous backup | Multi-region replications for single instance and nearby access | - | - | - | ✓ |
Cross-instance custom synchronization rules | - | - | ✓ | ✓ | |
Multi-AZ disaster recovery in the same city | - | ✓ | ✓ | ✓ | |
Container DevOps | |||||
Webhook trigger | - | ✓ | ✓ | ✓ | |
Container image compilation and building * | ✓ | ✓ | ✓ | ✓ | |
Cloud native delivery workflow | ✓ | ✓ | ✓ | ✓ | |
P2P accelerated distribution of images | ✓ | ✓ | ✓ | ✓ |
Note:Container image compilation and building feature is based on CODING DevOps service and provides free usage quota. If you need advanced features or want to add quota, please go to CODING DevOps service.
The Personal Edition service is provided for individual developers. The free usage quota is limited. SLA commitments and relevant compensation are not provided.
Was this page helpful?