You are viewing documentation for a release that is no longer maintained.
To view the documentation for the most recent version, see the
latest OKD docs
.
Documentation
OKD
latest
4.17
4.16
4.15
4.14
4.13
4.12
4.11
4.10
4.9
4.8
4.7
4.6
3.11
3.10
3.9
3.7
3.6
Using Images
Database Images
Overview
About
Welcome
What's New?
Overview
Applications
Cartridges Versus Images
Terminology
Getting Started
Overview
Web Console Walkthrough
Command-Line Walkthrough
Setting Up a Cluster
Architecture
Overview
Infrastructure Components
Kubernetes Infrastructure
Container Registry
Web Console
Core Concepts
Overview
Containers and Images
Pods and Services
Projects and Users
Builds and Image Streams
Deployments
Additional Concepts
Authentication
Authorization
Persistent Storage
Source Control Management
Admission Controllers
Other API Objects
Networking
Networking
OpenShift SDN
Network Plug-ins
Port Forwarding
Remote Commands
HAProxy Router Plug-in
Routes
Service Catalog Components
Service Catalog
Template Service Broker
Ansible Service Broker
Container Security Guide
Introduction
Container Hosts and Multi-tenancy
Container Content
Registries
Build Process
Deployment
Securing the Container Platform
Network Security
Attached Storage
Monitoring Events and Logs
Installation and Configuration
Overview
Installing a Cluster
Planning
Prerequisites
Host Preparation
Installing on Containerized Hosts
Quick Installation
Advanced Installation
Installing a Stand-alone Deployment of OpenShift Container Registry
Setting up the Registry
Registry Overview
Deploying a Registry on Existing Clusters
Accessing the Registry
Securing and Exposing the Registry
Extended Registry Configuration
Known Issues
Setting up a Router
Router Overview
Using the Default HAProxy Router
Deploying a Customized HAProxy Router
Configuring the HAProxy Router to Use the PROXY Protocol
Using the F5 Router Plug-in
Upgrading a Cluster
Overview
Automated In-place Upgrades
Manual In-place Upgrades
Blue-Green Deployments
Operating System Updates and Upgrades
Migrating etcd Data
Known Issues
Master and Node Configuration
Adding Hosts to an Existing Cluster
Loading the Default Image Streams and Templates
Configuring Custom Certificates
Redeploying Certificates
Configuring Authentication and User Agent
Syncing Groups With LDAP
Configuring LDAP failover
Configuring the SDN
Configuring Nuage SDN
Configuring for AWS
Configuring for OpenStack
Configuring for GCE
Configuring for Azure
Configuring for VMWare vSphere
Configuring Persistent Storage
Overview
Using NFS
Using GlusterFS
Using OpenStack Cinder
Using Ceph RBD
Using AWS Elastic Block Store
Using GCE Persistent Disk
Using iSCSI
Using Fibre Channel
Using Azure Disk
Using Azure File
Using FlexVolume
Using VMware vSphere volumes for persistent storage
Dynamic Provisioning and Creating Storage Classes
Volume Security
Selector-Label Volume Binding
Enabling Controller-managed Attachment and Detachment
Persistent Storage Examples
Overview
Sharing an NFS PV Across Two Pods
Using Ceph RBD for persistent storage
Using Ceph RBD for dynamic provisioning
Complete Example Using GlusterFS
Dynamic Provisioning Example Using Containerized GlusterFS
Dynamic Provisioning Example Using Dedicated GlusterFS
Containerized Heketi for Managing Dedicated GlusterFS
Mounting Volumes To Privileged Pods
Backing Docker Registry with GlusterFS Storage
Binding Persistent Volumes by Label
Using StorageClasses for Dynamic Provisioning
Using StorageClasses for Existing Legacy Storage
Configuring Azure Blob Storage for Integrated Docker Registry
Working with HTTP Proxies
Configuring Global Build Defaults and Overrides
Configuring Pipeline Execution
Configuring Route Timeouts
Configuring Native Container Routing
Routing from Edge Load Balancers
Aggregating Container Logs
Aggregate Logging Sizing Guidelines
Enabling Cluster Metrics
Customizing the Web Console
Deploying External Persistent Volume Provisioners
Cluster Administration
Overview
Managing Nodes
Managing Users
Managing Projects
Managing Pods
Managing Networking
Configuring Service Accounts
Managing Authorization Policies
Image Policy
Image Signatures
Scoped Tokens
Monitoring Images
Managing Security Context Constraints
Scheduling
Overview
Default Scheduling
Custom Scheduling
Controlling Pod Placement
Advanced Scheduling
Advanced Scheduling and Node Affinity
Advanced Scheduling and Pod Affinity/Anti-affinity
Advanced Scheduling and Node Selectors
Advanced Scheduling and Taints and Tolerations
Setting Quotas
Setting Multi-Project Quotas
Setting Limit Ranges
Pruning Objects
Garbage Collection
Allocating Node Resources
Opaque Integer Resources
Overcommitting
Assigning Unique External IPs for Ingress Traffic
Out of Resource Handling
Monitoring and Debugging Routers
High Availability
IPtables
Securing Builds by Strategy
Restricting Application Capabilities Using Seccomp
Sysctls
Encrypting Data at Datastore Layer
Encrypting Hosts with IPsec
Building Dependency Trees
Backup and Restore
Troubleshooting Networking
Diagnostics Tool
Idling Applications
Analyzing Cluster Capacity
Scaling and Performance Guide
Overview
Recommended Installation Practices
Recommended Host Practices
Optimizing Compute Resources
Optimizing Storage
Network Optimization
Routing Optimization
Scaling Cluster Metrics
CLI Reference
Overview
Get Started with the CLI
Managing CLI Profiles
Developer CLI Operations
Administrator CLI Operations
Developer Guide
Overview
Application Life Cycle Management
Planning Your Development Process
Creating New Applications
Promoting Applications Across Environments
Authentication
Authorization
Projects
Migrating Applications
Overview
Database Applications
Web Framework Applications
QuickStart Examples
Continuous Integration and Deployment
Webhooks and Action Hooks
S2I Tool
Support Guide
Tutorials
Overview
Quickstart Templates
Ruby on Rails
Setting Up a Nexus Mirror
Binary Builds
Builds
How Builds Work
Basic Build Operations
Build Inputs
Build Output
Build Strategy Options
Build Environment
Triggering Builds
Build Hooks
Build Run Policy
Advanced Build Operations
Troubleshooting
Deployments
How Deployments Work
Basic Deployment Operations
Deployment Strategies
Advanced Deployment Strategies
Kubernetes Deployments Support
Templates
Opening a Remote Shell to Containers
Service Accounts
Managing Images
Quotas and Limit Ranges
Injecting Information into Pods Using Pod Presets
Getting Traffic into a Cluster
Overview
Using a Router
Using a Load Balancer
Using a Service ExternalIP
Using a NodePort
Routes
Integrating External Services
Secrets
ConfigMaps
Downward API
Projected Volumes
Using Daemonsets
Pod Autoscaling
Managing Volumes
Using Persistent Volumes
Executing Remote Commands
Copying Files
Port Forwarding
Shared Memory
Application Health
Events
Managing Environment Variables
Jobs
Cron Jobs
Create from URL
Creating Images
Overview
Guidelines
Image Metadata
S2I Requirements
Testing S2I Images
Custom Builder
Using Images
Source-to-Image (S2I)
Overview
Java
Node.js
Perl
PHP
Python
Ruby
Customizing S2I Images
Database Images
Overview
MySQL
PostgreSQL
MongoDB
MariaDB
Docker Images
Overview
Other Images
Overview
Jenkins
REST API Reference
Overview
OpenShift v1
Kubernetes v1
×
Show more results
Overview
This topic group includes information on the different database images available for OKD users.