Alibaba Cloud Container Registry Tutorial: Architecture, Pricing, Use Cases, and Hands-On Guide for Container

Category

Container

1. Introduction

Alibaba Cloud Container Registry is a managed registry service for storing, managing, and distributing container images (and related artifacts, depending on edition/features enabled). It is the “source of truth” for what you deploy to runtimes such as Alibaba Cloud Container Service for Kubernetes (ACK), ECS-based Docker hosts, or hybrid/on-prem Kubernetes clusters.

In simple terms: you push images in, and your servers or Kubernetes clusters pull images out—securely, reliably, and with governance controls. Container Registry provides repositories, access control, and lifecycle tooling so teams can ship containers safely across dev/test/prod.

Technically, Container Registry implements a managed OCI/Docker Registry workflow: clients (Docker/BuildKit, CI systems) authenticate, push image layers and manifests, and consumers (Kubernetes nodes, ECS hosts, other CI jobs) pull images using the registry endpoints. Enterprise-grade usage typically adds isolation (instances/projects/namespaces), fine-grained IAM via RAM, network access controls, audit trails, and automation (webhooks/replication/build—availability varies by edition and region; verify in official docs).

What problem it solves: without a registry, teams struggle with inconsistent deployments, insecure image sharing, lack of provenance, and operational sprawl. Container Registry centralizes image distribution with authentication, access control, and operational tooling so your container platform can scale.

2. What is Container Registry?

Official purpose (Alibaba Cloud): Container Registry is Alibaba Cloud’s managed service to host and manage container images for application delivery and deployment. Product and documentation entry points:

  • Product page: https://www.alibabacloud.com/product/container-registry
  • Documentation: https://www.alibabacloud.com/help/en/container-registry

Core capabilities (high-level)

  • Private image repositories for teams and environments.
  • Image push/pull endpoints compatible with standard container tooling (Docker/OCI clients).
  • Access control integrated with Alibaba Cloud Resource Access Management (RAM).
  • Operational features such as lifecycle/retention and automation hooks (availability depends on edition/region; verify in official docs).

Major components (conceptual model)

While Alibaba Cloud’s UI terms can differ by edition, a typical Container Registry model includes:

  • Registry endpoint(s): the hostname your tools use for docker login, docker push, docker pull.
  • Namespace / Repository: logical grouping for images (for example: namespace/repository:tag).
  • Image / Tag / Digest:
  • Tag is a mutable pointer (commonly used like :v1.2.3, :latest).
  • Digest is the immutable content address (recommended for production pinning).
  • Credentials & authorization: registry password/token plus RAM policies (details depend on edition and authentication mode; verify in official docs).

Service type

  • Managed container image registry (a platform service for the Container category).

Scope: regional vs global (what to expect)

Container registries commonly have regional endpoints (because the storage and access path are region-bound for performance, cost, and compliance). In Alibaba Cloud, the exact scope and resource hierarchy can differ between Personal/Enterprise editions and between “classic registry” and “instance-based” models (if applicable in your account). Verify the specific regional endpoint format, instance model, and quotas in the official docs for your edition and region.

How it fits into the Alibaba Cloud ecosystem

Container Registry is usually deployed alongside:

  • ACK (Kubernetes): pull images for deployments/statefulsets/jobs.
    https://www.alibabacloud.com/product/kubernetes
  • ECS + Docker/containerd: run containers directly on VMs.
  • RAM: manage users/roles and least-privilege access.
    https://www.alibabacloud.com/help/en/ram
  • ActionTrail: audit API actions for governance and investigations.
    https://www.alibabacloud.com/help/en/actiontrail
  • CI/CD systems: Alibaba Cloud DevOps tooling or third-party CI pushing images after builds (GitHub Actions, GitLab CI, Jenkins).
  • Network services: VPC, NAT Gateway, PrivateLink/VPC endpoints (availability for Container Registry depends on region/edition; verify).
    PrivateLink product page: https://www.alibabacloud.com/product/privatelink

3. Why use Container Registry?

Business reasons

  • Faster releases with fewer defects: a single canonical image artifact avoids “works on my machine” drift.
  • Auditability and governance: centralized policy and logging improve compliance readiness.
  • Reduced operational overhead: no need to operate and patch self-managed registries.

Technical reasons

  • Standards-compatible workflows: Docker/OCI clients and Kubernetes can pull images from Container Registry.
  • Versioning and traceability: tags, digests, and repository structure provide repeatable deployments.
  • Integration with Alibaba Cloud services: common patterns with ACK/ECS and IAM (RAM).

Operational reasons

  • Access control at scale: manage access with RAM users/roles and repository permissions.
  • Lifecycle/retention management: control storage growth and remove obsolete tags (feature availability varies).
  • Automation: webhooks/replication/build integrations can reduce manual steps (verify availability).

Security/compliance reasons

  • Private repositories: reduce the risk of accidental public exposure.
  • Least privilege: grant only pull/push permissions where needed.
  • Audit trails: use ActionTrail for audit logs of API activity.
  • Image security practices: integrate image scanning and signing policies where supported (verify edition capabilities).

Scalability/performance reasons

  • Regional placement: keep images close to compute to reduce pull time and egress cost.
  • Team isolation: structured namespaces/projects reduce contention and mistakes.

When teams should choose Container Registry

  • You use ACK or any container runtime and want a managed registry.
  • You need private images for internal apps.
  • You need repeatable deployments across environments.
  • You need IAM-based access control and auditing aligned with Alibaba Cloud.

When teams should not choose it

  • You only deploy public open-source images and have no custom images.
  • Your organization mandates a single cross-cloud registry vendor (e.g., enterprise artifact platform) and you cannot operate multiple registries.
  • You require a specific feature (e.g., advanced artifact types, global multi-region active-active replication, mandatory signing enforcement) that Container Registry does not support in your edition/region—verify first.

4. Where is Container Registry used?

Industries

  • SaaS and internet companies shipping microservices frequently.
  • Financial services and regulated sectors needing controlled software supply chains.
  • Gaming and media workloads with bursty deployments and large image sizes.
  • Manufacturing/retail companies modernizing legacy apps into containers.

Team types

  • Platform engineering teams building internal developer platforms.
  • DevOps/SRE teams standardizing deployment pipelines.
  • Security teams implementing vulnerability management and access policies.
  • Application teams needing a reliable private image source.

Workloads

  • Microservices (REST, gRPC), APIs, background workers.
  • Batch processing jobs in Kubernetes.
  • AI/ML packaging (model servers, inference images—beware image size).
  • Edge or hybrid clusters that still pull from a central registry (consider network constraints).

Architectures

  • Single-cluster ACK deployments.
  • Multi-environment dev/test/prod with separate namespaces and permissions.
  • Multi-region systems with replicated repositories (if supported).
  • Hybrid: on-prem Kubernetes pulling from Alibaba Cloud over VPN/Express Connect (ensure bandwidth/latency planning).

Production vs dev/test usage

  • Dev/Test: fast iteration, frequent pushes, broad pull access; lifecycle cleanup is essential.
  • Production: strict permissions, immutable references (digests), controlled promotions, and audit requirements.

5. Top Use Cases and Scenarios

Below are realistic scenarios where Alibaba Cloud Container Registry fits well.

1) Central private image hub for ACK

  • Problem: Kubernetes nodes need a reliable private source for application images.
  • Why Container Registry fits: managed registry endpoints + IAM integration + predictable pull workflow.
  • Scenario: Platform team builds images in CI, pushes to Container Registry, ACK deploys from it using imagePullSecrets or RAM-linked credentials (depending on your cluster setup).

2) Multi-team separation with namespaces/projects

  • Problem: multiple teams overwrite each other’s tags or see each other’s images.
  • Why it fits: logical isolation by namespace/repository and permissions.
  • Scenario: team-a/* repos are writable only by Team A’s CI role; Team B has no access.

3) Environment promotion (dev → staging → prod)

  • Problem: “latest” tag leads to accidental production drift.
  • Why it fits: structured repos/tags and digest pinning.
  • Scenario: CI pushes app:1.7.3 to dev/app, then a controlled pipeline copies/promotes to prod/app:1.7.3 (promotion mechanics vary; verify best approach in your org).

4) Build once, deploy everywhere (ECS + ACK)

  • Problem: different runtime targets cause inconsistent builds.
  • Why it fits: same image artifact used across environments.
  • Scenario: A single image is pulled by ECS-hosted Docker in a legacy environment and by ACK in modern clusters.

5) Secure delivery for proprietary base images

  • Problem: internal base images (with agents, configs) must not leak publicly.
  • Why it fits: private repositories + access control.
  • Scenario: Security team maintains base-images/java17, application teams can only pull, not push.

6) CI/CD integration for automated builds and releases

  • Problem: manual docker builds are inconsistent and unaudited.
  • Why it fits: standard push/pull endpoints integrate with any CI.
  • Scenario: GitLab CI builds and pushes images; deployment pipeline pulls exact digest.

7) Vulnerability scanning workflow (where supported)

  • Problem: shipping images with known CVEs increases risk.
  • Why it fits: registry-centric scanning is a natural gate in the pipeline (capability depends on edition/region; verify).
  • Scenario: CI pushes image, scanner runs, release is blocked if severity thresholds exceed policy.

8) Cross-region disaster recovery for container artifacts

  • Problem: a regional incident blocks deployments.
  • Why it fits: replication/synchronization features (if supported) and multi-region registries.
  • Scenario: replicate prod/* repositories from Region A to Region B; DR cluster pulls locally.

9) Air-gapped-ish staging using controlled egress

  • Problem: clusters cannot pull from the public internet.
  • Why it fits: you can architect private connectivity (VPC endpoints/PrivateLink where supported; verify).
  • Scenario: ACK nodes pull from Container Registry via private networking to satisfy security constraints.

10) Internal “golden image” governance

  • Problem: developers use random public images with unknown provenance.
  • Why it fits: curated repos and controlled access.
  • Scenario: platform team publishes golden/nginx, golden/alpine, and enforces usage via admission policies in Kubernetes (policy enforcement is in Kubernetes, not the registry).

11) Migration from self-managed registry

  • Problem: Harbor/registry VM is hard to maintain and scale.
  • Why it fits: managed service reduces ops work and improves integration.
  • Scenario: Copy images from old registry to Container Registry; update deployments to pull from new endpoints.

12) Software vendor distribution to customers/partners (controlled)

  • Problem: you need to distribute images to external parties securely.
  • Why it fits: access-controlled repos and credential rotation.
  • Scenario: create partner-specific repos or credentials with limited scope; revoke when contract ends.

6. Core Features

Feature availability can vary by edition, region, and account type. Confirm in the official documentation for your specific setup: https://www.alibabacloud.com/help/en/container-registry

6.1 Repositories for container images

  • What it does: stores image manifests and layers under namespace/repository:tag.
  • Why it matters: central artifact source for deployments.
  • Practical benefit: repeatable releases; fewer “snowflake” servers.
  • Caveats: large layers can slow pushes/pulls; design images for caching and smaller size.

6.2 Namespaces / Projects (logical grouping)

  • What it does: groups repositories by team/app/domain.
  • Why it matters: prevents naming collisions and improves governance.
  • Practical benefit: consistent naming like org/team/app.
  • Caveats: naming rules and limits vary; verify character limits and immutability.

6.3 Access control and authentication (RAM integration)

  • What it does: controls who can pull/push/manage repositories using Alibaba Cloud identity.
  • Why it matters: prevents unauthorized access and supply chain tampering.
  • Practical benefit: least-privilege permissions for CI roles and runtime nodes.
  • Caveats: authentication methods differ across editions (account password/token vs instance-based credentials). Always follow current docs.

6.4 Public vs private repositories

  • What it does: lets you choose whether images are publicly pullable or require authentication.
  • Why it matters: reduces accidental leaks of proprietary code.
  • Practical benefit: keep internal images private; allow public distribution for open-source images if desired.
  • Caveats: “public” still may have rate/abuse controls; verify.

6.5 Web console management and metadata

  • What it does: UI for repo creation, tag browsing, deletion, and settings.
  • Why it matters: makes administration accessible without custom tooling.
  • Practical benefit: faster onboarding and troubleshooting.
  • Caveats: avoid relying solely on manual UI actions for production; automate via IaC or API where possible.

6.6 Lifecycle policies / retention (if available)

  • What it does: removes old tags based on rules to control storage growth.
  • Why it matters: registries grow indefinitely without cleanup.
  • Practical benefit: reduces storage costs and clutter.
  • Caveats: ensure policies do not delete artifacts still referenced by production (prefer digest pinning + protected tags if supported; verify).

6.7 Repository synchronization / replication (if available)

  • What it does: copies images between repositories/regions/accounts based on rules.
  • Why it matters: supports DR, multi-region delivery, and environment promotion patterns.
  • Practical benefit: keep images near compute; reduce cross-region pulls.
  • Caveats: replication lag, conflict resolution, and cost for cross-region data transfer—verify behavior.

6.8 Webhooks / event notifications (if available)

  • What it does: triggers actions when images are pushed/deleted.
  • Why it matters: enables automation (deployments, security scans, Slack notifications).
  • Practical benefit: reactive pipelines without polling.
  • Caveats: secure webhook endpoints; validate signatures if supported; handle retries.

6.9 Build integration (if available)

  • What it does: builds images from source and pushes to registry (sometimes offered as “build” feature).
  • Why it matters: standardizes builds and reduces external dependencies.
  • Practical benefit: faster onboarding with managed build pipelines.
  • Caveats: billing may include build minutes/runners; confirm pricing and limits.

6.10 Vulnerability scanning (if available)

  • What it does: analyzes images for known vulnerabilities in OS packages and dependencies.
  • Why it matters: reduces risk and improves compliance.
  • Practical benefit: gate releases based on severity thresholds.
  • Caveats: scanners can produce false positives/negatives; integrate with patching processes.

6.11 API / automation (OpenAPI/SDK) (verify)

  • What it does: programmatic management of repos, permissions, and rules.
  • Why it matters: enables IaC-style operations and CI integration.
  • Practical benefit: consistent environments and fewer manual errors.
  • Caveats: API versioning and regional endpoints—verify in developer reference.

7. Architecture and How It Works

High-level service architecture

Container Registry sits between:

  • Producers: developers and CI systems building and pushing images.
  • Registry: stores layers and metadata; controls access.
  • Consumers: Kubernetes nodes (ACK), ECS hosts, or other runtimes pulling images.

There are three main planes to understand:

  1. Data plane: image layer uploads/downloads (largest traffic).
  2. Control plane: repo/tag management, permissions, lifecycle policies.
  3. Audit plane: logs of actions and access (where supported via ActionTrail and service logs).

Request/data/control flow (push & pull)

Push flow (simplified): 1. CI runs docker build. 2. CI authenticates with docker login to the Container Registry endpoint. 3. Docker client uploads layers (many are deduplicated if already present). 4. Docker client uploads manifest; tag is updated.

Pull flow (simplified): 1. Runtime authenticates (or uses pre-configured credentials). 2. Runtime requests manifest for repo:tag or repo@sha256:digest. 3. Runtime downloads missing layers and starts the container.

Integrations with related services

Common Alibaba Cloud integrations/patterns:

  • ACK: pulls images for workloads; uses Kubernetes secrets for registry credentials, or other credential mechanisms depending on your cluster configuration.
  • RAM: roles/policies for CI and operations.
  • ActionTrail: audit API calls for compliance and forensic trails.
  • CloudMonitor / Log Service: metrics and logs if available (verify what Container Registry exposes directly).
    CloudMonitor: https://www.alibabacloud.com/product/cloud-monitor
    Log Service: https://www.alibabacloud.com/product/log-service

Dependency services (conceptual)

Container Registry is managed, but your solution architecture depends on:

  • Networking: VPC, NAT/Internet egress, or private connectivity if supported.
  • Compute: ACK worker nodes/ECS pulling images.
  • CI runners: where builds and pushes occur.

Security/authentication model (practical view)

  • Identity source: Alibaba Cloud account + RAM users/roles.
  • Registry credentials: typically a registry-specific password/token used with docker login (exact mechanism depends on edition/console options—follow docs).
  • Authorization: repository-level permissions (pull/push/admin) and possibly instance-level policies in enterprise setups.

Networking model

  • Public endpoint: simplest, but pulls may traverse the internet (cost, latency, security concerns).
  • Private networking: if Container Registry supports VPC endpoints/PrivateLink in your region/edition, prefer it for production to reduce exposure and potentially lower egress (verify in official docs).
  • Cross-region pulls: may incur latency and cross-region data transfer charges; avoid by placing registry in the same region as compute or using replication.

Monitoring/logging/governance

  • Audit: enable and use ActionTrail for API audit (who changed permissions, who deleted a repo, etc.).
  • Ops visibility: monitor image pull failures at runtime (ACK events, kubelet/containerd logs).
  • Cost monitoring: watch bandwidth and storage usage (through billing dashboards and service usage metrics where available).

Simple architecture diagram

flowchart LR
  Dev[Developer Laptop] -->|docker push| ACR[Alibaba Cloud Container Registry]
  CI[CI Runner] -->|docker push| ACR
  ACR -->|docker pull| ACK[ACK Cluster Nodes]
  ACR -->|docker pull| ECS[ECS Docker Hosts]
  RAM[RAM IAM] -->|authz| ACR
  AT[ActionTrail] -->|audit events| ACR

Production-style architecture diagram (multi-env + DR pattern)

flowchart TB
  subgraph DevEnv[Dev Environment]
    DevCI[CI: Build & Test] -->|push dev tags| DevACR[Container Registry - Dev Repo/Namespace]
    DevACK[ACK Dev Cluster] -->|pull| DevACR
  end

  subgraph ProdEnv[Prod Environment]
    RelCI[Release Pipeline] -->|promote by digest/tag| ProdACR[Container Registry - Prod Repo/Namespace]
    ProdACK[ACK Prod Cluster] -->|pull pinned digest| ProdACR
  end

  subgraph Governance[Security & Governance]
    RAM[RAM Policies/Roles]
    AT[ActionTrail Audit]
    Sec[Security Tools/Scanning\n(verify feature/edition)]
  end

  DevACR -->|optional replication/sync\n(verify)| DRACR[Container Registry - DR Region]
  DRACR -->|pull| DRACK[ACK DR Cluster]

  RAM --> DevACR
  RAM --> ProdACR
  AT --> DevACR
  AT --> ProdACR
  Sec --> DevACR
  Sec --> ProdACR

8. Prerequisites

Account and billing

  • An Alibaba Cloud account with billing enabled.
  • If your organization uses a payer/linked account model, ensure Container Registry is allowed in your billing scope.

Permissions / IAM (RAM)

You need permissions to:

  • Access Container Registry in the console.
  • Create/manage namespaces and repositories.
  • Manage repository visibility and permissions.
  • Obtain credentials for docker login (method depends on edition).

Best practice: use a RAM user/role for daily operations and CI, not the root account.
RAM documentation: https://www.alibabacloud.com/help/en/ram

Tools

For the hands-on lab:

  • Docker installed locally (Docker Desktop or Docker Engine).
  • Verify: docker version
  • Optional for Kubernetes validation:
  • kubectl and access to an ACK cluster kubeconfig.

Region availability

  • Choose a region close to your compute (ACK/ECS).
  • Confirm Container Registry availability and edition support in your target region in official docs/product console.

Quotas/limits (verify)

Common quota areas (exact numbers vary by edition/region; verify):

  • Maximum namespaces/projects.
  • Maximum repositories per namespace.
  • Storage quota and retention.
  • Tag limits.
  • API rate limits and concurrent connections.

Prerequisite services (optional)

  • ACK if you want to deploy and pull from Kubernetes.
  • ActionTrail enabled for auditing (recommended).
  • VPC/PrivateLink if you want private access (verify support for Container Registry).

9. Pricing / Cost

Pricing can differ by edition (e.g., Personal vs Enterprise), region, and feature set (build, scanning, replication). Do not rely on blog posts or third-party summaries—use official sources:

  • Product page: https://www.alibabacloud.com/product/container-registry
  • Documentation (look for Billing): https://www.alibabacloud.com/help/en/container-registry
  • Alibaba Cloud Pricing Calculator (if applicable for your account): https://www.alibabacloud.com/pricing/calculator

Pricing dimensions (what usually drives cost)

Expect some combination of:

  1. Edition/instance subscription – Enterprise offerings often have an instance-based model. – Personal editions may be free or low-cost with quotas (verify current offering).

  2. Storage – Total size of stored image layers (GB-month). – Retained tags/layers from frequent CI builds can dominate long-term cost.

  3. Data transfer / bandwidth – Image pulls generate significant egress/traffic. – Cross-region pulls or internet egress can be more expensive than same-region private pulls. – ACK/ECS pulling from the same region can reduce cost and improve speed (billing rules vary; verify).

  4. Optional featuresSecurity scanning (if billed separately). – Build service (minutes, runners, or concurrent builds). – Cross-region replication (data transfer + storage in target region).

Free tier (if applicable)

Alibaba Cloud sometimes offers free quotas for entry-level usage (especially for personal editions). Verify current free tier/quota in the official pricing page or console for your region.

Hidden or indirect costs

  • CI runner egress: if your CI runs outside Alibaba Cloud, pushing large images may incur internet egress on the CI side and ingress rules on Alibaba Cloud side.
  • NAT Gateway charges: if your ACK nodes are in private subnets and pull via NAT to public endpoints.
  • Cross-region data transfer: DR/replication patterns can add significant cost.
  • Storage bloat from tags: frequent builds create many unique layers; without retention, costs grow quietly.

How to optimize cost (practical)

  • Place the registry in the same region as your main ACK/ECS compute.
  • Keep images small:
  • Use multi-stage builds.
  • Clean package caches.
  • Prefer slim base images that still meet security policy.
  • Use lifecycle/retention policies (if available).
  • Avoid pulling over the internet when private access is possible (verify VPC endpoint support).
  • Pin production deployments by digest and keep only required tags.

Example low-cost starter estimate (no fabricated numbers)

A minimal starter setup typically includes:

  • A small number of repositories (1–5).
  • A few GB of storage (depending on base images and layers).
  • Limited monthly pulls (single cluster, small team).

Your main costs (if any) are usually storage and bandwidth. If you deploy in the same region and avoid internet egress, you can often keep costs low. Confirm the effective cost in your region using the official pricing page and the billing console.

Example production cost considerations

For production, model costs around:

  • Storage growth from CI (hundreds/thousands of tags).
  • Fleet scale pull traffic:
  • Node autoscaling increases pull frequency.
  • Rolling deployments can multiply pulls across node pools.
  • Cross-region replication traffic (if used).
  • Security scanning at scale (if enabled and billed).

A good practice is to estimate peak deployment day traffic and ensure both budgets and quotas cover it.

10. Step-by-Step Hands-On Tutorial

This lab walks through a realistic, low-risk workflow: create a repository in Alibaba Cloud Container Registry, authenticate with Docker, push a small image, pull it back, and (optionally) deploy it to Kubernetes.

Objective

  • Create a Container Registry namespace and repository.
  • Build a simple container image locally.
  • Push the image to Alibaba Cloud Container Registry.
  • Pull and run the image to verify.
  • Optional: deploy to an ACK (Kubernetes) cluster.
  • Clean up resources to avoid ongoing storage growth.

Lab Overview

You will:

  1. Select a region and open Container Registry in the Alibaba Cloud console.
  2. Create a namespace and repository.
  3. Create registry credentials for Docker login (method depends on edition).
  4. Build a tiny web app container locally.
  5. Tag and push the image to Container Registry.
  6. Pull and run it to validate.
  7. Optional: use Kubernetes imagePullSecrets to deploy.
  8. Delete images and repository for cleanup.

Step 1: Choose your region and open Container Registry

  1. Log in to the Alibaba Cloud console.
  2. Search for Container Registry and open the service.
  3. Select a region: – Prefer the same region where your ACK cluster or ECS instances run. – Record the registry endpoint shown in the console for that region/instance.

Expected outcome: You can access the Container Registry console in your target region, and you can see the endpoint format you will use for docker login.

Step 2: Create a namespace (or project)

In Container Registry console:

  1. Create a namespace (sometimes called a “namespace” or “project” depending on edition).
  2. Use a clear name, such as: – demomyteam-dev
  3. Add a description if prompted.

Expected outcome: A namespace exists and is listed in the console.

Step 3: Create a repository

  1. Inside the namespace, create a repository named hello-acr.
  2. Choose visibility: – Private (recommended for learning secure defaults).
  3. Configure any settings offered (some editions offer build/scan/webhook options—skip for now unless you specifically want to test them).

Expected outcome: Repository hello-acr exists under your namespace.

Step 4: Create/obtain registry credentials for Docker login

Container Registry commonly supports a registry-specific password or token used with docker login. The exact UI path differs by edition.

In the Container Registry console, look for one of:

  • Access Credentials
  • Registry Password
  • Tokens
  • Instance credentials (enterprise model)

Follow the official instructions in your console to:

  • Set/generate a credential
  • Identify the username to use (often your Alibaba Cloud account name or a specific registry username)
  • Identify the registry endpoint to log into

If anything is unclear, verify in official docs: https://www.alibabacloud.com/help/en/container-registry

Expected outcome: You have: – REGISTRY_ENDPOINT (example format often resembles registry.<region>.aliyuncs.com—use the exact value from your console) – REGISTRY_USERNAMEREGISTRY_PASSWORD_OR_TOKEN

Step 5: Log in from your terminal

Run:

docker login <REGISTRY_ENDPOINT>

When prompted, enter the username and password/token from Step 4.

Example (replace placeholders):

docker login registry.<region>.aliyuncs.com

Expected outcome: Docker prints Login Succeeded.

If login fails, go to Troubleshooting later in this section.

Step 6: Create a minimal container image locally

Create a new folder and add the following files.

1) app.py

from http.server import BaseHTTPRequestHandler, HTTPServer

class Handler(BaseHTTPRequestHandler):
    def do_GET(self):
        self.send_response(200)
        self.send_header("Content-Type", "text/plain; charset=utf-8")
        self.end_headers()
        self.wfile.write(b"Hello from Alibaba Cloud Container Registry!\n")

if __name__ == "__main__":
    server = HTTPServer(("0.0.0.0", 8080), Handler)
    server.serve_forever()

2) Dockerfile

FROM python:3.12-slim

WORKDIR /app
COPY app.py /app/app.py

EXPOSE 8080
CMD ["python", "/app/app.py"]

Build the image:

docker build -t hello-acr:1.0 .

Expected outcome: docker build completes successfully and you have a local image named hello-acr:1.0.

Verify:

docker images | grep hello-acr

Step 7: Tag the image for Container Registry and push it

Construct the remote image name in this pattern:

<REGISTRY_ENDPOINT>/<NAMESPACE>/<REPOSITORY>:<TAG>

Example:

docker tag hello-acr:1.0 <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0
docker push <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0

Concrete example (replace placeholders with your values from the console):

docker tag hello-acr:1.0 registry.<region>.aliyuncs.com/demo/hello-acr:1.0
docker push registry.<region>.aliyuncs.com/demo/hello-acr:1.0

Expected outcome: – Push completes and prints layer upload progress. – In the Container Registry console, you can see a new tag 1.0 in the repository.

Step 8: Pull and run the image to validate

Pull the image back:

docker pull <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0

Run it locally:

docker run --rm -p 8080:8080 <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0

In another terminal, test:

curl http://127.0.0.1:8080/

Expected outcome: You see:

Hello from Alibaba Cloud Container Registry!

Stop the container with Ctrl+C.

Step 9 (Optional): Deploy to ACK (Kubernetes) using imagePullSecrets

This is optional because ACK clusters incur cost. Only proceed if you already have an ACK cluster and kubectl configured.

1) Create a Docker registry secret:

kubectl create secret docker-registry acr-pull-secret \
  --docker-server=<REGISTRY_ENDPOINT> \
  --docker-username=<REGISTRY_USERNAME> \
  --docker-password=<REGISTRY_PASSWORD_OR_TOKEN> \
  --docker-email=devnull@example.com

2) Create a deployment manifest deployment.yaml:

apiVersion: apps/v1
kind: Deployment
metadata:
  name: hello-acr
spec:
  replicas: 1
  selector:
    matchLabels:
      app: hello-acr
  template:
    metadata:
      labels:
        app: hello-acr
    spec:
      imagePullSecrets:
        - name: acr-pull-secret
      containers:
        - name: app
          image: <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0
          ports:
            - containerPort: 8080

Apply:

kubectl apply -f deployment.yaml
kubectl rollout status deployment/hello-acr

3) Expose it (simple ClusterIP + port-forward):

kubectl expose deployment hello-acr --port 8080 --target-port 8080
kubectl port-forward svc/hello-acr 8080:8080

Test:

curl http://127.0.0.1:8080/

Expected outcome: The pod pulls the image from Alibaba Cloud Container Registry and serves the hello text.

Validation

Use these checks:

  • Confirm tag exists in the console.
  • Verify local pull works:
docker pull <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0
  • Verify digest (recommended for production pinning):
docker inspect --format='{{index .RepoDigests 0}}' <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0
  • If using Kubernetes:
  • kubectl describe pod <pod> should show successful image pull.
  • kubectl get events --sort-by=.lastTimestamp should not show ImagePullBackOff.

Troubleshooting

Common issues and realistic fixes:

1) unauthorized: authentication required when pushing – Cause: not logged in, wrong endpoint, or repo is private without correct permissions. – Fix: – Re-run docker login <REGISTRY_ENDPOINT>. – Confirm the repo path matches exactly. – Confirm your credential is valid and has push permission.

2) denied: requested access to the resource is denied – Cause: you logged in but do not have push access to that namespace/repo. – Fix: – Check repository permissions in the console. – If using RAM, ensure the RAM user/role policy grants registry push actions (verify exact policy actions in official docs).

3) Kubernetes ImagePullBackOff – Cause: missing/incorrect imagePullSecrets, wrong image name, or node cannot reach registry endpoint. – Fix: – Recreate secret with correct server/username/password. – Ensure the docker-server in the secret matches the registry endpoint exactly. – Validate network egress/DNS from node to registry endpoint (especially for private clusters).

4) Slow pushes/pulls – Cause: large images, cross-region access, or internet egress bottleneck. – Fix: – Reduce image size (multi-stage builds). – Move registry to same region as compute. – Consider private networking options (verify support).

Cleanup

To avoid ongoing storage growth:

Local cleanup:

docker rmi hello-acr:1.0 || true
docker rmi <REGISTRY_ENDPOINT>/<NAMESPACE>/hello-acr:1.0 || true

Kubernetes cleanup (if used):

kubectl delete deployment hello-acr || true
kubectl delete svc hello-acr || true
kubectl delete secret acr-pull-secret || true

Registry cleanup (console): 1. Delete the 1.0 tag/image in the repository (if required by the UI flow). 2. Delete the repository hello-acr. 3. Optionally delete the namespace if it was created only for this lab.

Expected outcome: No leftover images/repositories that would continue consuming storage.

11. Best Practices

Architecture best practices

  • Keep the registry close to compute: same region as ACK/ECS to reduce latency and bandwidth cost.
  • Separate dev/test/prod artifacts: use distinct namespaces or repositories; don’t mix promotion workflows with ad-hoc tags.
  • Promote by digest for production: deploy repo@sha256:<digest> to guarantee immutability.
  • Use a clear naming convention:
  • <org>-<env>/<app> or <team>/<app>
  • Tags: semantic version + build metadata (e.g., 1.8.2, 1.8.2-githash).

IAM/security best practices

  • Do not use the root account for CI.
  • Use RAM roles (or RAM users with minimal scope) for:
  • CI push access (push to specific repos only).
  • Runtime pull access (pull-only).
  • Rotate credentials regularly and use short-lived credentials where supported (verify).

Cost best practices

  • Implement retention/lifecycle rules (if available) to delete stale tags.
  • Keep images small and cache-friendly:
  • order Dockerfile layers for caching
  • avoid copying unnecessary files
  • Minimize internet egress:
  • prefer same-region pulls
  • evaluate private connectivity options if supported

Performance best practices

  • Use multi-stage builds and slim images.
  • Pin base image versions to avoid unexpected rebuild differences.
  • Avoid excessive parallel pulls during deployments by using:
  • node image caching
  • rolling updates with controlled surge
  • pre-pull daemonsets (Kubernetes pattern)

Reliability best practices

  • Plan for registry dependency:
  • if registry is unreachable, new nodes cannot pull images.
  • Consider multi-region replication for critical workloads if supported and justified.
  • Keep critical images available and avoid deleting tags still in use.

Operations best practices

  • Use ActionTrail for audit.
  • Standardize repo settings via automation where possible.
  • Track:
  • failed pull metrics (in cluster logs/events)
  • push failure rates in CI
  • storage growth trends

Governance/tagging/naming best practices

  • Enforce “no latest in production” policy via CI checks or Kubernetes admission controls.
  • Use consistent labels/annotations in CI (store build info in image labels).
  • Define ownership per namespace (team, cost center, environment).

12. Security Considerations

Identity and access model

  • Use RAM to define who can manage registries and who can pull/push.
  • Split duties:
  • Admins: create repos, manage permissions
  • CI: push-only to specific repos
  • Runtime: pull-only
  • Prefer dedicated credentials per system (CI vs human), not shared passwords.

Encryption

  • Data at rest and in transit are typically managed by the cloud provider. For exact encryption behavior and options, verify in official docs for Container Registry and for any underlying storage/encryption options exposed in the console.

Network exposure

  • Avoid exposing private registries broadly.
  • Prefer private connectivity (VPC endpoint/PrivateLink) if supported for your region/edition.
  • If using public endpoints:
  • restrict outbound internet paths from nodes
  • monitor for suspicious pulls

Secrets handling

  • Treat registry passwords/tokens as secrets:
  • store in a secrets manager (Kubernetes secrets, CI secret store, or Alibaba Cloud secrets product if you use one—verify your org standard)
  • never commit into Git
  • Rotate credentials and remove unused credentials promptly.

Audit/logging

  • Enable ActionTrail and route logs to a protected Log Service project for retention (common governance pattern).
  • Review:
  • permission changes
  • repo deletions
  • credential creation/rotation events (where logged)

Compliance considerations

  • For regulated workloads:
  • keep artifacts within required regions (data residency)
  • maintain audit logs
  • establish vulnerability management workflow
  • Confirm compliance features (scanning, retention, export) in your edition and region.

Common security mistakes

  • Making repositories public “just to get it working”.
  • Using latest for production and overwriting it in CI.
  • Giving CI admin rights to all repos.
  • Using long-lived credentials on developer laptops without rotation.
  • Allowing cross-region pulls unknowingly, increasing exposure and cost.

Secure deployment recommendations

  • Use private repos + least privilege.
  • Require digest pinning for production deployments.
  • Integrate scanning (if available) and block critical CVEs.
  • Use separate accounts/projects for higher isolation if needed (organizational design choice).

13. Limitations and Gotchas

Because exact limits differ by edition/region, treat this as a checklist to validate in official docs and your console.

Known limitations to validate

  • Quotas on namespaces, repos, tags, and storage.
  • Feature availability by edition:
  • replication/sync
  • scanning
  • build service
  • webhooks
  • Regional endpoint formats differ between editions/instances—always copy from console.
  • Tag mutability: tags can be overwritten by default in many registries; plan protections (if available) or use digest pinning.
  • Deletion behavior: deleting a tag may not immediately free storage if layers are shared by other tags.
  • Cross-region network cost: pulling from a different region can be expensive and slow.
  • Kubernetes credential scope: imagePullSecrets are namespace-scoped in Kubernetes; plan accordingly.
  • CI concurrency: multiple parallel pushes to the same tag can race; use unique tags per build.

Operational gotchas

  • ImagePullBackOff is often networking/DNS/secret mismatch, not a registry outage.
  • Large base images multiply pull time across node autoscaling events.
  • Retention policies can delete needed artifacts if not aligned with deployment references.

Migration challenges

  • Rewriting image references across YAML/Helm charts.
  • Preserving digests and tags correctly when copying.
  • Handling multi-arch images (amd64/arm64) if your clusters are mixed—verify multi-arch support in your tooling and registry behavior.

14. Comparison with Alternatives

Nearest services in the same cloud (Alibaba Cloud)

  • Container Registry is the primary managed container image registry service on Alibaba Cloud.
  • Related services are not direct replacements but are often used alongside it:
  • ACK for orchestration
  • OSS for generic object storage (not a registry)
  • Log Service for logging/audit pipelines

Nearest services in other clouds

  • AWS: Amazon ECR
  • Azure: Azure Container Registry (ACR)
  • Google Cloud: Artifact Registry

Open-source/self-managed alternatives

  • Harbor (popular enterprise registry)
  • CNCF Distribution (Docker registry)
  • JFrog Artifactory (commercial artifact platform)

Comparison table

Option Best For Strengths Weaknesses When to Choose
Alibaba Cloud Container Registry Alibaba Cloud-centric deployments (ACK/ECS), managed registry Managed ops, Alibaba Cloud IAM integration (RAM), regional placement close to compute Feature/edition differences; cross-cloud portability depends on your process You run workloads primarily on Alibaba Cloud and want a managed registry
AWS ECR AWS-centric workloads Tight AWS integration, mature IAM patterns Cross-cloud use adds complexity Your platform is primarily AWS
Azure Container Registry Azure-centric workloads Strong Azure integration, good enterprise patterns Cross-cloud use adds complexity Your platform is primarily Azure
Google Artifact Registry GCP-centric workloads and multi-artifact management Supports multiple artifact types; GCP integration Cross-cloud use adds complexity Your platform is primarily GCP or you need artifact-type breadth
Harbor (self-managed) Regulated environments, on-prem/hybrid, custom policies Full control, rich enterprise features, can run anywhere You operate/patch/scale it; HA is on you You need on-prem control or strict customizations
JFrog Artifactory Large enterprises with many artifact formats Enterprise governance across artifact types Cost and operational complexity You want one enterprise artifact platform across languages and containers

15. Real-World Example

Enterprise example: regulated financial services platform

  • Problem: Multiple teams deploy microservices to ACK. Regulators require auditability, strict access control, and controlled release promotion. Teams currently use public registries and ad-hoc image sharing.
  • Proposed architecture:
  • Container Registry in the same region as prod ACK.
  • Separate namespaces for dev, staging, prod.
  • RAM roles:
    • CI role: push-only to dev and staging; promotion pipeline role can push to prod.
    • Runtime role/credentials: pull-only in prod.
  • ActionTrail enabled and exported to centralized logging.
  • Optional scanning/replication enabled based on edition (verify).
  • Why Container Registry was chosen:
  • Integrates with Alibaba Cloud identity (RAM) and governance patterns.
  • Reduces operational burden versus self-managed Harbor.
  • Regional placement supports performance and data residency.
  • Expected outcomes:
  • Reduced risk of unauthorized image changes.
  • Repeatable releases with digest-pinned deployments.
  • Audit trail for changes and access.

Startup/small-team example: SaaS MVP on ACK

  • Problem: Small team ships quickly but needs private images and a simple path to deploy into ACK. They want minimal ops overhead and low cost.
  • Proposed architecture:
  • One namespace startup-dev.
  • Repositories per service: api, worker, frontend.
  • GitHub Actions builds and pushes images to Container Registry.
  • ACK pulls images using a Kubernetes imagePullSecret stored in the namespace.
  • Basic retention: keep last N tags (if available) or manual cleanup monthly.
  • Why Container Registry was chosen:
  • Managed, straightforward Docker workflow.
  • Works well with ACK without running extra infrastructure.
  • Expected outcomes:
  • Consistent deployments; faster rollouts.
  • Reduced build/deploy friction.
  • Predictable cost mainly driven by storage and pull traffic.

16. FAQ

1) Is Alibaba Cloud Container Registry the same as Docker Hub?
No. Docker Hub is a public registry service by Docker. Alibaba Cloud Container Registry is a managed registry within Alibaba Cloud, typically used for private images and Alibaba Cloud deployments.

2) Do I need Container Registry if I use ACK?
Not strictly, but you need some registry. Container Registry is the Alibaba Cloud-native choice and is commonly used with ACK for private images.

3) What is the difference between tags and digests?
A tag (like :1.0) can be moved to point to a different image over time. A digest (@sha256:...) uniquely identifies the exact image content and is immutable. Use digests for production pinning.

4) Can I make a repository public?
Many registries support public repos. If the console offers visibility settings, you can. For sensitive images, keep repos private.

5) How do Kubernetes nodes authenticate to pull private images?
Commonly through imagePullSecrets (Kubernetes docker-registry secret). Some environments also support node-level credential configuration. Follow ACK and Container Registry docs for the recommended approach.

6) Why do I get ImagePullBackOff in Kubernetes?
Usually because credentials are missing/wrong, the image name is incorrect, or nodes cannot reach the registry endpoint (DNS/network). Use kubectl describe pod and events to pinpoint the reason.

7) Can I use Container Registry from outside Alibaba Cloud (on-prem or another cloud)?
Yes, if your network can reach the registry endpoint and you authenticate properly. Consider latency, bandwidth, and data transfer cost.

8) Does Container Registry support private network access (without public internet)?
This may be possible via VPC endpoint/PrivateLink patterns, depending on region/edition. Verify in official docs for your region.

9) How should I structure namespaces and repositories?
A common model is: – namespace = team or environment (platform, dev, prod) – repository = application (payments-api, web, worker) Keep naming consistent and automate creation/permissions.

10) Can I replicate images to another region?
Some enterprise registries provide replication/synchronization. Check whether your edition supports it and understand the cost and lag characteristics.

11) Is image vulnerability scanning included?
It depends on edition and configuration. Check Container Registry documentation and your console features. If scanning exists, integrate it into CI gating.

12) How do I prevent someone from overwriting a production tag?
Best approach: deploy by digest and treat tags as metadata. If your edition supports tag immutability or protected tags, enable it (verify availability).

13) Why does storage not drop after deleting tags?
Registry layers can be shared across tags/images. Deleting a tag might not remove shared layers. Garbage collection behavior is managed by the service; confirm expected behavior in docs.

14) What’s the safest way to give CI push access?
Create a dedicated RAM principal (user/role) with least privilege to push only to the required repos, and rotate credentials. Avoid using personal credentials in CI.

15) Can I use multi-architecture images (amd64/arm64)?
OCI registries typically support multi-arch manifests, but you must build and push them correctly (Buildx). Verify compatibility for your runtime and Container Registry behavior in your environment.

16) What should I monitor operationally?
CI push success rate, deployment pull failures, bandwidth usage, storage growth, and audit events (permission changes, deletions).

17) How do I move images from another registry to Container Registry?
Pull from the old registry, retag to the new endpoint, and push. For many repositories, script it and preserve tags carefully.

17. Top Online Resources to Learn Container Registry

Resource Type Name Why It Is Useful
Official product page Alibaba Cloud Container Registry Overview, positioning, entry point to features and console: https://www.alibabacloud.com/product/container-registry
Official documentation Container Registry documentation Most accurate and current reference for features, endpoints, auth, and workflows: https://www.alibabacloud.com/help/en/container-registry
Official billing/pricing info Container Registry pricing/billing Region/edition-specific pricing details; verify latest from product/pricing pages and billing docs: https://www.alibabacloud.com/product/container-registry
Pricing calculator Alibaba Cloud Pricing Calculator Helps estimate storage/traffic-related costs: https://www.alibabacloud.com/pricing/calculator
Related service docs Resource Access Management (RAM) Learn how to implement least privilege and roles: https://www.alibabacloud.com/help/en/ram
Related service docs ActionTrail Audit and governance for registry changes: https://www.alibabacloud.com/help/en/actiontrail
Related service product ACK (Alibaba Cloud Kubernetes) Understand deployment patterns that consume images from registries: https://www.alibabacloud.com/product/kubernetes
Community learning (general) Docker documentation Core push/pull, tagging, and build concepts: https://docs.docker.com/
Community learning (general) Kubernetes documentation Image pull secrets, deployments, and runtime behavior: https://kubernetes.io/docs/
Trusted open-source reference Harbor documentation Helpful to understand registry concepts and governance patterns (even if self-managed): https://goharbor.io/docs/

18. Training and Certification Providers

Institute Suitable Audience Likely Learning Focus Mode Website URL
DevOpsSchool.com DevOps engineers, SREs, platform teams Container, Kubernetes, CI/CD, cloud DevOps practices Check website https://www.devopsschool.com/
ScmGalaxy.com Beginners to intermediate DevOps learners SCM, CI/CD fundamentals, DevOps toolchain Check website https://www.scmgalaxy.com/
CLoudOpsNow.in Cloud engineers and operators Cloud operations, monitoring, reliability practices Check website https://www.cloudopsnow.in/
SreSchool.com SREs, operations teams SRE practices: SLOs, incident response, reliability engineering Check website https://www.sreschool.com/
AiOpsSchool.com Ops teams exploring automation AIOps concepts, automation, operational analytics Check website https://www.aiopsschool.com/

19. Top Trainers

Platform/Site Likely Specialization Suitable Audience Website URL
RajeshKumar.xyz DevOps/cloud training content (verify offerings) Individuals and teams seeking hands-on DevOps guidance https://rajeshkumar.xyz/
devopstrainer.in DevOps training (verify catalog) Beginners to intermediate DevOps practitioners https://www.devopstrainer.in/
devopsfreelancer.com Freelance DevOps help/training platform (verify services) Teams needing short-term expert support https://www.devopsfreelancer.com/
devopssupport.in DevOps support/training resources (verify services) Ops/DevOps teams needing troubleshooting and guidance https://www.devopssupport.in/

20. Top Consulting Companies

Company Likely Service Area Where They May Help Consulting Use Case Examples Website URL
cotocus.com DevOps/cloud consulting (verify service pages) Platform modernization, container adoption, CI/CD Designing a registry strategy, integrating CI with Container Registry, improving deployment reliability https://cotocus.com/
DevOpsSchool.com DevOps consulting and training (verify consulting offerings) Kubernetes/DevOps implementations, enablement Container Registry + ACK rollout, IAM best practices, pipeline standardization https://www.devopsschool.com/
DEVOPSCONSULTING.IN DevOps consulting (verify offerings) DevOps transformation, automation Migrating from self-managed registry to Container Registry, implementing retention and access controls https://www.devopsconsulting.in/

21. Career and Learning Roadmap

What to learn before Container Registry

  • Container basics:
  • Dockerfile, layers, tagging, registries
  • Build vs runtime separation
  • Linux fundamentals:
  • processes, networking basics, certificates
  • Basic cloud concepts:
  • regions, VPC networking, IAM principles

What to learn after Container Registry

  • Kubernetes (ACK) operations
  • deployments, rollouts, autoscaling
  • secrets management and RBAC
  • CI/CD design
  • build pipelines, artifact promotion, GitOps
  • Software supply chain security
  • vulnerability management
  • SBOM concepts
  • signing/verification patterns (implementation depends on your toolchain)

Job roles that use it

  • DevOps Engineer
  • Site Reliability Engineer (SRE)
  • Platform Engineer
  • Cloud Engineer
  • Security Engineer (AppSec/CloudSec)
  • Release Engineer

Certification path (if available)

Alibaba Cloud certification programs vary over time. Check Alibaba Cloud’s official certification portal for current paths that include containers/Kubernetes and DevOps. If there is a Container or Kubernetes certification track, Container Registry knowledge is typically a practical component.

Project ideas for practice

  1. CI pipeline: build and push images on every commit; tag with git SHA and semantic version.
  2. Promotion workflow: promote an image from dev to prod by digest with an approval gate.
  3. Retention policy: implement lifecycle cleanup (or a script) to keep last N tags.
  4. Multi-arch build: build amd64+arm64 images and deploy to mixed node pools (validate behavior).
  5. DR simulation: replicate or mirror critical images to another region (if supported), then deploy to a DR cluster.

22. Glossary

  • Container image: a packaged filesystem + metadata used to run a container.
  • Registry: a service that stores and serves container images.
  • Repository: a collection of related images (usually one per application) within a registry.
  • Namespace/Project: a grouping of repositories for organization and access control.
  • Tag: a human-readable reference to a specific image version (mutable in many systems).
  • Digest: immutable hash reference to image content (e.g., sha256:...).
  • OCI: Open Container Initiative; defines image and runtime specifications.
  • RAM: Resource Access Management; Alibaba Cloud IAM service.
  • ACK: Alibaba Cloud Container Service for Kubernetes.
  • imagePullSecret: Kubernetes secret containing registry credentials to pull private images.
  • Egress: outbound network traffic; often billed and a major cost driver for registries.
  • Retention/Lifecycle policy: rules to delete old images/tags to control storage growth.
  • Webhook: HTTP callback triggered by events like image push.
  • CVE: Common Vulnerabilities and Exposures; identifier for known security vulnerabilities.

23. Summary

Alibaba Cloud Container Registry is the managed place to store and distribute container images for Alibaba Cloud Container workloads such as ACK and ECS-based runtimes. It matters because it standardizes how images are built, secured, accessed, and promoted across environments.

Architecturally, place Container Registry close to compute (same region), use RAM for least-privilege access, and prefer digest pinning for production reliability. Cost is typically driven by storage growth and image pull traffic, with additional considerations for replication, scanning, and builds depending on your edition and usage.

Use Container Registry when you need a secure, managed registry tightly aligned with Alibaba Cloud deployments. Next, deepen your skills by integrating it into a CI/CD pipeline and deploying to ACK with secure credential handling and promotion-by-digest workflows.