Features

TOC

Deployment features

  • Templated deployments

    Supports out-of-box templates for quick deployment and production-ready configurations and custom templates.

  • YAML deployments

    Customizable YAML deployment method to fully control the configuration of the Harbor instance using Helm values.

Harbor v2.12 features

  • Container Registry

    Secure storage and distribution of Docker, Helm, OCI, and other container images with role-based access control.

  • Enhanced Robot Accounts

    Improved robot account functionality with additional configuration options for better integration and security management in CI/CD processes.

  • Speed Limit for Proxy Cache

    Control network bandwidth when pulling artifacts from proxy cache projects to optimize resource usage.

  • Enhanced LDAP Onboarding

    Improved LDAP onboarding process for better user login performance and smoother authentication experience.

  • Multi-Registry Integration

    Seamless replication of images to and from various registries including ACR & ACR EE, enhancing interoperability.

  • Vulnerability Scanning

    Built-in vulnerability scanning for container images with support for multiple scanners.

  • Artifact Management

    Comprehensive artifact management with tagging, signing, and retention policies.

  • Prometheus Metrics

    Export Harbor statistics as Prometheus metrics for monitoring and observability.

  • Project-Level Quotas

    Set storage quotas at the project level to control resource usage.

  • RBAC Security

    Fine-grained Role-Based Access Control for users and resources.

For more details about Harbor v2.12 features, please visit Harbor v2.12 Documentation.

Enhanced features

  • IPv6 Network Support

    Deploy and operate Harbor instances in IPv6-only or dual-stack network environments, ensuring compatibility with modern network infrastructures.

  • ARM Architecture Compatibility

    Full support for ARM-based infrastructure, enabling deployment on energy-efficient and cost-effective ARM processors for improved performance-to-power ratio.

  • Security Enhancements

    Addresses critical system and application vulnerabilities with proactive patching and security hardening. Includes fixes for CVE-identified issues in core components, dependency security updates, and remediation of potential privilege escalation vectors.