Features
TOC
Deployment features
-
Templated deployments
Supports out-of-box templates for quick deployment and production-ready configurations and custom templates.
-
YAML deployments
Customizable YAML deployment method to fully control the configuration of the Harbor instance using Helm values.
Harbor v2.12 features
-
Container Registry
Secure storage and distribution of OCI, Helm, and other container images with role-based access control.
-
Enhanced Robot Accounts
Improved robot account functionality with additional configuration options for better integration and security management in CI/CD processes.
-
Speed Limit for Proxy Cache
Control network bandwidth when pulling artifacts from proxy cache projects to optimize resource usage.
-
Enhanced LDAP Onboarding
Improved LDAP onboarding process for better user login performance and smoother authentication experience.
-
Multi-Registry Integration
Seamless replication of images to and from various registries including ACR & ACR EE, enhancing interoperability.
-
Vulnerability Scanning
Built-in vulnerability scanning for container images with support for multiple scanners.
-
Artifact Management
Comprehensive artifact management with tagging, signing, and retention policies.
-
Prometheus Metrics
Export Harbor statistics as Prometheus metrics for monitoring and observability.
-
Project-Level Quotas
Set storage quotas at the project level to control resource usage.
-
RBAC Security
Fine-grained Role-Based Access Control for users and resources.
For more details about Harbor v2.12 features, please visit Harbor v2.12 Documentation.
Enhanced features
-
IPv6 Network Support
Deploy and operate Harbor instances in IPv6-only or dual-stack network environments, ensuring compatibility with modern network infrastructures.
-
ARM Architecture Compatibility
Full support for ARM-based infrastructure, enabling deployment on energy-efficient and cost-effective ARM processors for improved performance-to-power ratio.
-
Security Enhancements
Addresses critical system and application vulnerabilities with proactive patching and security hardening. Includes fixes for CVE-identified issues in core components, dependency security updates, and remediation of potential privilege escalation vectors.