This guide explains how OCI Artifacts streamline the storage and distribution of Kubernetes resources in a unified registry.
In this guide, you’ll discover how OCI Artifacts simplify storing and distributing a variety of Kubernetes-related resources in a single, unified registry. By leveraging any OCI-compliant registry, you benefit from consistent authentication, authorization, and versioning across:
An OCI Registry is a server-side component that hosts one or more repositories, each containing multiple artifacts at various tags or digests.
Registry → Repository → Artifact
Artifacts can be images, charts, manifests, or any OCI-compatible payload
Next, we’ll walk through pushing three artifact types—Docker images, Helm charts, and plain Kubernetes manifests—to GitHub Container Registry (ghcr.io). The workflow applies equally to Azure, GCR, ECR, and other OCI-compliant registries.
# 1. Log in to ghcr.iodocker login ghcr.io \ --username sidd-harth \ --password <GH_PERSONAL_ACCESS_TOKEN># 2. Verify local imagedocker images nginx# REPOSITORY TAG IMAGE ID CREATED SIZE# 3. Tag for ghcr.iodocker tag nginx ghcr.io/sidd-harth/nginx:1.1.0# 4. Push the tagged imagedocker push ghcr.io/sidd-harth/nginx:1.1.0# The push refers to repository [ghcr.io/sidd-harth/nginx]# 1.1.0: digest sha256:6ad839ec10c687385 size: 1570
Never commit your Personal Access Token or other credentials to version control. Store them securely with your CI/CD secrets manager.
With your artifacts securely stored in an OCI registry, you can seamlessly integrate any GitOps tool—such as Flux—to pull, verify, and deploy them into your Kubernetes clusters.