A private registry for your application images
Store container images, Helm charts, and other OCI artifacts in a managed Harbor registry.
Use the Harbor interface or API for projects, tags, metadata, and storage controls.
Asergo gives your team a private place to push and pull application images, running on Asergo's EU infrastructure. You do not need to choose a registry provider, run Harbor yourself, wire it into Kubernetes, configure robot accounts, manage storage limits, or connect vulnerability scanning before your team can deploy.
Harbor Registry
API Interface
Storage Management
Robot Accounts
Security Scanning
Kubernetes Integration
Store container images, Helm charts, and other OCI artifacts in a managed Harbor registry.
Use the Harbor interface or API for projects, tags, metadata, and storage controls.
Each registry comes with a Kubernetes pull robot account ready for cluster integration.
CI/CD can push with robot account credentials, and clusters can pull without shared personal credentials.
Pushed images are scanned for known CVEs so your team can review severity and decide what needs fixing before deployment.
The registry runs on Asergo infrastructure in Europe, alongside the rest of your Asergo platform.
Traffic between the registry and Asergo endpoints is included, so registry-to-cluster pulls do not create a separate egress cost line.
A private registry only helps once image storage, access, pull credentials, scanning, and environment flow are connected. Asergo handles that registry layer before it becomes a separate infrastructure project for your team.
That means your team is not blocked by:
Registry service, Harbor setup, storage integration, platform authentication, and Kubernetes pull access.
Image content, build pipeline, tagging, project structure, access decisions, and vulnerability fixes.
Create projects for applications, teams, environments, or clients. Use a structure that fits your deployment flow, such as separate projects for development, staging, and production.
Your CI/CD system pushes images into the registry using a robot account. Accounts can be scoped, disabled, and separated by purpose.
Your Asergo cluster can pull from the registry using the prepared Kubernetes robot account, removing the usual setup work around image pull credentials and private registry access.
Inspect tags, artifacts, storage usage, robot accounts, and CVE findings in Harbor or through the API.
Container Registry
Talk through how image storage, cluster pull access, and scanning fit into your Asergo setup.