unsubbed.co

Harbor

CNCF-graduated container registry with vulnerability scanning, image signing, RBAC, and replication — enterprise security on your own infrastructure.

Best for: Platform and DevOps teams running Kubernetes at scale who need a private registry with security controls, compliance features, and independence from public registries.

TL;DR

  • What it is: An open-source container image and artifact registry with role-based access control, vulnerability scanning, image signing, and replication across multiple registries
  • Who it’s for: Platform and DevOps teams running Kubernetes at scale who need a private registry with security controls, compliance features, and independence from public registries
  • Cost savings: Docker Hub Team costs $11/user/month; Amazon ECR charges $0.10/GB/month; Harbor self-hosted on existing Kubernetes infrastructure typically adds $0-50/month in compute overhead
  • Key strength: Enterprise security stack in a single tool — Trivy-based vulnerability scanning, image signing via Notary/Cosign, RBAC with project-level permissions, LDAP/Active Directory integration, and SBOM generation
  • Key weakness: Significant operational complexity — Harbor requires a Kubernetes cluster, PostgreSQL, Redis, object storage, and ongoing maintenance; for small teams without dedicated platform engineers, managed registries eliminate this burden entirely

What is Harbor

Harbor is an open-source container registry that extends Docker’s Distribution Registry with the enterprise security and management features that organizations operating Kubernetes at scale actually need. Where Docker Hub is a public registry optimized for discovery and sharing, Harbor is a private registry optimized for control, compliance, and security.

The project originated at VMware in 2016 and was donated to the Cloud Native Computing Foundation in 2018. It graduated from CNCF’s sandbox and incubation stages in 2020 — becoming the CNCF’s eleventh graduated project — a designation reserved for projects that have demonstrated production maturity and governance rigor.

“Harbor is an open source trusted cloud native registry project that stores, signs, and scans content,” the README states. That concise description covers the three capabilities that justify running Harbor instead of Docker Hub or a managed cloud registry: you store artifacts privately on your infrastructure, you sign them to guarantee provenance, and you scan them to prevent vulnerable images from being deployed.

The project has 27,777 GitHub stars under an Apache-2.0 license. Recent additions extend Harbor beyond container images: AI model management integration and native Software Bill of Materials (SBOM) generation reflect the registry’s expansion into managing the full set of cloud-native artifacts an organization deploys.


Why people choose it over Docker Hub, Amazon ECR, and Azure Container Registry

vs. Docker Hub

Docker Hub is the default choice for most teams and the right answer for many of them. The problems appear at scale in private contexts: Docker Hub rate limits unauthenticated pulls (100/6 hours) and authenticated free-tier pulls (200/6 hours), which breaks CI/CD pipelines. Docker Hub Team costs $11/user/month.

Harbor solves the rate limit problem (it is your registry, on your network), the cost-at-scale problem, and the compliance problem simultaneously. The tradeoff is everything associated with running your own infrastructure.

vs. Amazon ECR

ECR is the natural choice for AWS-native teams. It integrates deeply with IAM, ECS, EKS, and CodeBuild. ECR’s limitations emerge in multi-cloud or on-premises contexts. It is an AWS service — accessing it from GCP or an on-premises cluster adds latency and egress costs. It does not support Helm chart storage. Harbor offers more sophisticated project-based permissions that map naturally to engineering team structures.

vs. Azure Container Registry

ACR integrates with the Microsoft ecosystem the way ECR integrates with AWS. For multi-cloud or hybrid environments, Harbor’s vendor-neutral architecture is more practical.


Features: what it actually does

Security

  • Vulnerability scanning using Trivy (fast, regularly updated CVE database) and Clair
  • Policy-based blocking: prevent deployment of images with critical CVEs
  • Image signing with Docker Content Trust (Notary) and Cosign for supply chain security
  • SBOM (Software Bill of Materials) generation for compliance and audit trails
  • Configurable retention policies to automatically remove old or vulnerable images

Access control

  • Role-based access control at the project level — different users can have different permissions for different repositories
  • LDAP and Active Directory integration for enterprise user management
  • OIDC/SSO support — integrate with any identity provider that speaks OpenID Connect
  • Project-based artifact organization: separate dev, staging, and production repositories with appropriate permissions

Replication and high availability

  • Policy-based replication: synchronize images between Harbor instances or with other registries (Docker Hub, ECR, ACR, GCR, Quay)
  • Pull-based and push-based replication modes
  • Filter-based replication using repository names, tags, and labels
  • High-availability Kubernetes deployment via Helm

Artifact types

  • Container images (OCI and Docker formats)
  • Helm charts
  • OCI artifacts generally (Wasm binaries, Kubernetes manifests, configuration files)
  • AI models (recent addition)

Management

  • Web-based UI for all operations
  • RESTful API — everything in the UI is available programmatically
  • Image deletion and garbage collection to reclaim storage
  • Audit logging of all registry operations
  • Tag retention policies — automatically remove images that match configured patterns

Harbor Satellite (recent addition)

  • Lightweight local registry for edge and IoT deployments
  • Enables image availability in environments with unreliable or no connectivity
  • Synchronizes from a central Harbor instance when connectivity is available

Pricing math

OptionMonthly cost (100GB storage, 20 engineers)Notes
Docker Hub Team$220$11/user, unlimited private repos
Amazon ECR$10-30$0.10/GB + data transfer charges
Azure Container Registry Premium$50Flat tier pricing, geo-replication extra
Google Artifact Registry$10-20$0.10/GB + network egress
Harbor (self-hosted)$30-100Infrastructure overhead on existing Kubernetes cluster
Harbor (dedicated cluster)$150-400If Harbor needs dedicated Kubernetes nodes

For teams already running Kubernetes, Harbor adds minimal infrastructure cost. For teams that would need to stand up Kubernetes specifically for Harbor, the equation changes — you are taking on Kubernetes operational complexity to avoid $30/month in ECR costs, which rarely makes sense.


Deployment reality

Harbor can be deployed with Docker Compose for testing, or with Helm on Kubernetes for production:

helm repo add harbor https://helm.goharbor.io
helm install my-harbor harbor/harbor \
  --set expose.type=ingress \
  --set expose.ingress.hosts.core=core.harbor.example.com \
  --set externalURL=https://core.harbor.example.com \
  --set harborAdminPassword=admin123

For a production-grade installation you also need: persistent volume claims, an ingress controller with TLS termination, external PostgreSQL for high availability, object storage backend (S3, Azure Blob, GCS, or MinIO), and a backup strategy for the PostgreSQL metadata.

Total setup time for a production deployment: 4-8 hours for an engineer with Kubernetes experience.


Who should use Harbor

Best fit

  • Platform engineering teams running Kubernetes at scale (50+ engineers, multiple clusters)
  • Organizations with compliance requirements mandating on-premises artifact storage (HIPAA, FedRAMP, PCI-DSS)
  • Multi-cloud teams that need a registry neutral to AWS, GCP, and Azure
  • Teams with existing Kubernetes infrastructure where Harbor adds minimal overhead
  • Organizations currently paying for enterprise registries (JFrog Artifactory, Nexus Repository) wanting to reduce costs

Not the right tool if

  • You do not have a dedicated platform or DevOps engineer — managed registries eliminate this maintenance entirely
  • Your team is AWS-only and already uses ECR with IAM for access control
  • You are a small team with minimal compliance requirements and Docker Hub’s rate limits are not a problem
  • You need primarily to distribute public images to the community

Alternatives worth considering

  • Docker Hub — The default choice for most teams. Largest registry, best discovery, no infrastructure to maintain. $11/user/month for private repos.
  • Amazon ECR — Best for AWS-native teams. Deep IAM integration, simple pricing, no infrastructure to manage.
  • Azure Container Registry — Best for Azure-native teams. Integrates with AKS and Azure DevOps.
  • Quay.io — Red Hat’s container registry with security scanning. Available as a cloud service or self-hosted (Project Quay). Similar capabilities to Harbor, different operational model.
  • Gitea Container Registry — Lightweight registry built into Gitea. Good for small teams that already use Gitea for version control.

Bottom line

Harbor is the right tool for platform teams that need enterprise-grade container registry features — security scanning, image signing, RBAC, replication — and have the operational capacity to run it. The CNCF graduation status and active development give confidence in its long-term viability. Honestly assess your team’s capacity before choosing Harbor over a managed alternative.

Sources

This review synthesizes 5 independent third-party articles along with primary sources from the project itself. Inline references throughout the review map to the numbered list below.

  1. [1] cncf.io (2025-12-08) — “Harbor: Enterprise-grade container registry for modern private cloud” — enterprise (link)
  2. [2] vcluster.com (2021-11-01) — “Harbor + Kubernetes = Self-Hosted Container Registry” — deployment (link)
  3. [3] openlogic.com (2024-11-14) — “Harbor Registry Overview: Using Harbor for Container Image Management” — overview (link)
  4. [4] shipyard.build (2026-02-15) — “Choosing a Container Registry in 2026: Docker Hub vs ECR vs Harbor (and others)” — comparison (link)
  5. [5] shipyard.build (2026-02-15) — “Harbor and Container Registries: Alternatives and Comparisons” — critical (link)
  6. [6] GitHub repository — official source code, README, releases, and issue tracker (https://github.com/goharbor/harbor)
  7. [7] Official website — Harbor project homepage and docs (https://goharbor.io/)

References [1]–[7] above were used to cross-check claims about features, pricing, deployment, and limitations in this review.

Features

Authentication & Access

  • LDAP / Active Directory
  • Role-Based Access Control
  • Single Sign-On (SSO)

Integrations & APIs

  • REST API

Analytics & Reporting

  • Charts & Graphs