Container Registry is deprecated. Effective March 18, 2025, Container Registry is shut down and writing images to Container Registry is unavailable.
gcr.io
URLs hosted on Artifact Registry, including Google-owned images with gcr.io
URLs, are not affected by the Container Registry shutdown.
For more details about the Container Registry deprecation and how to migrate to Artifact Registry, see Container Registry deprecation.
Artifact Registry is the recommended service for container image storage and management on Google Cloud. Artifact Registry provides the same container management features as Container Registry and includes additional features and benefits. As a fully-managed service with support for both container images and non-container artifacts, Artifact Registry extends the capabilities of Container Registry.
You can migrate Container Registry endpoints to Artifact Registry gcr.io
repositories without requiring any downtime or service disruption using the automatic migration tool.
Summary of new features
Artifact Registry extends the capabilities of Container Registry with the following features:
- Repository-level access control.
- Hosting artifacts in regions to reduce latency and data transfer costs, and to comply with data residency requirements.
- Streaming images to Google Kubernetes Engine and Dataproc Serverless to reduce workload startup times.
- Deploying to Cloud Run from source.
- Audit logging for repository activity.
- Enforcement of organization policy, including encryption with customer-managed encryption keys (CMEK) and location constraints.
- Scanning for OS and language package vulnerabilities in containers.
- Virtual repositories that aggregate multiple repositories behind a single host.
- Remote repositories that cache artifacts from upstream sources such as Docker Hub or Maven Central.
See the feature comparison for more details about these features.
Existing Container Registry images maintained by Google
Most Google-owned images previously hosted on Container Registry are now hosted on Artifact Registry in gcr.io
repositories. You don't need to change the URLs to pull these images. For example, you can still use the Cloud Build official builder images.
Cached Docker Hub images on mirror.gcr.io
Artifact Registry caches frequently-accessed public Docker Hub images on mirror.gcr.io
. For more information on using mirror.gcr.io
, see Pull cached Docker Hub images.
Choose a transition option
There are two types of repositories you can use to transition to Artifact Registry:
- gcr.io repositories in Artifact Registry
Repositories that are mapped to Container Registry
gcr.io
hostnames. Artifact Registry redirectsgcr.io
requests for your Container Registry hosts to corresponding Artifact Registry repositories in the same Google Cloud project.Use
gcr.io
repositories if:- You want to minimize the amount of setup and configuration required to transition your existing images and automation to Artifact Registry.
- You don't need to set up Artifact Registry repositories in a different Google Cloud project or region.
pkg.dev
repositories in Artifact Registrypkg.dev
Artifact Registry repositories that support all features and are fully independent of any existing Container Registry hosts.Use
pkg.dev
repositories if:- You have compliance requirements to store data in a specific region. Repositories with
gcr.io
domain support are only available in the same multi-regions as Container Registry hosts:asia
,eu
, andus
. - You want to set up your Artifact Registry repositories in a project that is different from the project where you are using Container Registry.
You want to redesign how and where you store images. For example:
- Create repositories in the same regions as your other Google Cloud regional resources, including runtimes such as Cloud Run and Google Kubernetes Engine.
- Set up repositories in regions that are closer to your teams. For example, you can create repositories in Australian regions instead of the
asia
multi-region, or in South American regions instead of theus
multi-region. - Create multiple Docker repositories in the same project and location with different Identity and Access Management policies. For example, you can set up a development repository and production repository in the
us-east1
region with different levels of access for developers.
You want to create virtual repositories that act as a single endpoint for downloads from multiple upstream
pkg.dev
standard mode repositories.You want to use remote repositories to act as proxies for external sources.
- You have compliance requirements to store data in a specific region. Repositories with
Standard, remote, virtual pkg.dev
and gcr.io
repositories can co-exist. For example, you can create gcr.io
repositories in Artifact Registry to transition your existing Container Registry setup and create pkg.dev
repositories for new work.
Use our transition tooling
Use the following tools to identify projects that have Container Registry usage, copy images from Container Registry to Artifact Registry, and automatically migrate multiple projects from Container Registry to Artifact Registry.
- Check Container Registry usage.
- Use our automatic migration tool to migrate projects from Container Registry to Artifact Registry, copy images, and select your preferred transition repository type.
- Copy images from Container Registry to Artifact Registry using the automatic migration tool, gcrane, Docker, or the gcloud CLI.
Feature comparison
The following table summarizes differences between Container Registry and Artifact Registry.
Feature | Container Registry | Artifact Registry |
---|---|---|
Supported formats | Container images only | Multiple artifact formats, including container images, language packages, and OS packages. |
Domain name | gcr.io | pkg.dev Artifact Registry can also store images for the |
Repository modes | Not applicable |
|
Registry creation | You create a registry host by pushing the first image to it. Container Registry stores images in Cloud Storage buckets in your Google Cloud project and actions such as granting registry-specific permissions must be applied directly to a bucket. | Creating a repository is a separate operation from pushing and pulling to clearly separate repository administration from repository usage.
In Artifact Registry, there are no Cloud Storage buckets to manage in your Google Cloud projects. You perform image management actions directly on a repository. |
Registry location | Only four multi-regional registry hosts are available in a Google Cloud project. | Create multiple, separately-controlled repositories in region or multi-region. |
Access control |
|
|
Authentication | Provides several authentication methods for pushing and pulling images with a third-party client. | Artifact Registry supports the same authentication methods as Container Registry. See Setting up authentication for Docker for details. |
Customer-managed encryption keys (CMEK) | Use CMEK to encrypt the storage buckets that contain your images. | Use CMEK to encrypt individual repositories. |
Using Google Cloud console | View and manage Container Registry images from the Container Registry section of Google Cloud console. | View a list of your Artifact Registry and Container Registry repositories in the Artifact Registry section of Google Cloud console. Manage your Artifact Registry repositories and images from this page. If you click a Container Registry repository, you are directed to the list of images in the Container Registry section of the Google Cloud console. |
Using gcloud CLI and API commands | Uses gcloud container images commands. Commands support shortened digests. If you don't specify the full digest string, Container Registry attempts to locate the correct image based on the partial string. There is no REST or RPC API for Container Registry. | Uses gcloud artifacts docker commands. Commands don't support shortened digests. For a comparison of Container Registry and Artifact Registry gcloud CLI commands, see the gcloud CLI command comparison. Artifact Registry provides a REST and RPC API for managing repositories and artifacts. |
Pub/Sub notifications | Publishes changes to the gcr topic. | Publishes changes to the gcr topic. If you create repositories in the same project as your existing Container Registry service, your existing Pub/Sub configuration works automatically. To learn more, see Configuring Pub/Sub notifications. |
Audit logging | Container Registry does not provide audit logs for registry activity. | Use Cloud Logging to track changes to your repositories. |
Cached Docker Hub images | mirror.gcr.io is a pull-through cache that stores the most frequently requested Docker Hub images across all users. mirror.gcr.io is in now hosted on Artifact Registry. | mirror.gcr.io is in now hosted on Artifact Registry. No action is required unless you are using mirror.gcr.io in a VPC Service Controls perimeter. For more information on using mirror.gcr.io in a VPC Service Controls perimeter, see Use Artifact Registry with VPC Service Controls. |
VPC Service Controls | You can add Container Registry to a service perimeter. | You can add Artifact Registry to a service perimeter. |
Metadata storage and analysis with Artifact Analysis | Scans for OS and language package vulnerabiities with on-demand scanning in images with a supported OS. Automatic scanning only returns OS vulnerability information. Learn more about types of scanning.
| Scans for OS and lanaguage package vulnerabiities with both on-demand and automatic scanning. Learn more about types of scanning.
|
Image streaming | Unavailable | Stream images in Artifact Registry to GKE or Dataproc Serverless for faster autoscaling, faster pod startup, and reduced latency when pulling large images. |
Cloud Run source deployment | Unavailable | Source deployment lets you use a single gcloud CLI command to build a container image from your source code, store the image in Artifact Registry, and deploy it to Cloud Run. |
Pricing | Container Registry pricing is based on Cloud Storage usage, including storage and network data transfer. Since registry hosts are only available in multi-regions, data transfer costs include deploying images to Google Cloud | Artifact Registry has its own pricing, based on storage and network data transfer. |
Quota | Container Registry has fixed request limits. Cloud Storage quotas also apply. For details, see the quota and limits documentation. | Artifact Registry has per-project and per-user quotas. Per-user quota is unlimited by default, but you can configure a per-user cap so that a single user does not consume too much of the project-level quota. |
gcloud command comparison
The following table summarizes Container Registry commands and the equivalent Artifact Registry commands in the gcloud CLI. Click a link in the table to view reference page for the command.
The table does not include all available Artifact Registry commands that have no equivalent in Container Registry. See the gcloud artifacts
documentation for the full Artifact Registry command reference.
Operation | Container Registry | Artifact Registry |
---|---|---|
Create a repository | Not applicable. | gcloud artifacts repositories create |
Delete a repository | Not applicable. | gcloud artifacts repositories delete |
List images | gcloud container images list | gcloud artifacts docker images list |
List tags | gcloud container images list-tags | gcloud artifacts docker tags list |
Add a tag | gcloud container images add-tag | gcloud artifacts docker tags add |
Delete a tag | gcloud container images untag | gcloud artifacts docker tags delete |
Describe images | gcloud container images describe | gcloud artifacts docker images list --include-tags |