Create a Kubernetes registry policy
Define a policy by managing registry access and configuration for Kubernetes clusters.
To create a Kubernetes registry policy, in the menu, under Environment-related, select Policies then select Create policy. From the policy type list, navigate to the Kubernetes > Registry section, select Custom then select Continue to begin configuring the policy.
Currently, only custom registry policies can be created. Future improvements to the policies feature will introduce policy templates.
Name
Define a name for this policy.
Environment groups
Select one or more Kubernetes environment groups from the dropdown menu. If the selected group is already included in an existing policy, a warning icon will appear next to the group name.
Select registry
Select a registry from the dropdown menu.
Namespaces
Select one or more namespaces that you want to have access to the selected registry.

Click Add Access to add the registry to the access list. You can add multiple entries, and each will appear in the Registry access list table. To remove a registry, select the checkbox next to the entry and click Remove in the top right corner of the table.
To ensure that only approved container images can be deployed, enable Restrict to allowed sources and specify the images that are permitted.
When adding an allowed image, you can choose the scope:
Global - The image can be deployed across the entire cluster.
Specific namespaces - The image can only be deployed within selected namespaces.
Restricting container images requires Kubernetes 1.30 or later.
The Allowed sources list is pre-populated with common images, including those required for Portainer to operate.
Restrict sources
When enabled, Portainer creates a Kubernetes ValidatingAdmissionPolicy to ensure only container images from approved registries can be deployed. Any Pod that references an image from an unapproved source will be rejected at admission time and will not be created.
Registry URL prefix
The container image or registry that is permitted for deployment.
Enter the registry hostname and optional path prefix. Only images whose fully-qualified reference starts with this prefix will be allowed.
Scope
Specify whether the allowed access should apply cluster-wide (Global) or be restricted to selected namespaces only.

Click Add source to add an image to the allowed sources list. You can add multiple entries, and each will appear in the Allowed sources table. To remove a source, select the checkbox next to the entry and click Remove in the top right corner of the table.
When you have finished adding access, click Create policy. A confirmation screen displays the changes being made and any existing policy that will be replaced. Click Confirm to acknowledge the changes and create the policy.
Last updated
Was this helpful?