Statements (65)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:archaeological_site
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Azure
|
gptkbp:allows |
Automated image builds
|
gptkbp:can_be_used_with |
gptkb:Azure_Dev_Ops
|
gptkbp:developed_by |
gptkb:Microsoft
|
gptkbp:enables |
Private container registry
|
gptkbp:features |
Build and push images
|
https://www.w3.org/2000/01/rdf-schema#label |
Azure Container Registry
|
gptkbp:integrates_with |
gptkb:Azure_Kubernetes_Service
|
gptkbp:is_accessible_by |
gptkb:Azure_Portal
|
gptkbp:is_available_for |
Enterprise solutions
|
gptkbp:is_available_in |
Multiple Azure regions
|
gptkbp:is_compatible_with |
gptkb:Cloud_Computing_Service
Container runtimes Third-party CI/ CD tools |
gptkbp:is_integrated_with |
gptkb:Azure_Security_Center
gptkb:Cloud_Computing_Service |
gptkbp:is_part_of |
Azure cloud services
Cloud-native applications Microsoft Azure ecosystem Dev Ops workflows |
gptkbp:is_used_by |
gptkb:software
IT operations teams |
gptkbp:is_used_for |
Microservices architecture
Application deployment Storing container images |
gptkbp:managed_by |
gptkb:Azure_Resource_Manager
|
gptkbp:offers |
Service health monitoring
Custom domain support Backup and restore capabilities Performance optimization features Geo-replication Image tagging Security scanning for images |
gptkbp:provides |
Audit logs
Role-based access control Integration with Azure Monitor User authentication mechanisms Webhooks for notifications Resource management capabilities Docker container storage Image distribution Access control via Azure Active Directory Container image signing Image vulnerability scanning |
gptkbp:supports |
Continuous integration
API access Multi-region deployments Helm charts Container orchestration tools Docker CLI Container lifecycle management Private endpoints Multi-architecture images Container image versioning Image retention policies Container image lifecycle policies Container image promotion Container image replication Container security best practices Image access policies Image scanning policies OCI images Service principals for authentication |