Manual setup of the base image ImageStreams
In case the image mirroring is not working for ImageStreams in your cluster please perform the following workaround:
- Please open the ImageStreams overview in your installation namespace (e.g. - k5-tools) in the OpenShift Console- Navigate to Builds → ImageStreams 
 
- Disable automated creation of the ImageStreams (after the IBM Industry Solutions Workbench Operator has reconciled the three Imagestreams will be deleted: - k5-domain-server,- k5-solution-ubi8-node,- k5-solution-ubi8-openjdk)- add the following value - spec.values.service-builder.k5-pipeline-manager.tekton.imageStreams.initialize: falseto your ISW Custom Resource, like:
 
apiVersion: k5.ibm.com/v1beta1
kind: ISW
metadata:
  name: k5-tools
  namespace: k5-tools
spec:
  designer:
    enabled: true
  domain: apps.openshift.my.cloud
  license:
    accept: true
  values:
    global:
      network:
        egressPolicy:
          enabled: false
    service-builder:
      k5-pipeline-manager:
        tekton:
          imageStreams:
            initialize: false- Please open the - defaultServiceAccount in your installation namespace (e.g.- k5-tools) in the OpenShift Console and add the image pull secret (- ibm-entitlement-key)- Navigate to User Management → ServiceAccounts 
- Open the ServiceAccount - default
- Add an entry with name - ibm-entitlement-keyto the- imagePullSecretssection
- The - defaultServiceAccount should look like the following example (please do not change or delete the ServiceAccount, only add the image pull secret):
 
kind: ServiceAccount
apiVersion: v1
metadata:
  name: default
  namespace: k5-tools
secrets:
  - name: default-token-69fdc
  - name: default-dockercfg-tm9ch
imagePullSecrets:
  - name: default-dockercfg-tm9ch
  - name: ibm-entitlement-key- Apply the following ImageStreams manually to your installation namespace, e.g. - k5-tools(Note that the name, tag, image name and image digest must not be changed, only the- <YOUR_PRIVATE_REGISTRY>placeholder should be replaced with your registry)
kind: ImageStream
apiVersion: image.openshift.io/v1
metadata:
  name: k5-domain-server
  namespace: k5-tools
spec:
  lookupPolicy:
    local: false
  tags:
    - name: 6.0.96
      from:
        kind: DockerImage
        name: <YOUR_PRIVATE_REGISTRY>/isw_release-domain-server@sha256:d9a592df5263f26b5da973fcc42a21f846abd847c7006c8a73cce46351f19593
      importPolicy:
        importMode: Legacy
      referencePolicy:
        type: Sourcekind: ImageStream
apiVersion: image.openshift.io/v1
metadata:
  name: k5-solution-ubi8-node
  namespace: k5-tools
spec:
  lookupPolicy:
    local: false
  tags:
    - name: 5.2.14
      from:
        kind: DockerImage
        name: <YOUR_PRIVATE_REGISTRY>/isw_release-solution-ubi8-node@sha256:733f78296fbf371e5ece203945a11ea9a9a30352562c3cb73458202de9de4d60
      importPolicy:
        importMode: Legacy
      referencePolicy:
        type: Sourcekind: ImageStream
apiVersion: image.openshift.io/v1
metadata:
  name: k5-solution-ubi8-openjdk
  namespace: k5-tools
spec:
  lookupPolicy:
    local: false
  tags:
    - name: 5.2.14
      from:
        kind: DockerImage
        name: <YOUR_PRIVATE_REGISTRY>/isw_release-solution-ubi8-openjdk@sha256:058e495d661a934b7a5d294d0a1a5216ea37e72660710f610644da00cc9f5b34
      importPolicy:
        importMode: Legacy
      referencePolicy:
        type: Sourcede.icr.io/isw_release with your registry.- Open and validate the created ImageStreams (no error should be shown)