- 코딩을 다시 즐겁게··· 개발자를 위한 14가지 전처리기
- Perimeter Security Is at the Forefront of Industry 4.0 Revolution
- Black Friday sales just slashed the Apple Watch SE (2nd Gen) to its lowest price ever
- Get an Apple Watch Series 10 for $70 off for the first time ahead of Black Friday
- The 15 best Black Friday Target deals 2024
Docker Best Practices: Using Tags and Labels to Manage Docker Image Sprawl | Docker
With many organizations moving to container-based workflows, keeping track of the different versions of your images can become a problem. Even smaller organizations can have hundreds of container images spanning from one-off development tests, through emergency variants to fix problems, all the way to core production images. This leads us to the question: How can we tame our image sprawl while still rapidly iterating our images?
A common misconception is that by using the “latest” tag, you are guaranteeing that you are pulling the “latest” version of the image. Unfortunately, this assumption is wrong — all latest means is “the last image pushed to this registry.”
Read on to learn more about how to avoid this pitfall when using Docker and how to get a handle on your Docker images.
Using tags
One way to address this issue is to use tags when creating an image. Adding one or more tags to an image helps you remember what it is intended for and helps others as well. One approach is always to tag images with their semantic versioning (semver), which lets you know what version you are deploying. This sounds like a great approach, and, to some extent, it is, but there is a wrinkle.
Unless you’ve configured your registry for immutable tags, tags can be changed. For example, you could tag my-great-app
as v1.0.0
and push the image to the registry. However, nothing stops your colleague from pushing their updated version of the app with tag v1.0.0
as well. Now that tag points to their image, not yours. If you add in the convenience tag latest
, things get a bit more murky.
Let’s look at an example:
FROM busybox:stable-glibc
# Create a script that outputs the version
RUN echo -e "#!/bin/shn" > /test.sh &&
echo "echo "This is version 1.0.0"" >> /test.sh &&
chmod +x /test.sh
# Set the entrypoint to run the script
ENTRYPOINT ["/bin/sh", "/test.sh"]
We build the above with docker build -t tagexample:1.0.0 .
and run it.
$ docker run --rm tagexample:1.0.0
This is version 1.0.0
What if we run it without a tag specified?
$ docker run --rm tagexample
Unable to find image 'tagexample:latest' locally
docker: Error response from daemon: pull access denied for tagexample, repository does not exist or may require 'docker login'.
See 'docker run --help'.
Now we build with docker build .
without specifying a tag and run it.
$ docker run --rm tagexample
This is version 1.0.0
The latest
tag is always applied to the most recent push that did not specify a tag. So, in our first test, we had one image in the repository with a tag of 1.0.0
, but because we did not have any pushes without a tag, the latest
tag did not point to an image. However, once we push an image without a tag, the latest
tag is automatically applied to it.
Although it is tempting to always pull the latest
tag, it’s rarely a good idea. The logical assumption — that this points to the most recent version of the image — is flawed. For example, another developer can update the application to version 1.0.1, build it with the tag 1.0.1
, and push it. This results in the following:
$ docker run --rm tagexample:1.0.1
This is version 1.0.1
$ docker run --rm tagexample:latest
This is version 1.0.0
If you made the assumption that latest
pointed to the highest version, you’d now be running an out-of-date version of the image.
The other issue is that there is no mechanism in place to prevent someone from inadvertently pushing with the wrong tag. For example, we could create another update to our code bringing it up to 1.0.2. We update the code, build the image, and push it — but we forget to change the tag to reflect the new version. Although it’s a small oversight, this action results in the following:
$ docker run --rm tagexample:1.0.1
This is version 1.0.2
Unfortunately, this happens all too frequently.
Using labels
Because we can’t trust tags, how should we ensure that we are able to identify our images? This is where the concept of adding metadata to our images becomes important.
The first attempt at using metadata to help manage images was the MAINTAINER
instruction. This instruction sets the “Author” field (org.opencontainers.image.authors
) in the generated image. However, this instruction has been deprecated in favor of the more powerful LABEL
instruction. Unlike MAINTAINER
, the LABEL
instruction allows you to set arbitrary key/value pairs that can then be read with docker inspect
as well as other tooling.
Unlike with tags, labels become part of the image, and when implemented properly, can provide a much better way to determine the version of an image. To return to our example above, let’s see how the use of a label would have made a difference.
To do this, we add the LABEL
instruction to the Dockerfile, along with the key version
and value 1.0.2
.
FROM busybox:stable-glibc
LABEL version="1.0.2"
# Create a script that outputs the version
RUN echo -e "#!/bin/shn" > /test.sh &&
echo "echo "This is version 1.0.2"" >> /test.sh &&
chmod +x /test.sh
# Set the entrypoint to run the script
ENTRYPOINT ["/bin/sh", "/test.sh"]
Now, even if we make the same mistake above where we mistakenly tag the image as version 1.0.1, we have a way to check that does not involve running the container to see which version we are using.
$ docker inspect --format='{{json .Config.Labels}}' tagexample:1.0.1
{"version":"1.0.2"}
Best practices
Although you can use any key/value as a LABEL
, there are recommendations. The OCI provides a set of suggested labels within the org.opencontainers.image
namespace, as shown in the following table:
Label | Content |
org.opencontainers.image.created | The date and time on which the image was built (string, RFC 3339 date-time). |
org.opencontainers.image.authors | Contact details of the people or organization responsible for the image (freeform string). |
org.opencontainers.image.url | URL to find more information on the image (string). |
org.opencontainers.image.documentation | URL to get documentation on the image (string). |
org.opencontainers.image.source | URL to the source code for building the image (string). |
org.opencontainers.image.version | Version of the packaged software (string). |
org.opencontainers.image.revision | Source control revision identifier for the image (string). |
org.opencontainers.image.vendor | Name of the distributing entity, organization, or individual (string). |
org.opencontainers.image.licenses | License(s) under which contained software is distributed (string, SPDX License List). |
org.opencontainers.image.ref.name | Name of the reference for a target (string). |
org.opencontainers.image.title | Human-readable title of the image (string). |
org.opencontainers.image.description | Human-readable description of the software packaged in the image (string). |
Because LABEL
takes any key/value, it is also possible to create custom labels. For example, labels specific to a team within a company could use the com.myorg.myteam
namespace. Isolating these to a specific namespace ensures that they can easily be related back to the team that created the label.
Final thoughts
Image sprawl is a real problem for organizations, and, if not addressed, it can lead to confusion, rework, and potential production problems. By using tags and labels in a consistent manner, it is possible to eliminate these issues and provide a well-documented set of images that make work easier and not harder.