If a question you have is not answered below, please submit an issue.
But, I'm not a Java developer.
How do I run the image I built?
Where is bash?
How do I set parameters for my image at runtime?
What image format does Jib use?
Can I define a custom entrypoint?
Where is the application in the container filesystem?
I need to RUN commands like apt-get
.
Can I ADD a custom directory to the image?
Can I build to a local Docker daemon?
I am seeing ImagePullBackoff
on my pods.
How do I configure a proxy?
How can I diagnose problems pulling or pushing from remote registries?
How can I examine network traffic?
How do I view debug logs for Jib?
How do I enable debugging?
Why is my image created 48 years ago?
I would like to run my application with a javaagent.
How can I tag my image with a timestamp?
See rules_docker for a similar existing container image build tool for the Bazel build system. The tool can build images for languages such as Python, NodeJS, Java, Scala, Groovy, C, Go, Rust, and D.
If you built your image directly to the Docker daemon using jib:dockerBuild
(Maven) or jibDockerBuild
(Gradle), you simply need to use docker run <image name>
.
If you built your image to a registry using jib:build
(Maven) or jib
(Gradle), you will need to pull the image using docker pull <image name>
before using docker run
.
To run your image on Kubernetes, you can use kubectl:
kubectl run jib-deployment --image=<image name>
For more information, see steps 4-6 of the Kubernetes Engine deployment tutorial.
By default, Jib uses distroless/java
as the base image. Distroless images contain only runtime dependencies. They do not contain package managers, shells or any other programs you would expect to find in a standard Linux distribution. Check out the distroless project for more information about distroless images.
If you would like to include a shell for debugging, set the base image to gcr.io/distroless/java:debug
instead. The shell will be located at /busybox/sh
. Note that :debug
images are not recommended for production use.
Configuring a base image in Maven
In jib-maven-plugin
, you can use the gcr.io/distroless/java:debug
base image by adding the following configuration:
<configuration>
<from>
<image>gcr.io/distroless/java:debug</image>
</from>
</configuration>
Configuring a base image in Gradle
In jib-gradle-plugin
, you can use the gcr.io/distroless/java:debug
base image by adding the following configuration:
jib.from.image = 'gcr.io/distroless/java:debug'
You can then run the image in shell form with Docker: docker run -it --entrypoint /busybox/sh <image name>
For the default distroless/java
base image, you can use the JAVA_TOOL_OPTIONS
environment variable (note that other JRE images may require using other environment variables):
Using Docker: docker run -e "JAVA_TOOL_OPTIONS=<JVM flags>" <image name>
Using Kubernetes:
apiVersion: v1
kind: Pod
spec:
containers:
- name: <name>
image: <image name>
env:
- name: JAVA_TOOL_OPTIONS
value: <JVM flags>
Using Docker: docker run -e "NAME=VALUE" <image name>
Using Kubernetes:
apiVersion: v1
kind: Pod
spec:
containers:
- name: <name>
image: <image name>
env:
- name: NAME
value: VALUE
Using Docker: docker run <image name> <arg1> <arg2> <arg3>
Using Kubernetes:
apiVersion: v1
kind: Pod
spec:
containers:
- name: <name>
image: <image name>
args:
- <arg1>
- <arg2>
- <arg3>
For more information, see the JAVA_TOOL_OPTIONS
environment variable, the docker run -e
reference, and defining environment variables for a container in Kubernetes.
Jib currently builds into the Docker V2.2 image format or OCI image format.
See Extended Usage for the <container><format>
configuration.
See Extended Usage for the container.format
configuration.
The plugin attaches a default entrypoint that will run your application automatically.
When running the image, you can override this default entrypoint with your own custom command.
See docker run --entrypoint
reference for running the image with Docker and overriding the entrypoint command.
See Define a Command and Arguments for a Container for running the image in a Kubernetes Pod and overriding the entrypoint command.
Jib packages your Java application into the following paths on the image:
/app/libs/
contains all the dependency artifacts/app/resources/
contains all the resource files/app/classes/
contains all the classes files
Running commands like apt-get
slows down the container build process. We do not recommend or support running commands as part of the build.
However, if you need to run commands, you can build a custom image and configure Jib to use it as the base image.
Base image configuration examples
In jib-maven-plugin
, you can then use this custom base image by adding the following configuration:
<configuration>
<from>
<image>custom-base-image</image>
</from>
</configuration>
In jib-gradle-plugin
, you can then use this custom base image by adding the following configuration:
jib.from.image = 'custom-base-image'
We currently support adding a custom directory with an incubating feature. This feature may change in later versions. If your application needs to use custom files, place them into the src/main/jib
folder. Files placed here will be added to the filesystem of the container. For example, src/main/jib/foo/bar
would add /foo/bar
into the container filesystem.
There are several ways of doing this:
- Use
jib:dockerBuild
for Maven orjibDockerBuild
for Gradle to build directly to your local Docker daemon. - Use
jib:buildTar
for Maven orjibBuildTar
for Gradle to build the image to a tarball, then usedocker load --input
to load the image into Docker (the tarball built with these commands will be located intarget/jib-image.tar
for Maven andbuild/jib-image.tar
for Gradle by default). docker pull
the image built with Jib to have it available in your local Docker daemon.- Alternatively, instead of using a Docker daemon, you can run a local container registry, such as Docker registry or other repository managers, and point Jib to push to the local registry.
I am seeing ImagePullBackoff
on my pods (in minikube).
When you use your private image built with Jib in a Kubernetes cluster, the cluster needs to be configured with credentials to pull the image. This involves 1) creating a Secret, and 2) using the Secret as imagePullSecrets
.
kubectl create secret docker-registry registry-json-key \
--docker-server=<registry> \
--docker-username=<username> \
--docker-password=<password> \
--docker-email=<any valid email address>
kubectl patch serviceaccount default \
-p '{"imagePullSecrets":[{"name":"registry-json-key"}]}'
For example, if you are using GCR, the commands would look like (see Advanced Authentication Methods):
kubectl create secret docker-registry gcr-json-key \
--docker-server=https://gcr.io \
--docker-username=_json_key \
--docker-password="$(cat keyfile.json)" \
--docker-email=any@valid.com
kubectl patch serviceaccount default \
-p '{"imagePullSecrets":[{"name":"gcr-json-key"}]}'
See more at Using Google Container Registry (GCR) with Minikube.
Jib currently requires configuring your build tool to use the appropriate Java networking properties (https.proxyHost
, https.proxyPort
, https.proxyUser
, https.proxyPassword
).
There are a few reasons why Jib may be unable to connect to a remote registry, including:
- Access requires a proxy. See How do I configure a proxy? for details.
- The registry does not support HTTPS. We do not pass authentication details on non-HTTPS connections, though this can be overridden with the
sendCredentialsOverHttp
system property, but it is not recommend (version 0.9.9). - The registry's SSL certificates have expired or are not trusted. We have a separate document on handling registries that use self-signed certificates, which may also apply if the SSL certificate is signed by an untrusted Certificate Authority. Jib supports an
allowInsecureRegistries
flag to ignore SSL certificate validation, but it is not recommend (version 0.9.9). - The registry does not support the Docker Image Format V2 Schema 2 (sometimes referred to as v2-2). This problem is usually shown by failures wth
INVALID_MANIFEST
errors. Some registries can be configured to support V2-2 such as Artifactory and OpenShift. Other registries, such as Quay.io/Quay Enterprise, are in the process of adding support.
It can be useful to examine network traffic to diagnose connectivity issues. Jib uses the Google HTTP client library to interact with registries which logs HTTP requests using the JVM-provided java.util.logging
facilities. It is very helpful to serialize Jib's actions using the jibSerialize
property.
To see the HTTP traffic, create a logging.properties
file with the following:
handlers = java.util.logging.ConsoleHandler
java.util.logging.ConsoleHandler.level=ALL
# CONFIG hides authentication data
# ALL includes authentication data
com.google.api.client.http.level=CONFIG
And then launch your build tool as follows:
mvn -Djava.util.logging.config.file=path/to/log.properties -DjibSerialize=true ...
or
gradle -Djava.util.logging.config.file=path/to/log.properties -DjibSerialize=true ...
Maven: use mvn -X -DjibSerialize=true
to enable more detailed logging and serialize Jib's actions.
Gradle: use grade --debug -DjibSerialize=true
to enable more detailed logging and serialize Jib's actions.
If using the distroless/java
base image, then use the JAVA_TOOL_OPTIONS
to pass along debugging configuration arguments. For example, to have the remote VM accept debug connections on port 5005, but not suspend:
-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=5005
Then connect your debugger to port 5005 on the given host. You can port-forward the container port to a localhost port for easy access.
Using Docker: docker run -p 5005:5005 <image>
Using Kubernetes: kubectl port-forward <pod name> 5005:5005
For reproducibility purposes, Jib sets the creation time of the container images to 0 (January 1st, 1970). If you would like to forgo reproducibility and use the real creation time, set the useCurrentTimestamp
parameter to true
in your build configuration.
<configuration>
<container>
<useCurrentTimestamp>true</useCurrentTimestamp>
</container>
</configuration>
jib.container.useCurrentTimestamp = true
See Can I ADD a custom directory to the image?.
TODO: Provide more comprehensive solution.
To tag the image with a simple timestamp, add the following to your pom.xml
:
<properties>
<maven.build.timestamp.format>yyyyMMdd-HHmmssSSS</maven.build.timestamp.format>
</properties>
Then in the jib-maven-plugin
configuration, set the tag
to:
<configuration>
<to>
<image>my-image-name:${maven.build.timestamp}</image>
</to>
</configuration>
You can then use the same timestamp to reference the image in other plugins.
To tag the image with a timestamp, simply set the timestamp as the tag for to.image
in your jib
configuration. For example:
jib.to.image = 'gcr.io/my-gcp-project/my-app:' + System.nanoTime()