Do you backup your docker images?
from thelocalhostinger@lemmy.world to selfhosted@lemmy.world on 30 Jan 11:55
https://lemmy.world/post/42401374

Not containers and data, but the images. The point would be reproducability in case a remote registry does not contain a certain image anymore. Do you do that and how?

#selfhosted

threaded - newest

wersooth@lemmy.ml on 30 Jan 12:00 next collapse

if there are some custom image, e.g. additional stuff I added to an existing image, then I backup the dockerfile. you can rebuild the image anytime and the size is smaller than a binary.

cactus@sh.itjust.works on 30 Jan 12:02 next collapse

good point, I might do that over the weekend :D

bravesilvernest@lemmy.ml on 30 Jan 12:03 collapse

Came here to say that: the most economic solution is to backup any dockerfiles themselves, though that also has the caveat that any installs within the build steps might also depend on external resources that could also be dropped.

There are methods of adding a local caching layer between your system and external, which might be what OP is after, but that involves investing in the additional space needed to back them up

ptz@dubvee.org on 30 Jan 12:12 next collapse

Yep. I’ve got a bunch of apps that work offline, so I back up the currently deployed version of the image in case of hardware or other failure that requires me to re-deploy it. I also have quite a few custom-built images that take a while to build, so having a backup of the built image is convenient.

I structure my Docker-based apps into dedicated folders with all of their config and data directories inside a main container directory so everything is kept together. I also make an images directory which holds backup dumps of the images for the stack.

  • Backup: docker save {image}:{tag} | gzip -9 > ./images/{image}-{tag}-{arch}.tar.gz
  • Restore docker load < ./images/{image}-{tag}-{arch}.tar.gz

It will backup/restore with the image and tag used during the save step. The load step will accept a gzipped tar so you don’t even need to decompress it first. My older stuff doesn’t have the architecture in the filename but I’ve started adding that lately now that I have a mix of amd64 and arm64.

bonenode@piefed.social on 30 Jan 12:27 next collapse

Thanks for sharing this!

4am@lemmy.zip on 30 Jan 17:59 collapse

Ah, cool. Seems like way less work than hosting a local registry. But, would I have to docker load every single one when needed? If I had to rebuild the docker host for example? Is it faster to just front load that work and build a local registry to pull through?

ptz@dubvee.org on 30 Jan 18:31 collapse

I also run (well, ran) a local registry. It ended up being more trouble than it was worth.

Would you have to docker load them all when rebuilding a host?

Only if you want to ensure you bring the replacement stack back up with the exact same version of everything or need to bring it up while you’re offline. I’m bad about using the :latest tag so this is my way of version-controlling. I’ve had things break (cough Authelia cough) when I moved it to another server and it pulled a newer image that had breaking config changes.

For me, it’s about having everything I need on hand in order to quickly move a service or restore it from a backup. It also depends on what your needs are and the challenges you are trying to overcome. i.e. When I started doing this style of deployment, I had slow, unreliable, ad heavily data-capped internet. Even if my connection was up, pulling a bunch of images was time consuming and ate away at my measly satellite internet data cap. Having the ability to rebuild stuff offline was a hard requirement when I started doing things this way. That’s now no longer a limitation, but I like the way this works so have stuck with it.

Everything a service (or stack of services) needs is all in my deploy directory which looks like this:

/apps/{app_name}/
    docker-compose.yml
    .env
    build/
        Dockerfile
        {build assets}
    data/
        {app_name}
        {app2_name}  # If there are multiple applications in the stack
        ...
    conf/                   # If separate from the app data
        {app_name}
        {app2_name}
        ...
    images/
        {app_name}-{tag}-{arch}.tar.gz
        {app2_name}-{tag}-{arch}.tar.gz

When I run backups, I tar.gz the whole base {app_name} folder which includes the deploy file, data, config, and dumps of its services images and pipe that over SSH to my backup server (rsync also works for this). The only ones I do differently are ones with in-stack databases that need a consistent snapshot.

When I pull new images to update the stack, I move the old images and docker save the now current ones. The old images get deleted after the update is considered successful (so usually within 3-5 days).

A local registry would work, but you would have to re-tag all of the pre-made images to your registry (e.g. docker tag library/nginx docker.example.com/nginx) in order to push them to it. That makes updates more involved and was a frequent cause of me running 2+ year old versions of some images.

Plus, you’d need the registry server and any infrastructure it needs such as DNS, file server, reverse proxy, etc before you could bootstrap anything else. Or if you’re deploying your stack to a different environment outside your own, then your registry server might not be available.

Bottom line is I am a big fan of using Docker to make my complex stacks easy to port around, backup, and restore. There’s many ways to do that, but this is what works best for me.

tofu@lemmy.nocturnal.garden on 30 Jan 12:46 next collapse

No. They are cached on the hosts, thats enough for me.

Decronym@lemmy.decronym.xyz on 30 Jan 12:50 next collapse

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
DNS Domain Name Service/System
Git Popular version control system, primarily for code
HTTP Hypertext Transfer Protocol, the Web
IP Internet Protocol
SSH Secure Shell for remote terminal access
SSL Secure Sockets Layer, for transparent encryption
VPN Virtual Private Network
nginx Popular HTTP server

[Thread #44 for this comm, first seen 30th Jan 2026, 12:50] [FAQ] [Full list] [Contact] [Source code]

officermike@lemmy.world on 30 Jan 14:04 collapse

While I don’t necessarily have an issue with the intent of this bot, literally none of the initialisms listed were in the OP or any of the comments, as far as I can see.

ea6927d8@lemmy.ml on 30 Jan 14:47 next collapse

The bot is a vibe-coded interface to an “AI”.

bravesilvernest@lemmy.ml on 30 Jan 15:19 collapse

subprocess.PIPE Found “IP” 😂

ada@lemmy.blahaj.zone on 30 Jan 13:36 next collapse

Nope. Data directories and compose files only.

Onomatopoeia@lemmy.cafe on 30 Jan 15:50 next collapse

Curious, have you tested rebuilding using this approach?

It makes sense to me, if the compose files are up-to-date, it should just work.

I’d only be concerned about ensuring I capture changes made to the container that happened after initial build.

enchantedgoldapple@sopuli.xyz on 30 Jan 16:30 next collapse

I can attest to it. Lately my server needed to be repaired and got its entire disk wiped. Fortunately I managed to back up my compose files and bind mounts. After reinstalling the OS and transferring the backed up contents, I ran ‘docker compose up’ and eventually everything came back up exactly how they were when being backed up. Even the Postgres backup of Joplin was recovered purely from its bind mount.

surewhynotlem@lemmy.world on 30 Jan 21:01 next collapse

That’s the secret. I never change the container.

If you absolutely must do some config on the container, then have a container creation script that creates a new container with the right settings and use that.

#pipelines

teawrecks@sopuli.xyz on 31 Jan 09:11 collapse

I feel like if that’s something you’re doing, you’re using containers wrong. At least docker ones. I expect a container to have no state from run to run except what is written to mounted volumes. I should always be able to blow away my containers and images, and rebuild them from scratch. Afaik docker compose always implicitly runs with –rm for this reason.

Bakkoda@lemmy.world on 30 Jan 22:21 collapse

This is how i do it. I can delete everything, repull and redeploy like nothing ever happened.

I have one exception and thats my calibre-web container. I have all my books backed up separately and I’ll be nuking that whole set up eventually.

eskuero@lemmy.fromshado.ws on 30 Jan 13:48 next collapse

Yes I do. I cooked a small python script that runs at the end of every daily backup

import subprocess
import json
import os

# Output directory
OUTPUT_DIR = "/data/dockerimages"
try:
        os.mkdir(OUTPUT_DIR)
except:
        pass

# Grab all the docker images. Each line a json string defining the image
imagenes = subprocess.Popen(["docker", "images", "--format", "json"], stdout = subprocess.PIPE, stderr = subprocess.DEVNULL).communicate()[0].decode().split("\n")

for imagen in imagenes[:-1]:
        datos = json.loads(imagen)
        # ID of the image to save
        imageid = datos["ID"]
        # Compose the output name like this
        # ghcr.io-immich-app-immich-machine-learning:release:2026-01-28:3c42f025fb7c.tar
        outputname = f"{datos["Repository"]}:{datos["Tag"]}:{datos["CreatedAt"].split(" ")[0]}:{imageid}.tar".replace("/", "-")
        # If the file already exists just skip it
        if not os.path.isfile(f"{OUTPUT_DIR}/{outputname}"):
                print(f"Saving {outputname}...")
                subprocess.run(["docker", "save", imageid, "-o", f"{OUTPUT_DIR}/{outputname}"])
        else:
                print(f"Already exists {outputname}")
doeknius_gloek@discuss.tchncs.de on 30 Jan 13:52 next collapse

Yes. I run Harbor and pull all images through its proxy cache.

HelloRoot@lemy.lol on 30 Jan 14:11 next collapse

i selfhost a pullthrough docker repository, so every container I use is stored in there and can be pulled offline.

4am@lemmy.zip on 30 Jan 17:57 next collapse

This is the way

marv99@feddit.org on 31 Jan 09:35 collapse

Can you please tell, which self-hosted solution you are using?

HelloRoot@lemy.lol on 31 Jan 11:22 collapse

afaik I’m on an older version of github.com/distribution/…/distribution

my compose somehow doesn’t have much info … i should have made more notes

image: registry:2

marv99@feddit.org on 31 Jan 14:31 collapse

Thank you, I will give it a try :)

panda_abyss@lemmy.ca on 30 Jan 14:11 next collapse

I do run my own forgejo container repo, and I mirror containers I need there.

But I don’t backup my containers, just the data directories I mount to them. 

irmadlad@lemmy.world on 30 Jan 14:17 next collapse

I back up everything.

just_another_person@lemmy.world on 30 Jan 15:38 next collapse

I mean…you have the container right there on your machine. If you’re concerned, just run your own registry and push copies there when needed. This of course is all unnecessary, as you only need the Dockerfile to build a clean image from scratch, and it will obviously work if it’s already been published.

4am@lemmy.zip on 30 Jan 17:56 collapse

As long as the internet works and the image is still available.

Which is kind of the whole point, homie.

just_another_person@lemmy.world on 30 Jan 19:49 collapse

Again, it’s nearly impossible to scrub the entire internet of the code to just run a single command and build a docker image of whatever you were running yourself. If you have the image locally, you can just push it anywhere you want.

Keep Dockerfile, keep checkouts of what you’re running, or push images locally. All very simple.

HumanPerson@sh.itjust.works on 30 Jan 18:20 next collapse

I used to but then I switched out the server I was doing backups to and have been thinking “I’ll get to it later” for many months. If anything goes wrong I’m screwed. I’ll get to it later ¯_(ツ)_/¯

GreenKnight23@lemmy.world on 30 Jan 23:35 next collapse

yes. all of the images I use are cached and stored in my locally hosted gitlab registry.

I think I’ve got around 120-140 images. a lot of what I have is just in case of an emergency.

I’ve always imagined I could build and run technological infrastructure after a social collapse or something, so I have a lot of images that could be a good basis to start with. Most OS images, popular DB images, etc. it would probably never work, but I’d rather have the option than not.

realitaetsverlust@piefed.zip on 31 Jan 00:16 next collapse

I’m kinda confused by all of the people here doing that tbh.

The entire point of dockerfiles is to have them produce the same image over and over again. Meaning, I can take the dockerfile, spin it up on any machine on gods green earth and have it run there in the exact same state as anywhere else, minus eventual configs or files that need to be mounted.

Now, if I’m worried about an image disappearing from a remote registry, I just download the dockerfile and have it stored locally somewhere. But backuping the entire image seems seriously weird to me and kinda goes against of the spirit of docker.

crater2150@feddit.org on 31 Jan 09:19 collapse

A lot of Dockerfiles start with installing dependencies via the base image’s package manager, without specifying exact versions (which isn’t always possible, as most distros don’t keep all history of all packages in their repos). So all your dependencies may have different versions, when you build again.

realitaetsverlust@piefed.zip on 31 Jan 12:32 collapse

True, but I got two problems with that thought chain:

  1. I don’t want any outdated dependencies within my network. There might be a critical bug in them and if I back up the images, I keep those bugs with me. That seems pretty silly.
  2. If an application breaks because you updated dependencies, you either have to upgrade the application aswell or got some abandonware on your hands, in which case it’s probably time to find a new one.
r0ertel@lemmy.world on 31 Jan 02:31 next collapse

I’ve been looking to do this, but haven’t found a good, easy to use pull thru proxy for docker, ghcr.io and some other registries. Most support docker only.

This one looks promising but overly complicated to set up.

A few times now, I’ve gone to restart a container and the repo’s been moved, archived or paywalled. Other times, I’m running a few versions behind and the maintainer decided to not support it, but upgrading would mean a complete overhaul of my Helm values file. Ugh!

I was considering a docker registry on separate ports for each upstream registry I’d like to proxy/cache.

kumi@feddit.online on 31 Jan 08:21 collapse

Just a small number of base images (ubuntu:, alpine:, debian:) are routinely synced, and anything else is built in CI from Containerfiles. Those are backed up. So as long as backups are intact can recover from loss of the image store even without internet.

I also have a two-tier container image storage anyway which gives redundancfor the built images but thats more of a side-effect of workarounds.. Anyway, the “source of truth” docker-registry which is pushed to is only exposed internally to the one who needs to do authenticated push, and to the second layer of pull-through caches which the internal servers actually pull from. So backups aside, images that are in active use already at least three copies (push-registry, pull-registry, and whoevers running it). The mirrored public images are a separate chain alltogether.

This has been running for a while so all handwired from component services. A dedicated Forgejo deployment looks like it could serve for a large part of above in one package today. Plus it conveniently syncs external git dependencies.