Kaniko Tutorial : Build container images without Docker Daemon

KarthiKeyan Shanmugam
5 min readNov 26, 2018

Google has recently introduced Kaniko, an open-source tool for building container images from a Dockerfile even without privileged root access.If you’ve noticed, Docker daemon always runs as the root user.It actually binds to a Unix socket instead of a TCP port. By default, Unix socket is owned by the user root and other users can only access it using sudo command. With kaniko, we can build an image from a Dockerfile and push it to a registry without root access. Since it doesn’t require any special privileges or permissions,it can be run in an environment that can’t have access to privileges or a Docker daemon.

Kaniko Logo
Image — Kaniko Logo

With this context,lets try and understand how it works and build container image using Kaniko tool.

How it works ?

Kaniko runs as container and takes in three arguments: a Dockerfile, a build context and the name of the registry to which it should push the final image.It fetches and extracts the base-image file system to root (the base image is the image in the FROM line of the Dockerfile). It executes each command in order, and takes a snapshot of the file system after each command.

Image - Kaniko : How it works ?
Image — Kaniko : How it works ? / Source — Google

Kaniko unpacks the filesystem, executes commands and snapshots the filesystem completely in user-space within the executor image.Since its running inside user-space, it avoids requiring privileged access on your machine and also docker daemon or CLI is not involved.

Products from Amazon.in

Learn Docker - Fundamentals of Docker 18.x: Everything you need to know about containerizing your applications and running them in production
Docker : A Quick-Start Beginner's Guide
Docker: Docker Tutorial for Beginners Build Ship and Run
Beginning DevOps with Docker: Automate the deployment of your environment with the power of the Docker toolchain
Continuous Delivery with Docker and Jenkins
The Docker Book: Containerization is the new virtualization
Docker Deep Dive
AWS Certified Solutions Architect Official Study Guide (India reprint edition): Associate Exam

Build container images using Kaniko

The recommended way to set up kaniko is to use the readymade executor image which can be started as a Docker container or as a container within Kubernetes.

docker run \
-v <path-on-host>:<path-inside-container> \
gcr.io/kaniko-project/executor:latest \
--dockerfile=<path to dockerfile> \
--context=<path-inside-container> \
--destination=<repo with image name>:<tag>

Here

  • -v indicates path to Dockerfile and its dependencies + Path to be used inside the container
  • gcr.io/kaniko-project/executor is the Kaniko executor
  • --dockerfile path to the Dockerfile (including the file name)
  • --context path to the mounted directory (inside the container)
  • --destination represents the full URL to the Docker Registry with Image name : Tag
docker run \
-v $(pwd):/usr \
gcr.io/kaniko-project/executor:latest \
--dockerfile=OrdAppDockerfile \
--context=/usr \
--destination=localhost:5000:5.1
Sample Dockerfile
Image — Sample Dockerfile (Spring Boot Java application)
Building container image using Kaniko
Image — Building container image using Kaniko

If authentication is enabled on your destination registry then mount the local Docker config.json file to the kaniko container, so that it can authenticate with the credentials for the destination Docker Registry.

Like Kaniko,there are also other tools like img and orca-build that builds container images from Dockerfiles, but with different approaches.

In this article you have learned how to build Docker images using Kaniko without using Docker.As always, there is much more to the Kaniko tool than what was covered here, but now you would have got a good insights on basics.Also please keep in mind that kaniko is under ongoing development and maybe not all commands from the Dockerfile are supported currently.

Like this post? Don’t forget to share it!

Additional Resources

Originally published at @upnxtblog.

--

--