Skip to content

monch1962/minimise-docker-golang-image-size

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Minimising the size of Docker images for Golang code

Steps to minimise the size of your Golang Docker images

Overview

We're going to go through the exercise of making a minimally-sized Docker image for a Go executable.

Now, we want to run this code inside a Docker container, rather than as a standalone executable file running on a server or VM. Docker images wrap around the code they're running, and those Docker images are what Docker needs to execute. Given those Docker images consume resources when we run them, we want to create Docker images that are as small as possible so they consume as little resource as possible - that way we can run more concurrent instances of our helloworld on each Docker host or Kubernetes node.

Let's start with a simple helloworld app

$ cat helloworld.go
package main
import "fmt"
func main() {
    fmt.Println("hello world")
}
$

My development environment

These days, virtually all the code I write runs in a cloud. It's been a few years since I've written code that runs on a system I can touch, and even longer since I wrote code intended to run on the machine I code with.

Given this and the fact that I have near-perfect Internet connectivity almost everywhere, I no longer write code on my own systems. A big benefit of this is that I don't have to keep updating tools on my development system - and that's just fine with me. I've tried several options, but the platform I currently use to develop code is Google Cloud.

Specifically, I spin up a Google Cloud Shell instance, which gives me an on-demand Linux VM I can access from within a web browser i.e. from just about any device, including laptops, iPads and even a phone if I get caught out. That Linux VM is pretty small, but it contains current versions of all the tools I want and Google maintains it for me. Google will terminate the Linux VM if I leave it idle for too long, but will recreate it when I try to access it again AND all my files will be where I left them. I can have multiple terminal sessions running on that Linux VM; I generally use tmux to have a window-like system with multiple terminal sessions open in a single web browser tab.

If I want to use something like Visual Studio, Intellij, VS Code or Eclipse, I can mount the Cloud Shell file system to my local device via sshfs and edit code on my local computer rather than via the shell. For Golang, I typically use either VS Code running on my laptop for coding sessions, and occasionally use vi on the Cloud Shell instance for quick fixes or when I don't have my laptop available.

Oh, and that Google Cloud Shell is completely free for as long as I like.

I also use Azure Pipelines or Google Cloud Build to give me a CI capability that requires minimal ongoing effort on my part. When I check code into a repo, either of those tools will automatically jump in and test it to ensure I haven't broken anything with the latest changes. That gets me away from having to execute tests locally.

Make sure the code actually works

We can run this helloworld code quickly to see that does what we expect

$ go run helloworld.go
hello world
$

Good.

Let's compile it and try it out

$ go build helloworld.go
$ ./helloworld
hello world
$

All good to go.

Check the file size of the Golang executable

Now let's see how big those files are. I'm running this on a Google Cloud Shell instance, so if you're on another platform your results might be a bit different. That doesn't matter for the purpose of this exercise

$ ls -l *
total 1956
-rwxr-xr-x 1 monch1962 monch1962 1993406 Aug  1 20:41 helloworld
-rw-r--r-- 1 monch1962 monch1962      73 Aug  1 20:32 helloworld.go
$

As you can see, the helloworld executable is slightly under 2Mb in size. If you're going to run this file inside a Docker container, that container with the executable file can't be any smaller than 2Mb (i.e. the size of this file). Let's see what happens when we put that file into a container

Debian container

Now let's create a container image based on Debian. As I write this, the current version of Debian is named 'stretch', and there's a Golang image based on stretch. Let's use that to compile and run our code

$ cat Dockerfile
FROM golang:stretch
WORKDIR /
COPY helloworld.go .
RUN go build helloworld.go
CMD ["./helloworld"]
$

Does it work?

$ docker build . -t debian-container
...
$ docker run debian-container
hello world
$

We've got our helloworld app running inside a container, so are we done here? Let's see how big that container image is...

$ docker images | grep debian-container
debian-container     latest              a4c67ca2c404        28 seconds ago      776MB

Ouch - our 2Mb executable has ballooned to 776Mb when we wrap it inside a Docker container based on the standard Debian base image

golang-latest container

There's a standard Golang container, so presumably that's what we should be using for Golang code. Let's build a Dockerfile based on that to run our helloworld app

First the Dockerfile

$ cat Dockerfile
FROM golang:latest
WORKDIR /
COPY helloworld.go .
RUN go build helloworld.go
CMD ["./helloworld"]
$

Now let's build it

$ docker build . -t golang-latest
$

Does it work OK?

$ docker run golang-latest
hello world
$

Yes it does. We're looking good...

Now, let's look how big that image is

$ docker images | grep golang-latest
REPOSITORY          TAG                 IMAGE ID            CREATED             SIZE
golang-latest       latest              7476c4302e9a        6 seconds ago       816MB

Hmm... Our 2Mb executable, wrapped in a container image, turns into 816Mb in size. What the...?

Can we do any better?

Golang-alpine container

Alpine is a Linux distribution specifically designed to let us produce small container images. It contains an absolute minimal set of functionality out of the box - no bash, no curl, no compilers, ... - so we're going to have to add any tools we need to Alpine in order to build our helloworld executable.

To make our life a bit easier, there's a version of the Alpine container that includes just the packages necessary to compile and execute Golang applications. Let's build a Dockerfile for that and see how it goes

$ cat Dockerfile
FROM golang:alpine
WORKDIR /
COPY helloworld.go .
RUN go build helloworld.go
CMD ["./helloworld"]
$ docker build . -t golang-alpine
...
$ docker run golang-alpine
hello world
$ docker images | grep golang-alpine
REPOSITORY          TAG                 IMAGE ID            CREATED             SIZE
golang-alpine       latest              849a6d791860        3 minutes ago       352MB
$

OK, we're getting somewhere. Just getting rid of all the unnecessary stuff in a general-purpose base container and going with minimal Alpine has reduced our container size from 816Mb to 352Mb. That's a big improvement, but it's still a whole lot bigger than our 2Mb executable file

What else can we try?

Multi-stage build

There's a workflow we can use to separate out the build of the Golang executable from having a container able to run it. Let's look at how that would work

$ cat Dockerfile
# build stage
FROM golang:alpine as builder
RUN mkdir /build
ADD . /build/
WORKDIR /build
RUN go build -o main .

# final stage
FROM alpine
RUN adduser -S -D -H -h /app appuser
USER appuser
COPY --from=builder /build/main /app/
WORKDIR /app
CMD ["./main"]
$ docker build . -t multistage-alpine
...
$ docker run multistage-alpine
helloworld
$

Now that Dockerfile looks quite a bit different to what we've used before, but it seems to have given us a working image. Before we go into the contents of the Dockerfile, let's see how big that image is

$ docker images | grep multistage-alpine
REPOSITORY          TAG                 IMAGE ID            CREATED             SIZE
multistage-alpine   latest              64f614b0c4fd        2 minutes ago       7.58MB
$

Now we're kicking goals! We've gone from a 352Mb image file when we were building and running the executable within the one Alpine container, down to 7.58Mb. I can deploy a whole lot of 7.58Mb images on a typical VM/Kubernetes node.

Now we've established this approach is giving a much smaller image size, what's with this Dockerfile?

Note that there's 2 distinct sections in the Dockerfile: build stage and final stage. Our helloworld app is compiled in the build stage, then we spin up a different Alpine image, copy the compiled helloworld from build state into that 'empty' Alpine image and run it.

That second Alpine image is just basic Alpine, plus our executable - no Go compiler, and virtually nothing else

So... can we do even better? Just how small can our Docker image get?

Multi-stage scratch build

SCRATCH is a base container image that contains ... nothing. Not a file, not even an operating system. Huh?

$ cat Dockerfile
# build stage
FROM golang:alpine as builder
RUN mkdir /build
ADD . /build/
WORKDIR /build
RUN go build -o main .
# final stage
FROM scratch
COPY --from=builder /build/main /app/
WORKDIR /app
CMD ["./main"]
$ docker build . -t multistage-scratch
...
$ docker run multistage-scratch
hello world
$ docker images | grep multistage-scratch
REPOSITORY           TAG                 IMAGE ID            CREATED             SIZE
multistage-scratch   latest              cee55e91289d        20 seconds ago      2MB

Now we've shrunk our image even further. It's essentially the same size as the helloworld executable, so we're probably not going to get it any smaller than that.

Awesome. We've got a working helloworld container that's pretty much the same size as the helloworld executable. I can live with this.

But this approach has its gotchas...

A (slightly) more useful application

Let's look at some code that does a bit more than print helloworld.

$ cat google-page-size.go
package main

import (
    "fmt"
    "io/ioutil"
    "net/http"
    "os"
)

func main() {
    resp, err := http.Get("https://google.com")
    check(err)
    body, err := ioutil.ReadAll(resp.Body)
    check(err)
    fmt.Println(len(body))
}

func check(err error) {
    if err != nil {
        fmt.Println(err)
        os.Exit(1)
    }
}
$

This code will download Google's home page, and print the number of bytes in the body of that page

$ go run google-page-size.go
11452
$ go build google-page-size.go
$ ./google-page-size
11452
$

Note that the executable file size is now 6.9Mb. That's the new best-case size for a Docker image to run this code.

$ ls -l google*
total 6992
-rwxr-xr-x 1 monch1962 monch1962 6913929 Aug  2 00:32 google-page-size
-rw-r--r-- 1 monch1962 monch1962     337 Aug  1 23:52 google-page-size.go
$

Now let's build it using the same multistate/scratch approach as before. The Dockerfile is unchanged

$ cat Dockerfile
more Dockerfile
# build stage
FROM golang:alpine as builder
RUN mkdir /build
ADD . /build/
WORKDIR /build
RUN go build -o main .

# final stage
FROM scratch
COPY --from=builder /build/main /app/
WORKDIR /app
CMD ["./main"]
$ docker build . -t multistage-scratch-gps
...
$ docker images | grep multistage-scratch-gps
REPOSITORY               TAG                 IMAGE ID            CREATED             SIZE
multistage-scratch-gps   latest              08045d01587a        3 minutes ago       6.93MB
$ docker run multistage-scratch-gps
standard_init_linux.go:211: exec user process caused "no such file or directory"
$

Our image size is once again pretty much the same size as the executable file within it, but it now fails when we try to run it.

What happened?

The problem is that this Golang app is a bit more complex, and is expecting to use some OS libraries when it executes. As the SCRATCH base image doesn't include an OS, those OS libraries aren't inside the image we've created, so we get an error.

The workaround for this is to compile any necessary libraries into the Go executable. We do this by changing the parameters in the go build step

$ cat Dockerfile
# build stage
FROM golang:alpine as builder
RUN mkdir /build
ADD . /build/
WORKDIR /build
# RUN go build -o main .
RUN CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -o main .

# final stage
FROM scratch
COPY --from=builder /build/main /app/
WORKDIR /app
CMD ["./main"]
$ docker build . -t multistage-scratch-gps
...
$ docker images | grep multistage-scratch-gps
REPOSITORY               TAG                 IMAGE ID            CREATED             SIZE
multistage-scratch-gps   latest              3ba6548d7c9f        9 seconds ago       6.87MB
$ docker run multistage-scratch-gps
Get https://google.com: x509: certificate signed by unknown authority
$

Note that the container size has shrunk slightly after we've compiled in those libraries. Not sure why it's gotten smaller rather than larger, but it works and that's all I care about.

We've gotten past the previous problem, but now we've hit another one. What's going on here?

The code we're running is doing an https request. The site we're hitting (https://google.com) is legitimate, and the TLS certificate it's returning is signed by a valid authority. Unfortunately, the container running our code has no root certificates installed, so it can't validate the certificate being returned by https://google.com as coming from a legitimate source. It therefore exits with an error.

We need to get the root certificates into the container for this code to work. In my Google Cloud Shell instance, the relevant file is /etc/ssl/certs/ca-certificates.crt, so I'll copy that file into my current directory where the docker build can load them into the image to be run.

$ cp /etc/ssl/certs/ca-certificates.crt .
$ cat Dockerfile
# build stage
FROM golang:alpine as builder
RUN mkdir /build
ADD . /build/
WORKDIR /build
# RUN go build -o main .
RUN CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -o main .

# final stage
FROM scratch
ADD ca-certificates.crt /etc/ssl/certs/
COPY --from=builder /build/main /app/
WORKDIR /app
CMD ["./main"]
$ docker build . -t multistage-scratch-gps
...
$ docker images | grep multistage-scratch-gps
REPOSITORY               TAG                 IMAGE ID            CREATED              SIZE
multistage-scratch-gps   latest              c183bf901f10        About a minute ago   7.1MB
$ docker run multistage-scratch-gps
11448
$

All good.

Note that including the root certificates into the container has increased the image size from 6.87Mb to 7.1Mb. That's quite a reasonable change, and still lets us run a load of these images on each Docker host or Kubernetes node.

Other languages

Java

Contrast this with Java code, where the Docker image will need to contain either a JVM or JRE plus the OS itself. A similar article on minimising the size of Java images is at https://qiita.com/h-r-k-matsumoto/items/1725fc587ce127671560; using Java 11 and jlink, they were able to shrink the size of a trivial Java app running in a Docker container from 1Gb+ down to an 85Mb image. Impressive, but still an order of magnitude larger than the size of a trivial Golang application.

Python

Python code will need to include the Python interpreter plus any libraries required by the application. A similar article on minimising the size of Java container images is at https://medium.com/bytes-mania/building-small-python-docker-images-how-to-8bb539d3e6fc where they were able to get the size of a trivial Python app running in a Docker container down to a 75Mb image.

Node.js

Node.js code will need to include the Node runtime, plus any libraries explicitly requested by the application, plus any cascading library dependencies. A similar article on minimising the size of Node.js container images is at https://antonfisher.com/posts/2018/03/19/reducing-docker-image-size-of-a-node-js-application/ where they were able to get the size of a not-quite-so-trivial Node app running in a Docker container down to a 79Mb image.

Minimal base distributions

Alpine

A very small image based on Alpine Linux is available from https://hub.docker.com/_/alpine. It is only 5Mb in size, is maintained by the Alpine Linux team, and can be extended for a wide range of use cases.

Many projects provide base images based on Alpine Linux, which has become something of a defacto standard for deploying services with minimal image sizes. Examples of these projects include Node, Nginx, MySQL, OpenJDK, Postgres - all of which provide tiny images built on Alpine Linux, which are maintained by the respective projects.

Distroless

Google maintains a set of "distroless" images at https://github.com/GoogleContainerTools/distroless. These images are language-specific, and are designed to give fairly minimal containers with just enough support to run applicatons written in those languages. These are often a good, generic choice when you don't need to create the smallest possible image size

UBI Micro

Redhat maintains an image they call "UBI Micro", which can be accessed via https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html-single/building_running_and_managing_containers/index#con_understanding-the-ubi-micro-images_assembly_types-of-container-images. This image is language-independent, and provide a small base image designed to suit for a wide range of use cases.

Redhat provides support for this image, but it is freely distributable

Conclusion

It's possible to get Docker images running Golang code to be very small - close to the size of the executable itself. A trivial Go application compiles to about a 2Mb executable. It's quite common to have useful Golang executables around 10-20Mb in size, and following the steps above should give you Docker images of a similar size.

About

Steps to minimise the size of your Golang Docker images

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages