DEV Community

Cover image for Docker Image Optimization: Reducing Size for Faster Deployments
Dhananjay Patel
Dhananjay Patel

Posted on • Edited on

Docker Image Optimization: Reducing Size for Faster Deployments

Introduction

A few months ago, while working on a critical deployment for a client, we faced an unexpected issue: the deployment took forever to complete. The culprit? Bloated Docker images. The process was not only frustrating but also led to downtime we couldn’t afford.

This experience taught me an important lesson: small changes can make a big impact. By optimizing Docker images, we managed to cut deployment times in half, save storage costs, and improve our CI/CD pipeline's overall efficiency. Today, I’ll share the strategies we used to achieve this transformation.


Why Optimize Docker Images?

If you've ever experienced sluggish builds, long deployment times, or a cluttered registry filled with oversized images, you’re not alone. Here’s why reducing image sizes is crucial:

  1. Faster Builds: Your development cycles become quicker, letting you focus on what matters.
  2. Efficient Storage: Smaller images save disk space in your Docker registries and on your machines.
  3. Quicker Deployments: Deploying a smaller image over a network is much faster.
  4. Enhanced Security: Fewer components mean fewer vulnerabilities.

The Day We Shrunk Our Docker Images

I remember the first time I ran docker images after our optimization efforts. Seeing the "before" and "after" sizes felt like stepping on the weighing scale after weeks of gym sessions—you notice the difference, and it feels rewarding.

Here are the exact steps we followed to make that transformation happen:


7 Effective Ways to Optimize Docker Images

1. Choose a Minimal Base Image

Instead of starting with ubuntu:latest or other large images, we switched to alpine. This one change reduced the image size from 800MB to less than 30MB.

Example:

FROM alpine:latest
Enter fullscreen mode Exit fullscreen mode

2. Use Multi-Stage Builds

In many projects, such as a React application, we might have build dependencies (like Node.js and npm) that are only required during the build process but not needed in the production image. By using multi-stage builds, we can separate the build environment from the runtime environment, resulting in a much smaller image.

Example:

In this example, we’ll use a multi-stage build for a React app:

# Build Stage
FROM node:16 AS builder
WORKDIR /app
COPY package.json package-lock.json ./
RUN npm install
COPY . .
RUN npm run build

# Runtime Stage
FROM nginx:alpine
COPY --from=builder /app/build /usr/share/nginx/html
CMD ["nginx", "-g", "daemon off;"]
Enter fullscreen mode Exit fullscreen mode

In the above Dockerfile

  • The first stage uses the official node:16 image to install dependencies, build the React app, and generate static files.

  • The second stage uses the smaller nginx:alpine image to serve the built React app.

This multi-stage approach ensures that only the necessary build artifacts (the build directory) are included in the final image, keeping the image size minimal and optimized for production.


3. Remove Unnecessary Files

While debugging, we often included temporary files in our builds. By adding a .dockerignore file, we ensured these files never made it into the image.

Example .dockerignore:

node_modules
*.log
.git
Enter fullscreen mode Exit fullscreen mode

4. Combine and Minimize Layers

Each instruction in a Dockerfile (e.g., RUN, COPY, ADD) creates a new layer in the Docker image. Too many layers can bloat your image size. By combining multiple instructions into a single RUN statement, you can reduce the number of layers and optimize the image.

Example:

Instead of writing:

RUN apt-get update  
RUN apt-get install -y curl vim  
RUN apt-get clean  
RUN rm -rf /var/lib/apt/lists/*
Enter fullscreen mode Exit fullscreen mode

Combine them into one:

RUN apt-get update && apt-get install -y curl vim \
    && apt-get clean && rm -rf /var/lib/apt/lists/*
Enter fullscreen mode Exit fullscreen mode

This approach minimizes the number of layers and ensures temporary files (e.g., cache) are removed within the same layer, keeping the image smaller and cleaner.


5. Avoid Installing Unnecessary Dependencies

Initially, our Docker images had extra libraries "just in case." Over time, we realized that this led to bloated images and unnecessary security risks. By specifying only the dependencies that are actually needed for runtime, we kept the image smaller and more secure.

For example, instead of installing a large number of libraries for every project, we focused on minimal dependencies and avoided unnecessary packages.


6. Use docker-slim

A game-changer for our process was docker-slim. This tool automatically analyzes your images and reduces their size by removing unnecessary parts, such as unused files, binaries, and libraries, without affecting functionality.

We saw an image size reduction of up to 80% using docker-slim, making it an invaluable tool in our optimization strategy.

Command to slim down an image:

docker-slim build <image-name>
Enter fullscreen mode Exit fullscreen mode

7. Regularly Audit and Prune Images

Docker images accumulate over time, and unused images or layers can take up valuable space. Regularly auditing and pruning unused images helps maintain a clean environment.

You can remove unused images and layers by running these commands:

Command to prune unused images:

docker system prune -f
Enter fullscreen mode Exit fullscreen mode

Command to remove all unused images:

docker image prune -a -f
Enter fullscreen mode Exit fullscreen mode

By incorporating regular pruning into your workflow, you ensure that your Docker environment stays lean and efficient.


Measuring Success

After implementing these optimizations, we used docker images to compare sizes. The results were stunning:

  • Before Optimization: 1.2GB
  • After Optimization: 250MB

Not only did our deployments become faster, but our cloud storage costs also went down significantly.


Conclusion

Optimizing Docker images might seem like a minor task, but the benefits it brings to your workflows are immense. Whether you’re a solo developer or part of a large team, these strategies can make a real difference.

So, what are you waiting for? Dive into your Dockerfile, start optimizing, and enjoy the perks of leaner, faster deployments.


References

  1. Docker Official Documentation
  2. Best Practices for Writing Dockerfiles

📖 Love this blog? You can also read my articles on Hashnode and follow me there for more tech insights! 🚀


Top comments (15)

Collapse
 
swastikgorai profile image
S.Go

I'd suggest one to use a somewhat bigger base image in build phase, then use alpine or slim in application phase and move the deps to it. Cuz afaik and have had experience, directly using a small image at the beginning may cause some installation of deps to fail.

Collapse
 
thenanjay profile image
Dhananjay Patel

Thank you for sharing your insight! You’re absolutely right—starting with a slightly larger base image in the build phase can help avoid issues with dependency installations, especially when using minimal images like Alpine. Transitioning to a smaller image (like Alpine or a slim variant) in the runtime phase is indeed a smart way to balance compatibility and optimization.

For Node.js projects specifically, using the node image directly in the build phase is a great option since it comes pre-configured for most setups. Similarly, other tech stacks might benefit from base images tailored to their needs during the build phase.

Collapse
 
gaswigue profile image
Gaswigue

Using not alpine for dependency installation can install incompatible lib version for alpine.
Alpine use musl libc vs glibc for other base.
Another point, bumping your package.json version will invalidate the docker cache layer.
There is some technic to avoid this, like, using a temporary step setting the package.json to version 1.0 for instance before install.

Collapse
 
thenanjay profile image
Dhananjay Patel

Thank you for diving into these technical details—great points!

You’re absolutely correct about the musl libc vs. glibc difference. Alpine’s musl libc can indeed cause compatibility issues with some libraries, which is why choosing the right base image for dependency installation is crucial. This is also why multi-stage builds work so well—dependencies can be built in a compatible environment (glibc-based) and then moved to a smaller runtime image like Alpine if desired.

The point about package.json is spot on as well. When the version changes, it invalidates the Docker cache, which can significantly increase build times. I really like the technique you mentioned, where a temporary package.json with a static version is used during installation—it’s a clever way to maintain cache efficiency.

Collapse
 
simongreennet profile image
Simon Green • Edited

You said moving from ubuntu:latest to alpine:latest "reduced the image size from 800MB to less than 30MB". The current version of Ubuntu (sha fec8bfd95b54) is only 78 MB, and Alpine is 7.8 MB. I think there would have had to be other changes to have such a reduction.

In the forth point builtkit supports heredocs. Rather than endless && \ statements this would be more readable, especially for more complex runs.

RUN <<EOF
apt-get update
apt-get install -y curl vim
apt-get clean
rm -rf /var/lib/apt/lists/
EOF
Enter fullscreen mode Exit fullscreen mode
Collapse
 
danlee1996 profile image
Daniel Lee

Good article.

Will try to implement some of these techniques at my workplace.

Collapse
 
dhanu0510 profile image
Dhananjay Patel

Thank you! Glad you found it helpful—let me know how it works out for you! 🚀

Collapse
 
vijaym_gowda_88673ef1795 profile image
vijay.m Gowda • Edited

Wonderfu artical .. well, I have question.. will docker slim is reduces image vulnerabilities for open source images ?

Collapse
 
thenanjay profile image
Dhananjay Patel

Thank you for the kind words! 😊

As for your question: docker-slim does help in reducing image vulnerabilities to some extent. By removing unnecessary files, libraries, and binaries, it reduces the image’s attack surface. However, it’s important to note that it doesn’t directly fix known vulnerabilities in dependencies. For that, tools like Trivy or Snyk are super helpful to scan and address those issues.

Using docker-slim alongside regular vulnerability scans is a great combo for both smaller and safer images! 🚀

Collapse
 
surya_f8c6194ccabac1c4a88 profile image
Surya

Very helpful my trainer didn't teach me about these he skipped whatever thanks bro

Collapse
 
thenanjay profile image
Dhananjay Patel

Glad you found it helpful! Sometimes trainers skip over these finer details, but exploring them yourself makes the learning even more rewarding. Happy optimizing, bro! 🚀

Collapse
 
raphaelcarlosr profile image
raphaelcarlosr.dev

All these is in docker init command

Collapse
 
kurealnum profile image
Oscar

Multi-stage builds are also awesome for optimizing Docker stuff: docs.docker.com/build/building/mul...

Collapse
 
ashwingopalsamy profile image
Ashwin Gopalsamy

Useful. Thanks.

Collapse
 
afser_61b2f18859 profile image
Muhammed Afser

Article does a great job in listing the best practices while building docker images. Article is neat and precise. Keep up the great work.