Use Image Cleaner to clean up stale images on your Azure Kubernetes Service cluster (preview)
It's common to use pipelines to build and deploy images on Azure Kubernetes Service (AKS) clusters. While great for image creation, this process often doesn't account for the stale images left behind and can lead to image bloat on cluster nodes. These images can present security issues as they may contain vulnerabilities. By cleaning these unreferenced images, you can remove an area of risk in your clusters. When done manually, this process can be time intensive, which Image Cleaner can mitigate via automatic image identification and removal.
Note
Image Cleaner is a feature based on Eraser.
On an AKS cluster, the feature name and property name is Image Cleaner
while the relevant Image Cleaner pods' names contain Eraser
.
Important
AKS preview features are available on a self-service, opt-in basis. Previews are provided "as is" and "as available," and they're excluded from the service-level agreements and limited warranty. AKS previews are partially covered by customer support on a best-effort basis. As such, these features aren't meant for production use. For more information, see the following support articles:
Prerequisites
- An Azure subscription. If you don't have an Azure subscription, you can create a free account.
- Azure CLI or Azure PowerShell and the
aks-preview
0.5.96 or later CLI extension installed. - The
EnableImageCleanerPreview
feature flag registered on your subscription:
First, install the aks-preview extension by running the following command:
az extension add --name aks-preview
Run the following command to update to the latest version of the extension released:
az extension update --name aks-preview
Then register the EnableImageCleanerPreview
feature flag by using the az feature register command, as shown in the following example:
az feature register --namespace "Microsoft.ContainerService" --name "EnableImageCleanerPreview"
It takes a few minutes for the status to show Registered. Verify the registration status by using the az feature show command:
az feature show --namespace "Microsoft.ContainerService" --name "EnableImageCleanerPreview"
When the status reflects Registered, refresh the registration of the Microsoft.ContainerService resource provider by using the az provider register command:
az provider register --namespace Microsoft.ContainerService
Limitations
Image Cleaner does not support the following:
- ARM64 node pools. For more information, see Azure Virtual Machines with ARM-based processors.
- Windows node pools.
How Image Cleaner works
When enabled, an eraser-controller-manager
pod is deployed, which generates an ImageList
CRD. The eraser pods running on each nodes will clean up the unreferenced and vulnerable images according to the ImageList. Vulnerability is determined based on a trivy scan, after which images with a LOW
, MEDIUM
, HIGH
, or CRITICAL
classification are flagged. An updated ImageList
will be automatically generated by Image Cleaner based on a set time interval, and can also be supplied manually.
Once an ImageList
is generated, Image Cleaner will remove all the images in the list from node VMs.
Configuration options
In addition to choosing between manual and automatic mode, there are several options for Image Cleaner:
Name | Description | Required |
---|---|---|
--enable-image-cleaner | Enable the Image Cleaner feature for an AKS cluster | Yes, unless disable is specified |
--disable-image-cleaner | Disable the Image Cleaner feature for an AKS cluster | Yes, unless enable is specified |
--image-cleaner-interval-hours | This parameter determines the interval time (in hours) Image Cleaner will use to run. The default value for Azure CLI is one week, the minimum value is 24 hours and the maximum is three months. | Not required for Azure CLI, required for ARM template or other clients |
Note
After disabling Image Cleaner, the old configuration still exists. This means that if you enable the feature again without explicitly passing configuration, the existing value will be used rather than the default.
Enable Image Cleaner on your AKS cluster
To create a new AKS cluster using the default interval, use az aks create:
az aks create -g MyResourceGroup -n MyManagedCluster \
--enable-image-cleaner
To enable on an existing AKS cluster, use az aks update:
az aks update -g MyResourceGroup -n MyManagedCluster \
--enable-image-cleaner
The --image-cleaner-interval-hours
parameter can be specified at creation time or for an existing cluster. For example, the following command updates the interval for a cluster with Image Cleaner already enabled:
az aks update -g MyResourceGroup -n MyManagedCluster \
--image-cleaner-interval-hours 48
After the feature is enabled, the eraser-controller-manager-xxx
pod and collector-aks-xxx
pod will be deployed.
Based on your configuration, Image Cleaner will generate an ImageList
containing non-running and vulnerable images at the desired interval. Image Cleaner will automatically remove these images from cluster nodes.
Manually remove images
To manually remove images from your cluster using Image Cleaner, first create an ImageList
. For example, save the following as image-list.yml
:
apiVersion: eraser.sh/v1alpha1
kind: ImageList
metadata:
name: imagelist
spec:
images:
- docker.io/library/alpine:3.7.3 # You can also use "*" to specify all non-running images
And apply it to the cluster:
kubectl apply -f image-list.yml
A job named eraser-aks-xxx
will be triggered which causes Image Cleaner to remove the desired images from all nodes.
Disable Image Cleaner
To stop using Image Cleaner, you can disable it via the --disable-image-cleaner
flag:
az aks update -g MyResourceGroup -n MyManagedCluster
--disable-image-cleaner
Logging
Deletion image logs are stored in eraser-aks-nodepool-xxx
pods for manually deleted images, and in collector-aks-nodes-xxx
pods for automatically deleted images.
You can view these logs by running kubectl logs <pod name> -n kubesystem
. However, this command may return only the most recent logs, since older logs are routinely deleted. To view all logs, follow these steps to enable the Azure Monitor add-on and use the Container Insights pod log table.
Ensure that Azure monitoring is enabled on the cluster. For detailed steps, see Enable Container Insights for AKS cluster.
Get the Log Analytics resource ID:
az aks show -g <resourceGroupofAKSCluster> -n <nameofAksCluster>
After a few minutes, the command returns JSON-formatted information about the solution, including the workspace resource ID:
"addonProfiles": { "omsagent": { "config": { "logAnalyticsWorkspaceResourceID": "/subscriptions/<WorkspaceSubscription>/resourceGroups/<DefaultWorkspaceRG>/providers/Microsoft.OperationalInsights/workspaces/<defaultWorkspaceName>" }, "enabled": true } }
In the Azure portal, search for the workspace resource ID, then select Logs.
Copy this query into the table, replacing
name
with eithereraser-aks-nodepool-xxx
(for manual mode) orcollector-aks-nodes-xxx
(for automatic mode).let startTimestamp = ago(1h); KubePodInventory | where TimeGenerated > startTimestamp | project ContainerID, PodName=Name, Namespace | where PodName contains "name" and Namespace startswith "kube-system" | distinct ContainerID, PodName | join ( ContainerLog | where TimeGenerated > startTimestamp ) on ContainerID // at this point before the next pipe, columns from both tables are available to be "projected". Due to both // tables having a "Name" column, we assign an alias as PodName to one column which we actually want | project TimeGenerated, PodName, LogEntry, LogEntrySource | summarize by TimeGenerated, LogEntry | order by TimeGenerated desc
Select Run. Any deleted image logs will appear in the Results area.
Feedback
Submit and view feedback for