Skip to content

Latest commit

 

History

History
112 lines (76 loc) · 7.73 KB

README.monitor-base.md

File metadata and controls

112 lines (76 loc) · 7.73 KB

Featured Tags

  • 8 (Long-Term Support)
    • docker pull mcr.microsoft.com/dotnet/monitor/base:8

About

This image contains the .NET Monitor Base installation.

Use this image as a base image for building a .NET Monitor image with extensions.

Watch discussions for Docker-related .NET announcements.

New: Ubuntu Chiseled Images

Ubuntu Chiseled .NET images are a type of "distroless" container image that contain only the minimal set of packages .NET needs, with everything else removed. These images offer dramatically smaller deployment sizes and attack surface by including only the minimal set of packages required to run .NET applications.

Please see the Ubuntu Chiseled + .NET documentation page for more info.

Usage

The .NET Docker samples show various ways to use .NET and Docker together. See Building Docker Images for .NET Applications to learn more.

Building a Custom .NET Monitor Image

The following Dockerfiles demonstrate how you can use this base image to build a .NET Monitor image with a custom set of extensions.

Related Repositories

.NET:

.NET Framework:

Full Tag Listing

Linux amd64 Tags

Tags Dockerfile OS Version
8.0.1-ubuntu-chiseled-amd64, 8.0-ubuntu-chiseled-amd64, 8-ubuntu-chiseled-amd64, 8.0.1-ubuntu-chiseled, 8.0-ubuntu-chiseled, 8-ubuntu-chiseled, 8.0.1, 8.0, 8, latest Dockerfile Ubuntu 22.04
8.0.1-cbl-mariner-distroless-amd64, 8.0-cbl-mariner-distroless-amd64, 8-cbl-mariner-distroless-amd64, 8.0.1-cbl-mariner-distroless, 8.0-cbl-mariner-distroless, 8-cbl-mariner-distroless Dockerfile CBL-Mariner 2.0-distroless
.NET Monitor Preview Tags
Tags Dockerfile OS Version
9.0.0-preview.1-ubuntu-chiseled-amd64, 9.0-preview-ubuntu-chiseled-amd64, 9.0.0-preview.1-ubuntu-chiseled, 9.0-preview-ubuntu-chiseled, 9.0.0-preview.1, 9.0-preview, 9-preview Dockerfile Ubuntu 22.04
9.0.0-preview.1-cbl-mariner-distroless-amd64, 9.0-preview-cbl-mariner-distroless-amd64, 9.0.0-preview.1-cbl-mariner-distroless, 9.0-preview-cbl-mariner-distroless Dockerfile CBL-Mariner 2.0-distroless

Linux arm64 Tags

Tags Dockerfile OS Version
8.0.1-ubuntu-chiseled-arm64v8, 8.0-ubuntu-chiseled-arm64v8, 8-ubuntu-chiseled-arm64v8, 8.0.1-ubuntu-chiseled, 8.0-ubuntu-chiseled, 8-ubuntu-chiseled, 8.0.1, 8.0, 8, latest Dockerfile Ubuntu 22.04
8.0.1-cbl-mariner-distroless-arm64v8, 8.0-cbl-mariner-distroless-arm64v8, 8-cbl-mariner-distroless-arm64v8, 8.0.1-cbl-mariner-distroless, 8.0-cbl-mariner-distroless, 8-cbl-mariner-distroless Dockerfile CBL-Mariner 2.0-distroless
.NET Monitor Preview Tags
Tags Dockerfile OS Version
9.0.0-preview.1-ubuntu-chiseled-arm64v8, 9.0-preview-ubuntu-chiseled-arm64v8, 9.0.0-preview.1-ubuntu-chiseled, 9.0-preview-ubuntu-chiseled, 9.0.0-preview.1, 9.0-preview, 9-preview Dockerfile Ubuntu 22.04
9.0.0-preview.1-cbl-mariner-distroless-arm64v8, 9.0-preview-cbl-mariner-distroless-arm64v8, 9.0.0-preview.1-cbl-mariner-distroless, 9.0-preview-cbl-mariner-distroless Dockerfile CBL-Mariner 2.0-distroless

You can retrieve a list of all available tags for dotnet/monitor/base at https://mcr.microsoft.com/v2/dotnet/monitor/base/tags/list.

Tags not listed in the table above are not supported. See the Supported Tags Policy

Support

Lifecycle

Image Update Policy

  • We update supported .NET images within 12 hours of any updates to their base images (e.g. debian:bookworm-slim, windows/nanoserver:ltsc2022, etc.).
  • We re-build all .NET images as part of releasing new versions of .NET including new major/minor versions and servicing.
  • Distroless images such as Ubuntu Chiseled have no base image, and as such will only be updated with .NET releases and CVE fixes as described below.

CVE Update Policy

.NET container images are regularly monitored for the presence of CVEs. A given image will be rebuilt to pick up fixes for a CVE when:

  • We detect the image contains a CVE with a CVSS score of "Critical"
  • AND the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
  • AND there is a CVE fix for the package available in the affected base image's package repository.

Feedback

License