Preparing for Bitnami Image Removal from ECR Public
The impending removal of Bitnami images from Amazon ECR Public is a critical issue for anyone relying on these container images in production. After June 10th, 2026, any attempt to pull images from public.ecr.aws/bitnami/ will fail. This means that if you don’t act now, your deployments could face unexpected downtime when they attempt to refresh images due to crashes, scaling events, or CI/CD updates.
Currently, Bitnami manages 317 container image repositories on ECR Public. If a container needs to re-pull its image—whether due to a crash, restart, or a rolling update—it will fail if the image is still pointing to the public repository. To mitigate this risk, you must update your image URIs to point to a private ECR repository. This involves pulling the images from the public registry, tagging them appropriately, and pushing them to your own ECR repository. The process is straightforward, but it requires diligence to ensure all deployments are updated.
Keep in mind that these steps are only a temporary fix. No new Bitnami images will be published to ECR, meaning your images will become outdated over time. It's crucial to explore alternatives for these container images to avoid future issues. The transition to a private ECR repository is essential for maintaining operational stability beyond 2026.
Key takeaways
- →Update your image URIs to point to your private ECR repository before June 10th, 2026.
- →Use the provided bash scripts to automate the migration of Bitnami images to your ECR.
- →Be aware that any event triggering a fresh image pull will fail if you haven't updated your image references.
- →Consider finding alternative container images, as Bitnami will not publish new images to ECR.
- →Monitor your deployments closely after migration to ensure they are pulling from the correct repository.
Why it matters
Failing to update your image URIs could lead to service disruptions in your Kubernetes deployments, impacting your application's availability and reliability.
Code examples
# Search your local project files
grep -r "public.ecr.aws/bitnami/" .# Authenticate to your private ECR registry
aws ecr get-login-password --region <region> | docker login --username AWS
--password-stdin <your-account-id>.dkr.ecr.<region>.amazonaws.com# Pull, tag, and push
docker pull public.ecr.aws/bitnami/<image-name>:<tag>
docker tag public.ecr.aws/bitnami/<image-name>:<tag>
<your-account-id>.dkr.ecr.<region>.amazonaws.com/bitnami/<image-name>:<tag>
docker push <your-account-id>.dkr.ecr.<region>.amazonaws.com/bitnami/<image-name>:<tag>When NOT to use this
The official docs don't call out specific anti-patterns here. Use your judgment based on your scale and requirements.
Want the complete reference?
Read official docsUnified observability — logs, uptime monitoring, and on-call in one place. Used by 50,000+ engineering teams to ship faster and sleep better.
Try Better Stack free →Kubernetes v1.36: Mixed Version Proxy Moves to Beta
Kubernetes v1.36 brings the Mixed Version Proxy (MVP) to beta, enhancing cluster upgrade safety. This feature ensures requests for resources not recognized by an older API server are properly routed to a newer one, preventing frustrating 404 errors.
Reclaiming Engineering Time: Streamlining Kubernetes Upgrades
Kubernetes upgrades can drain your engineering resources, often consuming weeks of effort. With critical vulnerabilities emerging mid-upgrade, it’s crucial to streamline your upgrade process to minimize downtime and maximize productivity.
Kubernetes v1.36: Unlocking Declarative Validation for Production
Kubernetes v1.36 brings Declarative Validation to General Availability, solving the problem of inconsistent validation rules across your API. With the new validation-gen code generator, you can define validation directly in your types.go files using +k8s: tags.
Get the daily digest
One email. 5 articles. Every morning.
No spam. Unsubscribe anytime.