Skip to content

Images

dockmesh’s Images page shows every image on every host with size, age, in-use status, and vulnerability count (if scanning is enabled).

Columns:

ColumnDescription
Repository:TagFull image reference with digest tooltip
Image IDShort SHA
SizeOn-disk size, uncompressed
CreatedWhen the image was built
HostWhich host holds this copy
In use✓ if at least one container uses this image
CVEsCount from Grype scan (if enabled)

Multiple hosts often have the same image — each copy is a separate row unless you group by repository.

Actions → Pull image opens a dialog:

  • Reference — e.g. postgres:16-alpine or ghcr.io/org/app:latest
  • Host — single host or broadcast to a tag
  • Credentials — optional, uses the saved registry if the reference matches

Pull progress streams live with per-layer bars. On failure, the full error is shown (DNS, auth, rate-limit, etc.).

For private registries, save credentials once under Settings → Registries:

FieldExample
Nameghcr-private
URLghcr.io
Usernamedockmesh-bot
Password / Tokenghp_...
ScopeAll hosts, or tag filter

Supported registries (tested):

  • Docker Hub (anonymous or auth)
  • GitHub Container Registry (ghcr.io)
  • GitLab Container Registry (registry.gitlab.com)
  • AWS ECR (with access key / secret)
  • Google Artifact Registry (with service account JSON)
  • Harbor (private)
  • Gitea registry
  • Any Docker v2-compatible registry

Credentials are encrypted at rest using the same key derivation as the CA.

Over time, dangling images and old tags accumulate. dockmesh has three prune modes:

  • Dangling only — images with <none> tags, safe to remove
  • Unused — images not currently referenced by any container
  • All but current — aggressive; keeps only images in use by running containers

Runs per-host. Dry-run preview shows what would be deleted before you confirm.

Schedule recurring prunes under Settings → Maintenance → Image prune (weekly default).

Clicking an image shows:

  • Full digest
  • Layer-by-layer breakdown with size and creation command
  • Environment and exposed ports from the manifest
  • Architecture (linux/amd64, linux/arm64, …)
  • Base image (if detectable)
  • Vulnerability report (CVE list with severity, fixed version)