Containers
Bitnami image removal from ECR Public
Starting on June 10th, 2026, Bitnami container images will no longer be available on Amazon ECR Public Gallery. If you currently pull Bitnami images directly from ECR Public in your workloads, you need to take action before this date to avoid service disruption.
In this post, we walk you through how to determine if you’re affected, how to mirror the images you need to your own private registry, and best practices for protecting your workloads from future upstream changes.
Background
Bitnami currently manages 317 container image repositories on the Amazon ECR Public Gallery, covering popular open-source applications and development stacks. Bitnami images will no longer be hosted or published on ECR Public after June 10th, 2026.
After the removal date, any image pull request to public.ecr.aws/bitnami/ will fail.
Am I affected?
You are affected if your workloads directly reference Bitnami images on ECR Public. Common places where this may occur includes:
- Amazon ECS task definitions
- Amazon EKS pod specifications
- Helm charts
- Dockerfiles
- CI/CD pipelines (AWS CodePipeline, CodeBuild, GitHub Actions, etc.)
- AWS CloudFormation or Terraform templates
To determine if you are impacted by Bitnami’s removal of their images from ECR Public, look for image URIs matching the following in your configurations, and deployment templates: public.ecr.aws/bitnami/
Understanding the impact
It’s important to understand how removal affects both running and new workloads:
Running containers with locally cached images will continue to operate normally until they need to re-pull the image for any reason. Any event that triggers a fresh image pull will fail. These events include:
- A container crash or restart
- A scaling event that launches new tasks or pods
- A new build in your CI/CD pipeline
- A rolling update or redeployment
- Node replacement in your cluster
In production environments, these events happen frequently and often automatically. Without your action, your applications and build process that rely on Bitnami images in ECR Public will eventually fail.
How to mitigate impact
Step 1: Identify your affected workloads
Start by searching your infrastructure for references to public.ecr.aws/bitnami/:
Step 2: Mirror images to Amazon ECR private repositories
Pull the images you depend on, and push them to your own private Amazon ECR repository:
For organizations managing many images, consider scripting this process:
Step 3: Update your deployment configurations
Replace all references to public.ecr.aws/bitnami/ with your private registry URI:
Step 4: Validate
Deploy your updated configurations in a non-production environment first. Verify that:
- Containers start successfully with the new image URI
- Auto-scaling provisions new tasks/pods without errors
- Your CI/CD pipeline completes end-to-end
- Rollback procedures work as expected
Note: These steps should only be considered a temporary mitigation, given new no upstream Bitnami images will be published to ECR and your images will become out of date over time. We recommend you find alternatives for these containers images. In ECR Public today, you can look through Docker official images, Chainguard images, and Ubuntu images as alternative sources.
Best practices
We recommend adopting the following practices for all container workloads:
- Mirror production images to a registry you control. Never point production workloads directly at a public registry you don’t own.
- Implement pull-through caching. Configure ECR pull-through cache as a safety net for all public images your workloads consume. This works as a long term resiliency option. Given Bitnami’s removal is near term, we recommend directly and immediately mirroring all necessary Bitnami images before Bitnami’s stated removal date.
- Use image digests for production deployments. Reference images by SHA256 digest rather than mutable tags to ensure you always deploy exactly the image you tested.
- Audit your image sources regularly. Periodically review your deployment configurations to identify dependencies on third-party public registries.
Recommended timeline
| Identify affected workloads | Immediately |
| Mirror critical production images | Within 1 week |
| Update deployment configurations | Before June 10th, 2026 |
| Validate in non-production | Before June 10th, 2026 |
| Complete full migration | Before June 10th, 2026 |
Conclusion
While the removal of Bitnami images from ECR Public requires action, it’s also an opportunity to adopt best practices around image management that will make your container workloads more resilient going forward. By mirroring images to your own private registry and implementing pull-through caching, you protect your applications from disruption regardless of changes to upstream public registries.
Start by identifying your affected workloads today, and begin mirroring your most critical images immediately.
Related Resources
Frequently Asked Questions
Q: Will my currently running containers stop immediately on the removal date?
No. This only affects workloads whose deployment configurations (task definitions, pod specs, Helm charts, etc.) reference public.ecr.aws/bitnami/ image URIs directly. If your workloads already pull from a private registry, you are not affected.
For workloads that do reference ECR Public directly: once a container is running, it uses the image already stored on the host and does not maintain a live connection to the registry. Running containers will continue to operate normally. However, any event that triggers a new image pull from ECR Public, such as a container restart, scaling event, node replacement, or new deployment, will fail after the images are removed.
Q: How do I know which Bitnami images my organization is using?
Search your ECS task definitions, EKS/Kubernetes manifests, Helm charts, Dockerfiles, and CI/CD pipeline configurations for references to public.ecr.aws/bitnami/. See Step 1 above for example commands.
Q: Can I continue using Bitnami images after the removal?
Yes. You can mirror the images you need to your own private Amazon ECR registry before the removal date. Once mirrored, you own the copy and can continue using them regardless of changes to the public source.
Q: How much will it cost to host these images in my own private ECR registry?
Amazon ECR pricing is based on storage and data transfer. For details, see Amazon ECR Pricing. For most workloads, the cost of storing mirrored images is minimal.
Q: I use Helm charts that reference Bitnami images on ECR Public. What should I do?
You will need to override the image repository values in your Helm charts to point to your private registry. For example:
Review your values.yaml files and update any hardcoded ECR Public references.
Q: What if I’m using infrastructure-as-code (CloudFormation, Terraform, CDK)?
Search your templates and code for public.ecr.aws/bitnami/ and update the image URIs to your private registry. Redeploy after making changes.
Q: Will ECR pull-through cache continue to work after the images are removed?
Pull-through cache only works if the upstream image is available at the time of the initial pull. If you have already pulled an image through the cache, that cached copy will remain in your private registry. However, new images or tags that were never cached will not be available after removal. We recommend proactively mirroring all images you need before the removal date.
Q: Do I need to mirror every tag of every image?
No. Identify the specific image tags your workloads use and mirror only those. Review your deployment configurations to determine which tags are in use. At minimum, mirror the tags currently running in production.
Q: What about vulnerability patching and image updates after I mirror?
Once you mirror an image, you are responsible for keeping it up to date. Bitnami will no longer publish updates to ECR Public. You will need to establish a process for pulling updated images from an alternative source and pushing them to your private registry on an ongoing basis.
Q: I have hundreds of workloads. Is there a way to automate this migration?
Yes. You can script the mirroring process (see the example script in Step 2 above) and use find-and-replace tooling or infrastructure-as-code updates to change image URIs across your configurations at scale. For large organizations, we recommend using ECR replication to copy mirrored images across multiple regions if needed.
Q: Who can I contact for help?
If you need assistance, reach out to AWS Support or your AWS account team. For Bitnami-specific questions, you can open an issue on GitHub.