Return to Image List

jetty

jetty

Jetty is a pure Java-based HTTP (Web) server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks. Jetty is developed as a free and open source project as part of the Eclipse Foundation. The web server is used in products such as Apache ActiveMQ, Alfresco, Apache Geronimo, Apache Maven, Apache Spark, Google App Engine, Eclipse, FUSE, Twitter's Streaming API and Zimbra. Jetty is also the server in open source projects such as Lift, Eucalyptus, Red5, Hadoop and I2P. Jetty supports the latest Java Servlet API (with JSP support) as well as protocols SPDY and WebSocket.

See jetty.com for more information

This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.


License

View license information here

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.


Versions

Use the pull string below for the version of this image you require.
11.0.11-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:eee29e2a72200a355332f986aa0d9fef9d5bf678ab0975104ba60b5d1612060c Vulnerability Report07-22-2025
11.0-jdk11 docker pull icr.io/ibmz/jetty@sha256:6235a07f05932df01735958e795839a9cbb04d0190f036ebfdc075b1e89de50d Vulnerability Report07-22-2025
11.0.9-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:4f68b3292334b459a3d8febd7f9e0030a9d77370e5d2ff1a0aaaf729f11066ff Vulnerability Report07-22-2025
11.0.13-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:461e264fd98282ecd8510cbd12cad1c49fd9d9ea1ecbf4da67f72ae5ee118d11 Vulnerability Report07-22-2025
9.4.44 docker pull icr.io/ibmz/jetty@sha256:0de683cf6432623d2b48a9f562900af199e59911ab731c0dccd46c68d8ce17ab Vulnerability Report07-22-2025
9.4.45-jdk17-openjdk docker pull icr.io/ibmz/jetty@sha256:0cd6e56701d3a4b1631a757fb2875e0235a41948210b01acad57795f0adf207b Vulnerability Report07-22-2025
Version Pull String Security (IBM Cloud) Created

Usage Notes

To run the default Jetty server in the background, use the following command with the values for {http_port} and {https_port} replaced with your desired ports.

docker run -d --name jetty -p {http_port}:8080 -p {https_port}:8443 icr.io/ibmz/jetty:[version]

You can test it by visiting container-ip:8080 or container-ip:8443/ in a browser.

Environment:
The default Jetty environment in the image is:

JETTY_HOME    =  /usr/local/jetty
JETTY_BASE    =  /var/lib/jetty
TMPDIR        =  /tmp/jetty

Deployment:
Webapps can be deployed under /var/lib/jetty/webapps in the usual ways (WAR file, exploded WAR directory, or context XML file). To deploy your application to the / context, use the name ROOT.war, the directory name ROOT, or the context file ROOT.xml (case insensitive).