Return to Image List

tomcat

Tomcat

Apache Tomcat (or simply Tomcat) is an open source web server and servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the JavaServer Pages (JSP) specifications from Oracle, and provides a "pure Java" HTTP web server environment for Java code to run in. In the simplest config Tomcat runs in a single operating system process. The process runs a Java virtual machine (JVM). Every single HTTP request from a browser to Tomcat is processed in the Tomcat process in a separate thread.

See tomcat.apache.org for more information

This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.


License

View license information here

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.


Versions

Use the pull string below for the version of this image you require.
10.0.21-jdk11-openjdk-bullseye docker pull icr.io/ibmz/tomcat@sha256:c3322b2268c6a3d4d48e9d3fd6b5a1224c5eeb5643e0ea4d5fe5449183b34e59 Vulnerability Report04-30-2024
10.0.18-jdk11-openjdk-bullseye docker pull icr.io/ibmz/tomcat@sha256:93548cee7fbc8ede3a23cd6f46f7a391aead36181ceb9b44f958383042560d37 Vulnerability Report04-30-2024
10.1.7-jdk17-temurin-jammy docker pull icr.io/ibmz/tomcat@sha256:66a7867391e9b0d7980a18cacdd504e476e55766fdaa30fdad19f1973e06336f Vulnerability Report04-30-2024
10.0.23-jdk17-temurin-jammy docker pull icr.io/ibmz/tomcat@sha256:65cff0b8bc66bdf9e4bb776f620b6c8635a543dc810d394623880333fda168a9 Vulnerability Report04-30-2024
jdk11 docker pull icr.io/ibmz/tomcat@sha256:2157ef9aadeb2b1e1e607a3ab712479b69f0724fa3a245443d801f30e90ba9e4 Vulnerability Report04-30-2024
Version Pull String Security (IBM Cloud) Created

Usage Notes

Run the default Tomcat server (CMD ["catalina.sh", "run"]):

docker run -it --rm icr.io/ibmz/tomcat:[version]

You can test it by visiting http://host-ip:8080 in a browser or, if you need access outside the host, on port 8888:

docker run -it --rm -p 8888:8080 icr.io/ibmz/tomcat:[version]

You can then go to localhost:8888 or host-ip:8888 in a browser (noting that it will return a 404 since there are no webapps loaded by default). The default Tomcat environment in the image is:

CATALINA_BASE:   /usr/local/tomcat
CATALINA_HOME:   /usr/local/tomcat
CATALINA_TMPDIR: /usr/local/tomcat/temp
JRE_HOME:        /usr
CLASSPATH:       /usr/local/tomcat/bin/bootstrap.jar:/usr/local/tomcat/bin/tomcat-juli.jar

The configuration files are available in /usr/local/tomcat/conf/. By default, no user is included in the "manager-gui" role required to operate the "/manager/html" web application. If you wish to use this app, you must define such a user in tomcat-users.xml.