github.com/nguyentm83/docker@v1.5.0/docs/man/docker-run.1.md (about) 1 % DOCKER(1) Docker User Manuals 2 % Docker Community 3 % JUNE 2014 4 # NAME 5 docker-run - Run a command in a new container 6 7 # SYNOPSIS 8 **docker run** 9 [**-a**|**--attach**[=*[]*]] 10 [**--add-host**[=*[]*]] 11 [**-c**|**--cpu-shares**[=*0*]] 12 [**--cap-add**[=*[]*]] 13 [**--cap-drop**[=*[]*]] 14 [**--cidfile**[=*CIDFILE*]] 15 [**--cpuset**[=*CPUSET*]] 16 [**-d**|**--detach**[=*false*]] 17 [**--device**[=*[]*]] 18 [**--dns-search**[=*[]*]] 19 [**--dns**[=*[]*]] 20 [**-e**|**--env**[=*[]*]] 21 [**--entrypoint**[=*ENTRYPOINT*]] 22 [**--env-file**[=*[]*]] 23 [**--expose**[=*[]*]] 24 [**-h**|**--hostname**[=*HOSTNAME*]] 25 [**--help**] 26 [**-i**|**--interactive**[=*false*]] 27 [**--ipc**[=*IPC*]] 28 [**--link**[=*[]*]] 29 [**--lxc-conf**[=*[]*]] 30 [**-m**|**--memory**[=*MEMORY*]] 31 [**--memory-swap**[=*MEMORY-SWAP]] 32 [**--mac-address**[=*MAC-ADDRESS*]] 33 [**--name**[=*NAME*]] 34 [**--net**[=*"bridge"*]] 35 [**-P**|**--publish-all**[=*false*]] 36 [**-p**|**--publish**[=*[]*]] 37 [**--pid**[=*[]*]] 38 [**--privileged**[=*false*]] 39 [**--read-only**[=*false*]] 40 [**--restart**[=*RESTART*]] 41 [**--rm**[=*false*]] 42 [**--security-opt**[=*[]*]] 43 [**--sig-proxy**[=*true*]] 44 [**-t**|**--tty**[=*false*]] 45 [**-u**|**--user**[=*USER*]] 46 [**-v**|**--volume**[=*[]*]] 47 [**--volumes-from**[=*[]*]] 48 [**-w**|**--workdir**[=*WORKDIR*]] 49 IMAGE [COMMAND] [ARG...] 50 51 # DESCRIPTION 52 53 Run a process in a new container. **docker run** starts a process with its own 54 file system, its own networking, and its own isolated process tree. The IMAGE 55 which starts the process may define defaults related to the process that will be 56 run in the container, the networking to expose, and more, but **docker run** 57 gives final control to the operator or administrator who starts the container 58 from the image. For that reason **docker run** has more options than any other 59 Docker command. 60 61 If the IMAGE is not already loaded then **docker run** will pull the IMAGE, and 62 all image dependencies, from the repository in the same way running **docker 63 pull** IMAGE, before it starts the container from that image. 64 65 # OPTIONS 66 **-a**, **--attach**=[] 67 Attach to STDIN, STDOUT or STDERR. 68 69 In foreground mode (the default when **-d** 70 is not specified), **docker run** can start the process in the container 71 and attach the console to the process’s standard input, output, and standard 72 error. It can even pretend to be a TTY (this is what most commandline 73 executables expect) and pass along signals. The **-a** option can be set for 74 each of stdin, stdout, and stderr. 75 76 **--add-host**=[] 77 Add a custom host-to-IP mapping (host:ip) 78 79 Add a line to /etc/hosts. The format is hostname:ip. The **--add-host** 80 option can be set multiple times. 81 82 **-c**, **--cpu-shares**=0 83 CPU shares (relative weight) 84 85 You can increase the priority of a container 86 with the -c option. By default, all containers run at the same priority and get 87 the same proportion of CPU cycles, but you can tell the kernel to give more 88 shares of CPU time to one or more containers when you start them via **docker 89 run**. 90 91 **--cap-add**=[] 92 Add Linux capabilities 93 94 **--cap-drop**=[] 95 Drop Linux capabilities 96 97 **--cidfile**="" 98 Write the container ID to the file 99 100 **--cpuset**="" 101 CPUs in which to allow execution (0-3, 0,1) 102 103 **-d**, **--detach**=*true*|*false* 104 Detached mode: run the container in the background and print the new container ID. The default is *false*. 105 106 At any time you can run **docker ps** in 107 the other shell to view a list of the running containers. You can reattach to a 108 detached container with **docker attach**. If you choose to run a container in 109 the detached mode, then you cannot use the **-rm** option. 110 111 When attached in the tty mode, you can detach from a running container without 112 stopping the process by pressing the keys CTRL-P CTRL-Q. 113 114 **--device**=[] 115 Add a host device to the container (e.g. --device=/dev/sdc:/dev/xvdc:rwm) 116 117 **--dns-search**=[] 118 Set custom DNS search domains (Use --dns-search=. if you don't wish to set the search domain) 119 120 **--dns**=[] 121 Set custom DNS servers 122 123 This option can be used to override the DNS 124 configuration passed to the container. Typically this is necessary when the 125 host DNS configuration is invalid for the container (e.g., 127.0.0.1). When this 126 is the case the **--dns** flags is necessary for every run. 127 128 **-e**, **--env**=[] 129 Set environment variables 130 131 This option allows you to specify arbitrary 132 environment variables that are available for the process that will be launched 133 inside of the container. 134 135 **--entrypoint**="" 136 Overwrite the default ENTRYPOINT of the image 137 138 This option allows you to overwrite the default entrypoint of the image that 139 is set in the Dockerfile. The ENTRYPOINT of an image is similar to a COMMAND 140 because it specifies what executable to run when the container starts, but it is 141 (purposely) more difficult to override. The ENTRYPOINT gives a container its 142 default nature or behavior, so that when you set an ENTRYPOINT you can run the 143 container as if it were that binary, complete with default options, and you can 144 pass in more options via the COMMAND. But, sometimes an operator may want to run 145 something else inside the container, so you can override the default ENTRYPOINT 146 at runtime by using a **--entrypoint** and a string to specify the new 147 ENTRYPOINT. 148 149 **--env-file**=[] 150 Read in a line delimited file of environment variables 151 152 **--expose**=[] 153 Expose a port, or a range of ports (e.g. --expose=3300-3310), from the container without publishing it to your host 154 155 **-h**, **--hostname**="" 156 Container host name 157 158 Sets the container host name that is available inside the container. 159 160 **--help** 161 Print usage statement 162 163 **-i**, **--interactive**=*true*|*false* 164 Keep STDIN open even if not attached. The default is *false*. 165 166 When set to true, keep stdin open even if not attached. The default is false. 167 168 **--ipc**="" 169 Default is to create a private IPC namespace (POSIX SysV IPC) for the container 170 'container:<name|id>': reuses another container shared memory, semaphores and message queues 171 'host': use the host shared memory,semaphores and message queues inside the container. Note: the host mode gives the container full access to local shared memory and is therefore considered insecure. 172 173 **--link**=[] 174 Add link to another container in the form of <name or id>:alias 175 176 If the operator 177 uses **--link** when starting the new client container, then the client 178 container can access the exposed port via a private networking interface. Docker 179 will set some environment variables in the client container to help indicate 180 which interface and port to use. 181 182 **--lxc-conf**=[] 183 (lxc exec-driver only) Add custom lxc options --lxc-conf="lxc.cgroup.cpuset.cpus = 0,1" 184 185 **-m**, **--memory**="" 186 Memory limit (format: <number><optional unit>, where unit = b, k, m or g) 187 188 Allows you to constrain the memory available to a container. If the host 189 supports swap memory, then the -m memory setting can be larger than physical 190 RAM. If a limit of 0 is specified, the container's memory is not limited. The 191 actual limit may be rounded up to a multiple of the operating system's page 192 size, if it is not already. The memory limit should be formatted as follows: 193 `<number><optional unit>`, where unit = b, k, m or g. 194 195 **--memory-swap**="" 196 Total memory usage (memory + swap) 197 198 Set '-1' to disable swap (format: <number><optional unit>, where unit = b, k, m or g) 199 200 **--mac-address**="" 201 Container MAC address (e.g. 92:d0:c6:0a:29:33) 202 203 Remember that the MAC address in an Ethernet network must be unique. 204 The IPv6 link-local address will be based on the device's MAC address 205 according to RFC4862. 206 207 **--name**="" 208 Assign a name to the container 209 210 The operator can identify a container in three ways: 211 UUID long identifier (“f78375b1c487e03c9438c729345e54db9d20cfa2ac1fc3494b6eb60872e74778”) 212 UUID short identifier (“f78375b1c487”) 213 Name (“jonah”) 214 215 The UUID identifiers come from the Docker daemon, and if a name is not assigned 216 to the container with **--name** then the daemon will also generate a random 217 string name. The name is useful when defining links (see **--link**) (or any 218 other place you need to identify a container). This works for both background 219 and foreground Docker containers. 220 221 **--net**="bridge" 222 Set the Network mode for the container 223 'bridge': creates a new network stack for the container on the docker bridge 224 'none': no networking for this container 225 'container:<name|id>': reuses another container network stack 226 'host': use the host network stack inside the container. Note: the host mode gives the container full access to local system services such as D-bus and is therefore considered insecure. 227 228 **-P**, **--publish-all**=*true*|*false* 229 Publish all exposed ports to random ports on the host interfaces. The default is *false*. 230 231 When set to true publish all exposed ports to the host interfaces. The 232 default is false. If the operator uses -P (or -p) then Docker will make the 233 exposed port accessible on the host and the ports will be available to any 234 client that can reach the host. When using -P, Docker will bind the exposed 235 ports to a random port on the host between 49153 and 65535. To find the 236 mapping between the host ports and the exposed ports, use **docker port**. 237 238 **-p**, **--publish**=[] 239 Publish a container's port, or range of ports, to the host. 240 format: ip:hostPort:containerPort | ip::containerPort | hostPort:containerPort | containerPort 241 Both hostPort and containerPort can be specified as a range of ports. 242 When specifying ranges for both, the number of container ports in the range must match the number of host ports in the range. (e.g., `-p 1234-1236:1234-1236/tcp`) 243 (use 'docker port' to see the actual mapping) 244 245 **--pid**=host 246 Set the PID mode for the container 247 **host**: use the host's PID namespace inside the container. 248 Note: the host mode gives the container full access to local PID and is therefore considered insecure. 249 250 **--privileged**=*true*|*false* 251 Give extended privileges to this container. The default is *false*. 252 253 By default, Docker containers are 254 “unprivileged” (=false) and cannot, for example, run a Docker daemon inside the 255 Docker container. This is because by default a container is not allowed to 256 access any devices. A “privileged” container is given access to all devices. 257 258 When the operator executes **docker run --privileged**, Docker will enable access 259 to all devices on the host as well as set some configuration in AppArmor to 260 allow the container nearly all the same access to the host as processes running 261 outside of a container on the host. 262 263 **--read-only**=*true*|*false* 264 Mount the container's root filesystem as read only. 265 266 By default a container will have its root filesystem writable allowing processes 267 to write files anywhere. By specifying the `--read-only` flag the container will have 268 its root filesystem mounted as read only prohibiting any writes. 269 270 **--restart**="" 271 Restart policy to apply when a container exits (no, on-failure[:max-retry], always) 272 273 **--rm**=*true*|*false* 274 Automatically remove the container when it exits (incompatible with -d). The default is *false*. 275 276 **--security-opt**=[] 277 Security Options 278 279 "label:user:USER" : Set the label user for the container 280 "label:role:ROLE" : Set the label role for the container 281 "label:type:TYPE" : Set the label type for the container 282 "label:level:LEVEL" : Set the label level for the container 283 "label:disable" : Turn off label confinement for the container 284 285 **--sig-proxy**=*true*|*false* 286 Proxy received signals to the process (non-TTY mode only). SIGCHLD, SIGSTOP, and SIGKILL are not proxied. The default is *true*. 287 288 **-t**, **--tty**=*true*|*false* 289 Allocate a pseudo-TTY. The default is *false*. 290 291 When set to true Docker can allocate a pseudo-tty and attach to the standard 292 input of any container. This can be used, for example, to run a throwaway 293 interactive shell. The default is value is false. 294 295 The **-t** option is incompatible with a redirection of the docker client 296 standard input. 297 298 **-u**, **--user**="" 299 Username or UID 300 301 **-v**, **--volume**=[] 302 Bind mount a volume (e.g., from the host: -v /host:/container, from Docker: -v /container) 303 304 The **-v** option can be used one or 305 more times to add one or more mounts to a container. These mounts can then be 306 used in other containers using the **--volumes-from** option. 307 308 The volume may be optionally suffixed with :ro or :rw to mount the volumes in 309 read-only or read-write mode, respectively. By default, the volumes are mounted 310 read-write. See examples. 311 312 **--volumes-from**=[] 313 Mount volumes from the specified container(s) 314 315 Will mount volumes from the specified container identified by container-id. 316 Once a volume is mounted in a one container it can be shared with other 317 containers using the **--volumes-from** option when running those other 318 containers. The volumes can be shared even if the original container with the 319 mount is not running. 320 321 The container ID may be optionally suffixed with :ro or 322 :rw to mount the volumes in read-only or read-write mode, respectively. By 323 default, the volumes are mounted in the same mode (read write or read only) as 324 the reference container. 325 326 **-w**, **--workdir**="" 327 Working directory inside the container 328 329 The default working directory for 330 running binaries within a container is the root directory (/). The developer can 331 set a different default with the Dockerfile WORKDIR instruction. The operator 332 can override the working directory by using the **-w** option. 333 334 # EXAMPLES 335 336 ## Exposing log messages from the container to the host's log 337 338 If you want messages that are logged in your container to show up in the host's 339 syslog/journal then you should bind mount the /dev/log directory as follows. 340 341 # docker run -v /dev/log:/dev/log -i -t fedora /bin/bash 342 343 From inside the container you can test this by sending a message to the log. 344 345 (bash)# logger "Hello from my container" 346 347 Then exit and check the journal. 348 349 # exit 350 351 # journalctl -b | grep Hello 352 353 This should list the message sent to logger. 354 355 ## Attaching to one or more from STDIN, STDOUT, STDERR 356 357 If you do not specify -a then Docker will attach everything (stdin,stdout,stderr) 358 . You can specify to which of the three standard streams (stdin, stdout, stderr) 359 you’d like to connect instead, as in: 360 361 # docker run -a stdin -a stdout -i -t fedora /bin/bash 362 363 ## Sharing IPC between containers 364 365 Using shm_server.c available here: http://www.cs.cf.ac.uk/Dave/C/node27.html 366 367 Testing `--ipc=host` mode: 368 369 Host shows a shared memory segment with 7 pids attached, happens to be from httpd: 370 371 ``` 372 $ sudo ipcs -m 373 374 ------ Shared Memory Segments -------- 375 key shmid owner perms bytes nattch status 376 0x01128e25 0 root 600 1000 7 377 ``` 378 379 Now run a regular container, and it correctly does NOT see the shared memory segment from the host: 380 381 ``` 382 $ sudo docker run -it shm ipcs -m 383 384 ------ Shared Memory Segments -------- 385 key shmid owner perms bytes nattch status 386 ``` 387 388 Run a container with the new `--ipc=host` option, and it now sees the shared memory segment from the host httpd: 389 390 ``` 391 $ sudo docker run -it --ipc=host shm ipcs -m 392 393 ------ Shared Memory Segments -------- 394 key shmid owner perms bytes nattch status 395 0x01128e25 0 root 600 1000 7 396 ``` 397 Testing `--ipc=container:CONTAINERID` mode: 398 399 Start a container with a program to create a shared memory segment: 400 ``` 401 sudo docker run -it shm bash 402 $ sudo shm/shm_server & 403 $ sudo ipcs -m 404 405 ------ Shared Memory Segments -------- 406 key shmid owner perms bytes nattch status 407 0x0000162e 0 root 666 27 1 408 ``` 409 Create a 2nd container correctly shows no shared memory segment from 1st container: 410 ``` 411 $ sudo docker run shm ipcs -m 412 413 ------ Shared Memory Segments -------- 414 key shmid owner perms bytes nattch status 415 ``` 416 417 Create a 3rd container using the new --ipc=container:CONTAINERID option, now it shows the shared memory segment from the first: 418 419 ``` 420 $ sudo docker run -it --ipc=container:ed735b2264ac shm ipcs -m 421 $ sudo ipcs -m 422 423 ------ Shared Memory Segments -------- 424 key shmid owner perms bytes nattch status 425 0x0000162e 0 root 666 27 1 426 ``` 427 428 ## Linking Containers 429 430 The link feature allows multiple containers to communicate with each other. For 431 example, a container whose Dockerfile has exposed port 80 can be run and named 432 as follows: 433 434 # docker run --name=link-test -d -i -t fedora/httpd 435 436 A second container, in this case called linker, can communicate with the httpd 437 container, named link-test, by running with the **--link=<name>:<alias>** 438 439 # docker run -t -i --link=link-test:lt --name=linker fedora /bin/bash 440 441 Now the container linker is linked to container link-test with the alias lt. 442 Running the **env** command in the linker container shows environment variables 443 with the LT (alias) context (**LT_**) 444 445 # env 446 HOSTNAME=668231cb0978 447 TERM=xterm 448 LT_PORT_80_TCP=tcp://172.17.0.3:80 449 LT_PORT_80_TCP_PORT=80 450 LT_PORT_80_TCP_PROTO=tcp 451 LT_PORT=tcp://172.17.0.3:80 452 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin 453 PWD=/ 454 LT_NAME=/linker/lt 455 SHLVL=1 456 HOME=/ 457 LT_PORT_80_TCP_ADDR=172.17.0.3 458 _=/usr/bin/env 459 460 When linking two containers Docker will use the exposed ports of the container 461 to create a secure tunnel for the parent to access. 462 463 464 ## Mapping Ports for External Usage 465 466 The exposed port of an application can be mapped to a host port using the **-p** 467 flag. For example, a httpd port 80 can be mapped to the host port 8080 using the 468 following: 469 470 # docker run -p 8080:80 -d -i -t fedora/httpd 471 472 ## Creating and Mounting a Data Volume Container 473 474 Many applications require the sharing of persistent data across several 475 containers. Docker allows you to create a Data Volume Container that other 476 containers can mount from. For example, create a named container that contains 477 directories /var/volume1 and /tmp/volume2. The image will need to contain these 478 directories so a couple of RUN mkdir instructions might be required for you 479 fedora-data image: 480 481 # docker run --name=data -v /var/volume1 -v /tmp/volume2 -i -t fedora-data true 482 # docker run --volumes-from=data --name=fedora-container1 -i -t fedora bash 483 484 Multiple --volumes-from parameters will bring together multiple data volumes from 485 multiple containers. And it's possible to mount the volumes that came from the 486 DATA container in yet another container via the fedora-container1 intermediary 487 container, allowing to abstract the actual data source from users of that data: 488 489 # docker run --volumes-from=fedora-container1 --name=fedora-container2 -i -t fedora bash 490 491 ## Mounting External Volumes 492 493 To mount a host directory as a container volume, specify the absolute path to 494 the directory and the absolute path for the container directory separated by a 495 colon: 496 497 # docker run -v /var/db:/data1 -i -t fedora bash 498 499 When using SELinux, be aware that the host has no knowledge of container SELinux 500 policy. Therefore, in the above example, if SELinux policy is enforced, the 501 `/var/db` directory is not writable to the container. A "Permission Denied" 502 message will occur and an avc: message in the host's syslog. 503 504 505 To work around this, at time of writing this man page, the following command 506 needs to be run in order for the proper SELinux policy type label to be attached 507 to the host directory: 508 509 # chcon -Rt svirt_sandbox_file_t /var/db 510 511 512 Now, writing to the /data1 volume in the container will be allowed and the 513 changes will also be reflected on the host in /var/db. 514 515 ## Using alternative security labeling 516 517 You can override the default labeling scheme for each container by specifying 518 the `--security-opt` flag. For example, you can specify the MCS/MLS level, a 519 requirement for MLS systems. Specifying the level in the following command 520 allows you to share the same content between containers. 521 522 # docker run --security-opt label:level:s0:c100,c200 -i -t fedora bash 523 524 An MLS example might be: 525 526 # docker run --security-opt label:level:TopSecret -i -t rhel7 bash 527 528 To disable the security labeling for this container versus running with the 529 `--permissive` flag, use the following command: 530 531 # docker run --security-opt label:disable -i -t fedora bash 532 533 If you want a tighter security policy on the processes within a container, 534 you can specify an alternate type for the container. You could run a container 535 that is only allowed to listen on Apache ports by executing the following 536 command: 537 538 # docker run --security-opt label:type:svirt_apache_t -i -t centos bash 539 540 Note: 541 542 You would have to write policy defining a `svirt_apache_t` type. 543 544 # HISTORY 545 April 2014, Originally compiled by William Henry (whenry at redhat dot com) 546 based on docker.com source material and internal work. 547 June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au> 548 July 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>