Skip to main content

Containers

note

This page reflects the options available in the most recent version of Batect.

A container is the environment in which a command is run. It is based on a Docker image, along with other configuration such as environment variables.

Names

Container names must be valid Docker references:

  • they must contain only:

    • lowercase letters
    • digits
    • dashes (-)
    • single consecutive periods (.)
    • one or two consecutive underscores (_)
  • they must not start or end with dashes, periods or underscores

Definition

Each container definition is made up of the following fields:

  • additional_hostnames: other hostnames to associate with the container, in addition to the container's name
  • additional_hosts: extra entries to add to /etc/hosts inside the container
  • build_args: list of build args to use when building the image in build_directory
  • build_directory: path to a directory containing a Dockerfile to build and use for this container
  • build_target: Dockerfile stage name to build and use for this container
  • build_secrets: secret values to expose to image build process
  • build_ssh: SSH agents or keys to expose to image build process
  • capabilities_to_add: additional capabilities to grant to the container
  • capabilities_to_drop: additional capabilities to remove from the container
  • command: command to run when the container starts
  • dependencies: other containers to start before starting this container
  • devices: device mounts to create for the container
  • dockerfile: Dockerfile to use when building the image in build_directory
  • enable_init_process: enable Docker's init process for the container
  • entrypoint: entrypoint to use to run the container's command
  • environment: environment variables for the container
  • health_check: health check configuration for the container
  • image: image to use for this container
  • image_pull_policy: when to pull the image used by this container
  • labels: labels to apply to this container
  • log_driver: Docker log driver to use when running the container
  • log_options: additional options for the log driver in use
  • ports: ports to expose from the container to the host machine
  • privileged: enable privileged mode for the container
  • run_as_current_user: configuration for 'run as current user' mode
  • setup_commands: commands to run inside the container after it has become healthy but before dependent containers start
  • shm_size: size of /dev/shm (shared memory for IPC) for the container
  • volumes: cache, directory or temporary mounts to create for the container
  • working_directory: working directory for the container's command

One of build_directory or image is required.

additional_hostnames

List of hostnames to associate with this container, in addition to the default hostname (the name of the container).

For example, my-container will be reachable by other containers running as part of the same task at both my-container and other-name with the following configuration:

batect.yml
containers:
my-container:
additional_hostnames:
- other-name

additional_hosts

Additional hostnames to add to /etc/hosts in the container. Equivalent to --add-host option for docker run.

For example, to configure processes inside my-container to resolve database.example.com to 1.2.3.4:

batect.yml
containers:
my-container:
additional_hosts:
database.example.com: 1.2.3.4

build_args

List of build args (in name: value format) to use when building the image in build_directory. Values can be expressions.

Each build arg must be defined in the Dockerfile with an ARG instruction otherwise the value provided will have no effect.

For example, to set the message build arg to hello:

batect.yml
containers:
my-container:
build_args:
message: hello
caution

Use caution when using build args for secret values. Build arg values can be revealed by anyone with a copy of the image with the docker history command.

build_directory

Path (relative to the configuration file's directory) to a directory containing a Dockerfile to build and use as an image for this container. One of image or build_directory is required.

Value can be an expression.

On Windows, build_directory can use either Windows-style (path\to\thing) or Unix-style (path/to/thing) paths, but for compatibility with users running on other operating systems, using Unix-style paths is recommended.

The image can be overridden when running a task with --override-image.

The Docker build cache is used during the build process, so if the image definition has not changed since the last build, the image will not be rebuilt, saving time.

The built image is automatically tagged in the format <project name>-<container name>. Additional tags can be provided on the command line with --tag-image.

For example, running the container my_container from the following configuration will first build the Dockerfile in the .batect/my-container directory, then run the resulting image:

batect.yml
containers:
my-container:
build_directory: .batect/my-container

build_target

Dockerfile stage name to build and use for this container.

Only supported when building an image with build_directory.

If not specified, Batect will build and use the default stage.

For example, running the container my_container from the following configuration will first build the my-stage stage from the Dockerfile in the .batect/my-container directory, then run the resulting image:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
build_target: my-stage

build_secrets

Secrets to expose to the image build process.

Only supported when building an image with build_directory.

Files and environment variables can be exposed to the image build process. However, both files and environment variables are made available within the build environment as files.

Files can be specified with the syntax shown in the following example, which exposes a secret named repo-key with the contents of the file secret.key:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
build_secrets:
repo-key:
path: secret.key

path can be an expression, and relative paths are resolved relative to the directory containing the configuration file.

Environment variables can be specified with the syntax shown in the following example, which exposes a secret named repo-key with the value of the environment variable SECRET_KEY:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
build_secrets:
repo-key:
environment: SECRET_KEY

Both of the above examples can then be used from a Dockerfile by mounting the repo-key secret, for example:

# syntax=docker/dockerfile:1.4.0
FROM my-base-image:1.2.3

RUN --mount=type=secret,required=true,id=repo-key cat /run/secrets/repo-key

The Dockerfile documentation has more information on the syntax for RUN --mount=type=secret.

note

Image build secrets are only supported when using BuildKit.

Attempting to build an image that uses secrets with the legacy image builder will result in an error.

build_ssh

SSH agents or keys to expose to image build process.

Only supported when building an image with build_directory.

build_ssh supports exposing either a single SSH agent from the host, or one or more SSH keys, for example:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
build_ssh:
- id: ssh-agent-from-host
paths:
- /path/to/ssh-agent.sock
- id: ssh-keys-from-host
paths:
- /path/to/key_1
- /path/to/key_2

The values in paths can be expressions, and relative paths are resolved relative to the directory containing the configuration file.

The host's default SSH agent (from the SSH_AUTH_SOCK environment variable) can be exposed by specifying an empty list of paths, for example:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
build_ssh:
- id: ssh-agent-from-host

If keys are provided, BuildKit starts an SSH agent with the provided keys and exposes this to the build process. If an SSH agent socket is provided, the agent is forwarded as-is to the build process.

The exposed SSH agent can then be used from a Dockerfile by mounting it for each step that requires it, for example:

# syntax=docker/dockerfile:1.4.0
FROM my-base-image:1.2.3

RUN --mount=type=ssh,required=true,id=ssh-agent-from-host ssh [email protected] ...

The Dockerfile documentation has more information on the syntax for RUN --mount=type=ssh.

note

SSH agent and keys forwarding is only supported when using BuildKit.

Attempting to build an image that uses SSH forwarding with the legacy image builder will result in an error.

capabilities_to_add and capabilities_to_drop

List of capabilities to add or drop for the container.

For example:

batect.yml
containers:
my-container:
capabilities_to_add:
- CAP_SYS_ADMIN
capabilities_to_drop:
- CAP_KILL

command

Command to run when the container starts.

If not provided, the default command for the image will be run.

Both of these can be overridden for an individual task by specifying a command at the task level.

For example, running the container my-container from the following configuration will run the command echo 'Hello world', and not the default command specified in the my-image image:

batect.yml
containers:
my-container:
image: my-image
command: echo 'Hello world'
note

This command is passed to the image's ENTRYPOINT, just like it would when using docker run <image> <command> directly.

This means that if the entrypoint is not set or is not a shell, standard shell syntax features like $MY_ENVIRONMENT_VARIABLE and && might not work.

See the Docker docs for CMD and ENTRYPOINT for more details.

If you would like to use shell syntax features in your command, you have four options:

  1. Create a shell script and invoke that instead of specifying the command directly.

  2. Wrap your command in a shell invocation.

    For example, if your command is echo hello && echo world, set command to sh -c 'echo hello && echo world'.

  3. Set the entrypoint in the image to a shell. For example:

    Dockerfile
    ENTRYPOINT ["/bin/sh", "-c"]
  4. Set the entrypoint for the container to a shell. For example:

    batect.yml
    containers:
    container-1:
    command: "'echo hello && echo world'"
    entrypoint: /bin/sh -c

    (the command above is enclosed in single quotes so that whole command is treated as a single argument when passed to sh, and then enclosed in double quotes so that YAML preserves the single quotes)

Note that for both options 3 and 4, you must quote the command so that it is passed to sh -c as a single argument (we want the final command line to be sh -c 'echo hello && echo world', not sh -c echo hello && echo world).

dependencies

List of other containers that should be started and healthy before starting this container.

If a dependency's image does not contain a health check, then as soon as it has started, it is considered to be healthy.

See this page for more information on how to ensure dependencies are ready before starting containers that depend on them.

For example, running the container application from the following configuration will first run the database container and wait for it to become healthy before starting the application container:

batect.yml
containers:
application:
build_directory: .batect/application
dependencies:
- database

database:
build_directory: .batect/database

devices

List of device mounts to create for the container.

Two formats are supported:

  • local:container or local:container:options format

  • An expanded format:

    batect.yml
    containers:
    my-container:
    ...
    devices:
    # This is equivalent to /dev/sda:/dev/disk:r
    - local: /dev/sda
    container: /dev/disk
    options: r

Note that the local device mounts will be different for Windows and Unix-like hosts. See the Docker guide for adding host devices to containers for more information.

dockerfile

Dockerfile (relative to build_directory) to use when building the image in build_directory. Defaults to Dockerfile if not set.

The Dockerfile must be within build_directory.

dockerfile must always be specified with Unix-style (path/to/thing) paths, even when running on Windows.

For example, running the container my_container from the following configuration will build the image given by the Dockerfile stored at .batect/my-container/my-custom-Dockerfile:

batect.yml
containers:
my-container:
build_directory: .batect/my-container
dockerfile: my-custom-Dockerfile

enable_init_process

Set to true to pass the --init flag when running the container. Defaults to false.

This creates the container with a simple PID 1 process to handle the responsibilities of the init system, which is required for some applications to behave correctly.

Read this article to understand more about the behaviour of different processes running as PID 1 and why this flag was introduced.

For example, running the container build-env from the following configuration will launch a container that uses the node:10.10.0-alpine image with Docker's default init process as PID 1:

batect.yml
containers:
build-env:
image: node:10.10.0-alpine
enable_init_process: true

entrypoint

Entrypoint to use to run command or the image's default command if command is not provided.

If not provided, the default entrypoint for the image will be used.

Both of these can be overridden for an individual task by specifying an entrypoint at the task level.

See the Docker docs for CMD and ENTRYPOINT for more information on how the entrypoint is used. Batect will always convert the entrypoint provided here to the exec form when passed to Docker.

For example, the container my-container from the following configuration will use sh -c as its entrypoint and ignore the default entrypoint set in my-image:

batect.yml
containers:
my-container:
image: my-image
entrypoint: sh -c

environment

List of environment variables (in name: value format) for the container.

Values can be expressions.

Can be extended for a task's main container with run.environment or dependencies with customise.<container>.environment.

Example

Let's assume we have the following configuration:

batect.yml
containers:
build-env:
image: ruby:2.4.3
environment:
COUNTRY: Australia
SUPER_SECRET_VALUE: $SECRET_PASSWORD
OPTIMISATION_LEVEL: ${HOST_OPTIMISATION_LEVEL:-none}

Running the container build-env will launch a container that uses the ruby:2.4.3 image with the following environment variables:

  • The environment variable COUNTRY will have value Australia.

  • The environment variable SUPER_SECRET_VALUE will have the value of the SECRET_PASSWORD environment variable on the host. (So, for example, if SECRET_PASSWORD is abc123 on the host, then SUPER_SECRET_VALUE will have the value abc123 in the container.)

    If SECRET_PASSWORD is not set on the host, Batect will show an error message and not start the task.

  • The environment variable OPTIMISATION_LEVEL will have the value of the HOST_OPTIMISATION_LEVEL environment variable on the host.

    If HOST_OPTIMISATION_LEVEL is not set on the host, then OPTIMISATION_LEVEL will have the value none in the container.

TERM

The TERM environment variable, if set on the host, is always automatically passed through to the container. This ensures that features such as coloured output continue to work correctly inside the container.

Proxy-related environment variables, if set on the host, are passed through to the container at build and run time, but are not used for image pulls.

If a proxy-related environment variable is defined on the container's configuration, it takes precedence over the host-provided value.

See this page for more information on using Batect with proxies.

health_check

Overrides the health check configuration specified in the image:

command

The command to run to check the health of the container.

If this command exits with code 0, the container is considered healthy, otherwise the container is considered unhealthy.

retries

The number of times to perform the health check before considering the container unhealthy.

interval

The interval between runs of the health check.

Accepts values such as 2s (two seconds) or 1m (one minute).

start_period

The time to wait before failing health checks count against the retry count. During this period, the health check still runs, and if the check succeeds during this time, the container is immediately considered healthy.

Accepts values such as 2s (two seconds) or 1m (one minute).

timeout

The time to wait before timing out a single health check command invocation.

Accepts values such as 2s (two seconds) or 1m (one minute).

Example

The following configuration uses a fictional is-healthy command every two seconds to determine if the container is healthy. After an initial three second waiting period, the container will be declared unhealthy if it fails the health check five more times.

A single invocation of is-healthy will also be considered failed if it does not return within one second.

batect.yml
containers:
my-container:
health_check:
command: is-healthy localhost:8080
interval: 2s
retries: 5
start_period: 3s
timeout: 1s

image

Image name (in standard Docker image reference format) to use for this container. One of image or build_directory is required.

If the image has not already been pulled, Batect will pull it before starting the container.

The image can be overridden from the command line when running a task with --override-image.

For example, the container my-container from the following configuration will use the ruby:2.4.3 image:

batect.yml
containers:
my-container:
image: ruby:2.4.3
tip

It is highly recommended that you specify a specific image version, and not use latest, to ensure that the same image is used everywhere. For example, use alpine:3.7, not alpine or alpine:latest.

image_pull_policy

Controls when to pull the image used by this container.

If the image is specified as image, this policy controls the behaviour for pulling image. If the image is built from a build_directory, this policy controls the behaviour for pulling any base images.

Valid options are:

  • IfNotPresent (default): pull the image / base image(s) for the container only if an image with the same tag has not already been pulled
  • Always: always attempt to pull the image / base image(s) every time the container is started

For example, the container my-container from the following configuration will use the IfNotPresent image pull policy:

batect.yml
containers:
my-container:
image_pull_policy: IfNotPresent
tip

It is highly recommended that you use IfNotPresent. Using Always can incur a significant performance penalty.

labels

Labels to apply to the container.

For example, to add a category label to the my-container container with value build-tools:

batect.yml
containers:
my-container:
labels:
category: build-tools

log_driver

The Docker log driver to use when running the container.

Defaults to json-file if not set.

A full list of built-in log drivers is available in the logging section of Docker documentation, and logging plugins can be used as well.

Options for the log driver can be provided with log_options.

For example, the container my-container from the following configuration will use the syslog log driver:

batect.yml
containers:
my-container:
log_driver: syslog
danger

If you are running Docker 19.03 or earlier, some log drivers do not support streaming container output to the console, as described in the limitations section of Docker's logging documentation.

If the selected log driver does not support streaming container output to the console, you will see error messages similar to Error attaching: configured logging driver does not support reading in Batect's output. This does not affect the execution of the task, which will run to completion as per normal.

log_options

Options to provide to the Docker log driver used when running the container.

For example, to set the tag used to identify the container in logs:

batect.yml
containers:
my-container:
log_options:
tag: "my-container"

The options available for each log driver are described in the Docker documentation for that log driver, such as this page for the json-file driver.

ports

List of ports to make available to the host machine.

Three formats are supported:

  • local:container or local:container/protocol format

    For example, 1234:5678 or 1234:5678/tcp will make TCP port 5678 inside the container available on the host machine at TCP port 1234, and 1234:5678/udp will make UDP port 5678 inside the container available on the host machine at UDP port 1234.

  • local_from-local_to:container_from:container-to or local_from-local_to:container_from:container-to/protocol format

    For example, 1000-1001:2025-2026 or 1000-1001:2025-2026/tcp will make TCP port 2025 inside the container available on the host machine at TCP port 1000, and TCP port 2026 inside the container available on the host machine at TCP port 1001.

  • An expanded format:

    batect.yml
    containers:
    my-container:
    ...
    ports:
    # This is equivalent to 1234:5678 or 1234:5678/tcp
    - local: 1234
    container: 5678
    # This is equivalent to 3000:4000/udp
    - local: 3000
    container: 4000
    protocol: udp
    # This is equivalent to 1000-1001:2025-2026 or 1000-1001:2025-2026/tcp
    - local: 1000-1001
    container: 2025-2026
    # This is equivalent to 5000-5001:6025-6026/udp
    - local: 5000-5001
    container: 6025-6026
    protocol: udp

All protocols supported by Docker are supported. The default protocol is TCP if none is provided.

The port does not need to have a corresponding EXPOSE instruction in the Dockerfile.

Can be extended for a task's main container with run.ports or dependencies with customise.<container>.ports.

For example, the my-container container in the following configuration allows accessing port 5678 from the container on port 1234 on the host machine:

batect.yml
container:
my-container:
ports:
- 1234:5678
# or
- local: 1234
container: 5678
tip

Exposing ports is only required if you need to access the container from the host machine.

Any container started as part of a task will be able to access any port on any other container at the address container_name:container_port, even if that port is not listed in ports.

For example, if a process running in the http-server container listens on port 2000, any other container in the task can access that at http-server:2000 without port 2000 being listed in ports (or an EXPOSE Dockerfile instruction).

privileged

Set to true to run the container in privileged mode. Defaults to false.

See also capabilities_to_add and capabilities_to_drop.

For example, the following configuration runs the my-container container in privileged mode:

batect.yml
containers:
my-container:
privileged: true

run_as_current_user

Run the container with the same UID and GID as the user running Batect (rather than the user the Docker daemon runs as, which is root on Linux). This means that any files created by the container will be owned by the user running Batect, rather than root.

This is really only useful on Linux. On macOS, the Docker daemon runs as the currently logged-in user and so any files created in the container are owned by that user, so this is less of an issue. However, for consistency, the same configuration changes are made on both Linux and macOS.

See this page for more information on the effects of this option and why it is necessary.

run_as_current_user has the following options:

enabled

Set to true to enable 'run as current user' mode. Defaults to false.

home_directory

Directory to use as home directory for user inside container.

Required if enabled is true, not allowed if enabled is false.

This directory is automatically created by Batect with the correct owner and group.

danger

If the directory given by home_directory already exists inside the image for this container, it is overwritten.

Example

batect.yml
containers:
my-container:
image: ruby:2.4.3
run_as_current_user:
enabled: true
home_directory: /home/container-user

setup_commands

List of commands to run inside the container after it has become healthy but before dependent containers start.

See the task lifecycle for more information on the effects of this option.

tip

It is recommended that you try to include any setup work in your image's Dockerfile wherever possible (and not use setup commands). Setup commands must be run every time the container starts whereas commands included in your image's Dockerfile only run when the image needs to be built, reducing the time taken for tasks to start.

Each setup command has the following options:

command

The command to run. Required.

This command is run in a similar way to the container's command, so the same limitations apply to using shell syntax such as &&.

working_directory

The working directory to use for the command.

If no working directory is provided, working_directory is used if it is set, otherwise the image's default working directory is used. If this container is used as the task container and the task overrides the default working directory, that override is ignored when running setup commands.

The command will inherit the same environment variables as the container's command (including any specified on the task if this is the task container), runs as the same user and group as the container's command and inherits the same settings for privileged status and capabilities.

Example

Let's assume we have the following configuration:

batect.yml
containers:
database:
setup_commands:
- command: ./apply-migrations.sh

application:
dependencies:
- database

Running the container application will first build or pull the images for both the database and application containers.

Once the image for database is ready, database will start and launch the command specified in the Dockerfile, then Batect will wait for the container to report as healthy. Once database reports as healthy, it will run ./apply-migrations.sh and wait for it to finish before then starting application.

shm_size

Size of /dev/shm (shared memory for IPC) for the container.

If not set, uses Docker's default value, which is currently 64 MB.

Accepts values such as 2000 (2000 bytes), 3k (3 KB), 5m (5 MB) or 1g (1 GB).

volumes

List of cache, directory or tmpfs mounts to create for the container.

Local mounts (mounting a directory on the host into a container), caches and tmpfs mounts are supported:

Local mounts

Two formats are supported:

  • local:container or local:container:options format

  • An expanded format:

    batect.yml
    containers:
    my-container:
    ...
    volumes:
    # This is equivalent to .:/code:ro
    - local: .
    container: /code
    options: ro

In both formats, the following fields are supported:

  • local: path to the local file or directory to mount. Can be an expression when using the expanded format. Required.

    Relative paths will be resolved relative to the current configuration file's directory.

    On Windows, the local path can use either Windows-style (path\to\thing) or Unix-style (path/to/thing) paths, but for compatibility with users running on other operating systems, using Unix-style paths is recommended.

  • container: path to mount the local file or directory at inside the container. Required.

  • options: standard Docker mount options (such as ro for read-only). Optional.

Caches

Caches provide persistence between task runs without the performance overhead of mounting a directory from the host into the container.

They are perfect for directories such as node_modules which contain downloaded dependencies that can safely be reused for each task run.

The format for a cache mount is:

batect.yml
containers:
my-container:
...
volumes:
- type: cache
name: node-modules
container: /code/node_modules

The following fields are supported:

  • type: must be set to cache. Required.
  • name: name of the cache, must be a valid Docker volume name. The same name can be used to share a cache between multiple containers. Required.
  • container: path to mount the cache directory at inside the container. Required.
  • options: standard Docker mount options (such as ro for read-only). Optional.
tip

To make it easier to share caches between builds on ephemeral CI agents, you can instruct Batect to use directories instead of volumes, and then use these directories as a starting point for subsequent builds. Run Batect with --cache-type=directory to enable this behaviour, then save and restore the .batect/caches directory between builds.

This is only recommended on Linux CI agents, as using mounted directories instead of volumes has no performance impact on Linux.

caution

If you mount a cache over an existing directory in the container's image and are not using directory mounts for caches with --cache-type, the first time the cache is created, the cache inherits the contents of the directory from the image.

tmpfs mounts

tmpfs mounts provide a temporary, in-memory filesystem for a container.

When the container exits, the contents of the tmpfs mount is lost. A container can have multiple independent tmpfs mounts.

The format for a tmpfs mount is:

batect.yml
containers:
my-container:
...
volumes:
- type: tmpfs
container: /code/tmp

The following fields are supported:

  • type: must be set to tmpfs. Required.
  • container: path to mount the tmpfs filesystem at inside the container. Required.
  • options: standard Docker tmpfs mount options (such as ro for read-only). Optional.

working_directory

Working directory to start the container in.

If not provided, the default working directory for the image will be used.

Can be overridden for a task's main container with run.working_directory or dependencies with customise.<container>.working_directory.

For example, the container my-container in the following configuration will start with the working directory set to /somewhere:

batect.yml
containers:
my-container:
working_directory: /somewhere

Equivalent options in other tools

Many of the fields above have equivalent options in other tools.

Docker CLI

Batect container fieldDocker CLI option
additional_hostnames--network-alias to docker run
additional_hosts--add-host to docker run
build_args--build-arg to docker build
build_directoryargument to docker build
build_target--target to docker build
build_secrets--secret to docker build
build_ssh--ssh to docker build
capabilities_to_add--cap-add to docker run
capabilities_to_drop--cap-drop to docker run
commandargument to docker run
dependencies(none)
devices--device to docker run
dockerfile--file to docker build
enable_init_process--init to docker run
entrypoint--entrypoint to docker run
environment--env to docker run
health_check.command--health-cmd to docker run
health_check.interval--health-interval to docker run
health_check.retries--health-retries to docker run
health_check.start_period--health-start-period to docker run
health_check.timeout--health-timeout to docker run
imageargument to docker run
image_pull_policy--pull to docker build or re-running docker pull
labels--labels to docker run
log_driver--log-driver to docker run
log_options--log-opt to docker run
ports--publish to docker run
privileged--privileged to docker run
run_as_current_user(none)
setup_commands(none)
shm_size--shm-size to docker run
volumes--volume or --tmpfs to docker run
working_directory--workdir to docker run

Docker Compose

Batect container fieldDocker Compose field
additional_hostnamesnetworks.aliases
additional_hostsextra_hosts
build_argsbuild.args
build_directorybuild or build.context
build_targetbuild.target
build_secrets(none)
build_ssh(none)
capabilities_to_addcap_add
capabilities_to_dropcap_drop
commandcommand
dependenciesdepends_on (behaviour differs)
devicesdevices
dockerfilebuild.dockerfile
enable_init_processinit
entrypointentrypoint
environmentenvironment
health_check.commandhealthcheck.test
health_check.intervalhealthcheck.interval
health_check.retrieshealthcheck.retries
health_check.start_periodhealthcheck.start_period
health_check.timeouthealthcheck.timeout
imageimage
image_pull_policy(none)
labelslabels
log_driverlogging.driver
log_optionslogging.options
portsports
privilegedprivileged
run_as_current_user(none)
setup_commands(none)
shm_sizeshm_size
volumesvolumes or tmpfs
working_directoryworking_dir

Subscribe to the Batect newsletter

Get news and announcements direct to your inbox.