Basic Docker skills only takes you so far in production environments. This post covers some lesser known Docker techniques.
SSH Agent Forwarding with Buildx
When working with private repositories during builds, you often need SSH authentication. Instead of embedding credentials (a security risk), you can forward your SSH agent connection directly to the Docker build process:
# Forward SSH agent connection to Docker build
RUN --mount=type=ssh git clone git@github.com:private/repo.git
Build your image with:
docker build --ssh default=$SSH_AUTH_SOCK .
Fine-Tuning Container Capabilities
Running containers in privileged mode is dangerous, but some applications need additional capabilities. Instead of full privileged mode, grant only the specific capabilities required:
docker run --cap-add SYS_ADMIN --security-opt apparmor=unconfined mycontainer
DNS Optimization for High-Volume Services
Containers in high-traffic environments can benefit from DNS tuning. For services that need quick failover if DNS resolution fails:
docker run --dns-opt timeout:1 --dns-opt attempts:5 --dns 10.0.0.2 myapp
Distroless Builds for Minimal Attack Surface
Consider distroless containers, which contain only your application and its runtime dependencies:
FROM golang:1 AS builder
WORKDIR /app
COPY . .
RUN go build -o myapp
FROM gcr.io/distroless/static
COPY --from=builder /app/myapp /
CMD ["/myapp"]
Distroless containers eliminate package managers, shells, and other utilities that could be exploited, significantly reducing your attack surface.
Hardening Containers with Security Profiles
Custom seccomp profiles allow you to restrict which syscalls your container can make:
docker run --security-opt seccomp=/path/to/custom-seccomp.json myapp
You can also integrate this into docker-compose:
services:
api:
# ... other config ...
security_opt:
- seccomp:custom-seccomp.json
- no-new-privileges:true
A carefully crafted seccomp profile provides defense-in-depth by limiting what processes inside your container can do at the kernel level.
Network Isolation During Builds
For maximum security during builds, especially for public images, consider completely disabling network access:
docker build --network=none .
Secure Handling of Build Secrets
BuildKit offers a secure way to use secrets during build without embedding them in layers:
RUN --mount=type=secret,id=mysecret cat /run/secrets/mysecret
Use it when building:
docker build --secret id=mysecret,src=./secret.txt .
Dynamic Builds with Build Arguments
Make your builds flexible with build-time arguments:
ARG VERSION=latest
FROM base:${VERSION}
ARG ENV=prod
RUN if [ "$ENV" = "dev" ]; then \
install-dev-tools; \
fi
Container Network Troubleshooting
When facing networking issues, use nsenter to inspect container networking from the host:
pid=$(docker inspect --format '{{.State.Pid}}' container_name)
nsenter -t $pid -n ip addr
Resource Limiting with Ulimits
Prevent resource exhaustion by setting appropriate ulimits:
docker run --ulimit nofile=50000:50000 --ulimit nproc=1024:2048 high-traffic-app
Network Performance Tuning
Optimize container networking performance with sysctls:
docker run --sysctl net.core.somaxconn=1024 --sysctl net.ipv4.tcp_max_syn_backlog=1024 web-cache