Type
dockerVariants
Containers Only, Full Control
Common Use Cases
Container lifecycle managementStart, stop, restart, and monitor Docker containers
Image building and deploymentBuild container images and push to registries
Volume and network operationsManage persistent storage and container networking
Container health monitoringCheck container status, logs, and resource usage
Variants Overview
| Variant | Security | Key Permissions | Best For | Create Command |
|---|---|---|---|---|
| Containers Only 🟡 | Recommended | Start, stop, restart, logs only | Container management, deployment | --variant containers_only |
| Full Control 🔴 | Unrestricted | All Docker operations | CI/CD pipelines, infrastructure as code | --variant full_control |
Configuration
Example Configuration:📋 Full Configuration Reference
📋 Full Configuration Reference
| Parameter | Type | Default | Description |
|---|---|---|---|
docker_host | string | ”unix:///var/run/docker.sock” | Docker daemon socket |
api_version | string | ”auto” | Docker API version |
allowed_operations | array | variant-specific | Whitelist of Docker operations |
network_access | boolean | variant-specific | Allow network operations |
volume_management | boolean | variant-specific | Allow volume management |
registry_auth | object | Registry authentication credentials | |
default_memory_limit | string | ”512MB” | Default container memory limit |
default_cpu_limit | number | 1.0 | Default CPU limit |
⚙️ Variant-Specific Defaults
⚙️ Variant-Specific Defaults
Containers Only:
allowed_operations: [“start”, “stop”, “restart”, “logs”, “inspect”, “ps”, “stats”]network_access: false (locked)volume_management: false (locked)
allowed_operations: [”*”] (all operations)network_access: truevolume_management: true- Higher default limits
Quick Start
View Complete Examples
See full CI/CD pipeline configurations, Docker Compose integration, and troubleshooting guides
Docker Operations
Container Management
Image Operations (Full Control Only)
Volume & Network (Full Control Only)
Security Best Practices
Use Containers Only for Production
Use Containers Only for Production
In production, restrict to container lifecycle operations only.
Secure Docker Socket Access
Secure Docker Socket Access
Docker socket provides root-equivalent access. Use proper permissions and consider socket proxies.
Set Resource Limits
Set Resource Limits
Define default memory and CPU limits to prevent resource exhaustion.
Requirements: Docker daemon must be installed and running on the worker. Worker user needs access to the Docker socket (typically by being in the
docker group).Docker Compose Integration
Agents can work with Docker Compose for multi-container applications:Troubleshooting & Related Skills
Cannot Connect to Docker Daemon
Cannot Connect to Docker Daemon
Solutions:
- Verify Docker daemon is running:
systemctl status docker - Add worker user to docker group:
sudo usermod -aG docker worker-user - Check Docker socket permissions:
ls -la /var/run/docker.sock
Permission Denied
Permission Denied
Solutions:
- Ensure worker user is in docker group
- Verify Docker socket permissions
- Review
allowed_operationsin configuration
Image Pull Fails
Image Pull Fails
Solutions:
- Verify network connectivity from worker
- Check registry authentication credentials
- Ensure
network_access: truein configuration