As Docker supports cgroup v2 since engine version 20.10, it will automatically use it on distributions that have cgroups v2 enabled. The known solutions to get the unique container ID from within the container, do not work anymore.
/ # cat /proc/self/cgroup
0::/
/ # cat /proc/1/cpuset
/
Tried with docker v20.10.8 on Debian 11 with alpine:latest.
Working solutions for cgroup v1:
How can I get Docker Linux container information from within the container itself?
As stated in the docker reference, with cgroup v2, the container id is still visible in the filesystem at the following places, but those aren’t accessible from the container itself.
/sys/fs/cgroup/memory/docker/<longid>/ on cgroup v1, cgroupfs driver
/sys/fs/cgroup/memory/system.slice/docker-<longid>.scope/ on cgroup v1, systemd driver
/sys/fs/cgroup/docker/<longid/> on cgroup v2, cgroupfs driver
/sys/fs/cgroup/system.slice/docker-<longid>.scope/ on cgroup v2, systemd driver
https://docs.docker.com/config/containers/runmetrics/#find-the-cgroup-for-a-given-container
Edit 1/2021-09-01:
One Workaround is to run the container with the option --cgroupns host
. But that requires control over the creation of the container.
$ docker run -it --cgroupns host alpine cat /proc/self/cgroup
0::/system.slice/docker-09ec67119d38768dbf7994d81c325e2267214428a3c2e581c81557e3650863d8.scope
$ docker run -it alpine cat /proc/self/cgroup
0::/
Question:
Is there any way, to get the unique container id from within? (without relying on the container hostname or having to use the docker api to fetch the id)
5
Answers
I have encountered the same problem while trying to fetch the container identification from cgroup.
But there is another way to achieve the same goal. Docker containers are rely on OverlayFS storage driver, each container will be assigned an unqiue directory which is mapped to a virtual filesystem where the container files are written.
as the command result has shown above,
upperdir=/var/lib/docker/overlay2/76c8877e95fa589df1fb97bf831ec221df130fdfb8f1f1cb8166bd99bebf51de/diff
locates in host machine and it serves only one container that it is allocated to.Notice that OverlayFS could be replace to any driver that implement the speicification of storage driver, but
upperdir
information remains the same structure.Make sure that the decision must take inside the container since the host machine would show up OverlayFS mount information if LXC is delopyed on the host machine.
This seems to work without the need to query to cgroup and without using the value of hostname, which sometimes is not set to the value of container id, for example in gitlab runners with docker executors.
Thanks @soxfmr and to this How do I identify which container owns which overlay directory?
The
--cgroupns host
fix is effective, but not available if you don’t control the container’s creation. Further, thisdocker run
option is not available in the API or docker compose (https://github.com/compose-spec/compose-spec/issues/148).But… good news – the container ID is still exposed via /proc/self/mountinfo:
Here’s a Python snippet that’ll parse it:
Credit goes to richgriswold: https://community.toradex.com/t/python-nullresource-error-when-running-torizoncore-builder-build/15240/4
You could also get the
systemmd
using:from outside the Docker container, will be:
And the output will be just the UUID, for example,
7a0144cee1256c539fab790199527b7051aff1b603ebcf7ed3fd436440ef3b3a
.run this command inside the container :