Best way to Run Docker in Docker (DinD)

Share on Social Media

In this article, you will learn about the best way to run Docker in Docker (DinD) Containers. #centlinux #linux #docker

What is Docker?

Docker is a platform that simplifies the way developers build, ship, and run applications. It utilizes a concept called “containers,” which are self-contained units that package together an application’s code, libraries, and dependencies. This allows the application to run consistently and reliably across different environments, regardless of the underlying operating system. Docker speeds up development by eliminating the need to manually configure environments and simplifies deployment by ensuring applications run the same way everywhere.

What is Docker in Docker (DinD)?

Docker in Docker (DinD) refers to the practice of running a Docker engine inside a Docker container. This essentially creates a nested container environment where you can run containers within another container. While it offers some specific advantages, it’s crucial to understand its limitations and security risks before using it.

What it does:

  • Allows you to create isolated development and testing environments within a container.
  • Enables building container images that include the Docker engine itself.
  • Can be used for advanced use cases like nested container testing and containerized security tools.

Why run Docker in Docker (DinD) Containers?

Running Docker in Docker (DinD) serves a few specific purposes, but it’s crucial to understand its limitations and security implications before using it:

1. Isolated Development and Testing:

DinD allows developers to create isolated environments within a container, specifically tailored for their applications. This ensures consistent dependencies, configurations, and runtime environments across various development stages like development, testing, and staging. This consistency simplifies reproducing and debugging issues, leading to a smoother development workflow.

2. Building Container Images:

DinD can be used to build container images that include the Docker engine itself. This can be helpful when the target environment also needs Docker functionality. For example, a containerized CI/CD pipeline might need Docker to build and test other containers.

3. Advanced Use Cases:

In specific scenarios, DinD might be used for more advanced functionalities like:

  • Nested container testing: Testing how applications behave within nested container environments.
  • Containerized security tools: Running containerized security scanners or vulnerability assessments within another container.

However, it’s important to remember:

  • Security Risks: DinD requires granting elevated privileges, making it a security risk in production environments. Only use it in controlled and secure settings with careful consideration.
  • Alternatives: For most use cases, alternative approaches like container orchestration tools (e.g., Kubernetes) offer better security and manage complex containerized applications more effectively.

DinD has niche applications, but it’s generally recommended to explore safer alternatives whenever possible due to the inherent security concerns.

Recommended Training: An Introduction to Docker, Swarm, and Kubernetes for DevOps

How to run Docker in Docker (DinD)?

Here’s how to run Docker in Docker (DinD) using the official docker:dind image:

If you don’t have a Docker host, then before moving forward, you should follow our previous article to install Docker on Rocky Linux 9.

1. Pull the DinD image:

Download the Docker Official DinD container from Docker Hub by using following command.

$ docker pull docker:dind

2. Run the DinD container:

You can now create and run a container from Docker in Docker image.

$ docker run --privileged -d --name dind-container docker:dind


  • --privileged: Grants elevated privileges necessary for running Docker inside the container.
  • -d: Runs the container in detached mode, allowing it to run in the background.
  • --name dind-container: Assigns a name to the container for easier management.

3. Access the DinD container for running commands:

Alternatively, you can run following command to run a Docker in Docker container and acquire a BASH shell for running commands in DinD container.

$ docker exec -it dind-container /bin/bash

This allows you to run Docker commands within the DinD container.

4. Run another container inside the DinD container:

Execute the following command to run a Ubuntu container within the DinD container.

$ docker exec -d dind-container docker run --name inner-container ubuntu:latest echo "Hello from inner container!"


  • docker exec: Executes a command inside a running container.
  • -d: Runs the inner container in detached mode.
  • dind-container: Specifies the DIND container to run the command in.
  • docker run: Starts a new container inside the DIND container.
  • --name inner-container: Names the inner container for easier management.
  • ubuntu:latest: Specifies the image to use for the inner container.
  • echo "Hello from inner container!": Command to be executed inside the inner container.

Pros and Cons of Running Docker in Docker:

Running Docker in Docker (DinD) offers some specific advantages, but it comes with several disadvantages that you should be aware of before using it:

1. Security Risks:

  • Elevated Privileges: DinD requires granting the inner container privileged mode, which allows it to bypass certain security restrictions on the host system. This significantly increases the potential attack surface and makes the entire system more vulnerable to security breaches.
  • Nested Vulnerabilities: Any vulnerabilities present in the inner container’s Docker engine or the image used to build it can potentially expose the host system as well.
  • Misconfiguration Risks: Improper configuration of the inner container or the Docker daemon within it can further exacerbate security vulnerabilities.

2. Increased Complexity:

  • Managing Nested Environments: Managing and troubleshooting issues within nested container environments can become complex compared to managing individual containers directly on the host.
  • Debugging Challenges: Debugging issues within the inner container can be more challenging due to the additional layers involved.

3. Performance Overhead:

  • Resource Consumption: Running an additional container with the Docker engine adds to the overall resource consumption of the system, potentially impacting the performance of other running containers or applications.
  • Nested Communication Overhead: Communication between containers within the inner container and the host system might introduce additional overhead compared to direct communication.

Alternatives to DinD:

In most cases, it’s recommended to explore safer alternatives to DinD for your specific needs. Here are some options:

  • Container Orchestration Tools: Tools like Kubernetes offer a more secure and scalable way to manage complex containerized applications. They provide features like resource allocation, container health checks, and service discovery, making them a better choice for production environments.
  • Multi-stage Builds: Utilize multi-stage builds in Docker to create leaner container images by separating the build and runtime environments. This reduces the attack surface and improves security without requiring DinD.
  • Virtual Machines: If complete isolation and a specific environment are necessary, consider using virtual machines instead of DinD. While virtual machines are resource-intensive compared to containers, they can offer a more secure environment in specific scenarios.

Recommended Online Training: Hands on With Docker & Docker Compose From a Docker Captain
Recommended eBook:  Docker: Up & Running: Shipping Reliable Containers in Production (PAID LINK) by Sean P. Kane & Karl Matthias.


In conclusion, while DinD offers some niche use cases, its security risks and increased complexity often outweigh its benefits. Carefully consider the alternatives before resorting to DinD and only use it in controlled and secure settings with thorough security practices in place.

Scroll to Top