---
title: Hostname Detection in Containers
description: >-
  Troubleshoot hostname resolution errors in containerized Datadog Agent
  deployments on Kubernetes, Docker, and cloud platforms.
breadcrumbs: Docs > Agent > Agent Troubleshooting > Hostname Detection in Containers
---

# Hostname Detection in Containers

Many features in Datadog rely on the Agent to provide an accurate hostname for monitored hosts. While this is straightforward when the Agent runs directly on a host, the hostname resolution process is different when the Agent runs in a containerized environment.

Since version **7.40**, the Agent properly recognizes failed hostname resolution in containerized environments. Without a resolved hostname, the Agent exits with an error shortly after it starts.

When that happens, the following `ERROR` message is printed in the logs:

```
Error while getting hostname, exiting: unable to reliably determine the host name. You can define one in the agent config file or in your hosts file
```

Encountering this error usually means that some part of the Agent configuration is incorrect. Use the following information to resolve various common cases of this misconfiguration.

## Kubernetes hostname errors{% #kubernetes-hostname-errors %}

On Kubernetes, a hostname error usually means the Agent cannot access at least one of:

- Kubelet API
- Cloud provider metadata endpoint
- Container runtime API

Some Kubernetes distributions require a dedicated configuration, so verify that your setup is aligned with our [recommended Kubernetes setup](https://docs.datadoghq.com/containers/kubernetes/distributions).

### Accessing the Kubelet API{% #accessing-the-kubelet-api %}

Make sure the Agent can access the Kubelet API. When it can, the Agent prints this log:

```
Successful configuration found for Kubelet, using URL: ******
```

The Kubernetes RBAC permissions are set automatically by our official [Helm chart](https://github.com/DataDog/helm-charts), the [Datadog Operator](https://github.com/DataDog/datadog-operator) and our official [manifests](https://github.com/DataDog/datadog-agent/tree/main/Dockerfiles/manifests). If you use a different solution to deploy the Agent, make sure the following permissions are present in a `Role` or `ClusterRole` that is bounded to the Agent service account:

```yaml
rules:
  - apiGroups: # Kubelet connectivity
      - ""
    resources:
      - nodes/metrics
      - nodes/spec
      - nodes/proxy
      - nodes/stats
    verbs:
      - get
```

The most common error that prevents connection to the Kubelet API is the verification of Kubelet TLS certificate. In many Kubernetes distributions the Kubelet certificate is either:

- Not signed by the cluster CA.
- Does not contain a SAN corresponding to the address it's reachable at.

This prevents the Agent from connecting to the Kubelet API through HTTPS, because TLS verification is enabled by default.

You can disable TLS verification by using dedicated parameters or by setting the `DD_KUBELET_TLS_VERIFY` variable for **all containers** in the Agent manifest:

{% tab title="Datadog Operator" %}
`DatadogAgent` Kubernetes Resource:

```yaml
apiVersion: datadoghq.com/v2alpha1
metadata:
  name: datadog
spec:
  global:
    kubelet:
      tlsVerify: false
```

{% /tab %}

{% tab title="Helm" %}
Custom `datadog-values.yaml`:

```yaml
datadog:
  kubelet:
    tlsVerify: false
```

{% /tab %}

{% tab title="Manual (DaemonSet)" %}
DaemonSet manifest:

```yaml
apiVersion: apps/v1
metadata:
  name: datadog
spec:
  template:
    spec:
      containers:
        - name: agent
          env:
            - name: DD_KUBELET_TLS_VERIFY
              value: "false"
```

{% /tab %}

### Accessing the cloud provider metadata endpoint{% #accessing-the-cloud-provider-metadata-endpoint %}

If you run in AWS, Google Cloud, or Azure, the Agent can use a metadata endpoint to retrieve the hostname.

Accessing the cloud provider metadata endpoint allows Datadog to properly match Agent data and cloud integration data in the application.

Encountering this issue usually means that access to the metadata endpoint has been restricted. For example, on AWS, this could be due to the [hop limit setting](https://docs.datadoghq.com/containers/troubleshooting/duplicate_hosts).

### Accessing the container runtime API{% #accessing-the-container-runtime-api %}

Use this solution only in the unlikely event that you **explicitly** don't want the Agent to connect to Kubelet API, and if you are not running in a supported cloud provider described above.

In this case you can use the downward API to set `DD_HOSTNAME`:

{% tab title="Datadog Operator" %}
`DatadogAgent` Kubernetes Resource:

```yaml
apiVersion: datadoghq.com/v2alpha1
metadata:
  name: datadog
spec:
  override:
    nodeAgent:
      env:
        - name: DD_HOSTNAME
          valueFrom:
            fieldRef:
              fieldPath: spec.nodeName
```

{% /tab %}

{% tab title="Helm" %}
Custom `datadog-values.yaml`:

```yaml
datadog:
  env:
    - name: DD_HOSTNAME
      valueFrom:
        fieldRef:
          fieldPath: spec.nodeName
```

{% /tab %}

{% tab title="Manual (DaemonSet)" %}
DaemonSet manifest:

```yaml
apiVersion: apps/v1
metadata:
  name: datadog
spec:
  template:
    spec:
      containers:
        - name: agent
          env:
            - name: DD_HOSTNAME
              valueFrom:
                fieldRef:
                  fieldPath: spec.nodeName
```

{% /tab %}

## Amazon ECS and Docker VM hostname errors{% #amazon-ecs-and-docker-vm-hostname-errors %}

When the Agent runs in Docker on a cloud provider, a hostname error usually means that the Agent cannot access at least one of:

- Container runtime API
- Cloud provider metadata endpoint

### Accessing the container runtime API{% #accessing-the-container-runtime-api-1 %}

Allow the Agent to connect to the Docker socket:

{% tab title="Amazon ECS on EC2" %}
Make sure the Docker socket is mounted in your [task definition](https://docs.datadoghq.com/resources/json/datadog-agent-ecs.json).
{% /tab %}

{% tab title="Docker on VM" %}
Make sure the Docker socket is mounted in your `docker run` command:

```gdscript3
-v /var/run/docker.sock:/var/run/docker.sock:ro
```

{% /tab %}

### Accessing the cloud provider metadata endpoint{% #accessing-the-cloud-provider-metadata-endpoint-1 %}

If you run in AWS, Google Cloud, or Azure, the Agent can use a metadata endpoint to retrieve the hostname.

Accessing the cloud provider metadata endpoint allows Datadog to properly match Agent data and cloud integration data in the application.

Encountering this issue usually means that access to the metadata endpoint has been restricted. For example, on AWS, this could be due to the [hop limit setting](https://docs.datadoghq.com/containers/troubleshooting/duplicate_hosts).

## Hostname errors in CI environments, sidecar setups, and environments without access to container runtime{% #hostname-errors-in-ci-environments-sidecar-setups-and-environments-without-access-to-container-runtime %}

When you run the Agent in a **CI environment** (so Agent is ephemeral) or as a sidecar without access to host information, two options are available:

- Setting `DD_HOSTNAME` (`hostname` in `datadog.yaml`) explicitly to the hostname:

```
-e DD_HOSTNAME=$(hostname)
```

- Setting `DD_HOSTNAME_TRUST_UTS_NAMESPACE` (`hostname_trust_uts_namespace` in `datadog.yaml`):

This option is available starting Datadog Agent **7.42.0**.

```
-e DD_HOSTNAME_TRUST_UTS_NAMESPACE=true
```

When this is set, the Agent will use the in-container hostname (usually the container name or pod name).

**Note**: This does not apply to serverless solutions like Fargate.

If the solutions above did not fix your Agent setup, reach out to the [Datadog support team](https://docs.datadoghq.com/help/).
