-
Notifications
You must be signed in to change notification settings - Fork 618
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for --shm-size
docker run
flag
#787
Comments
Hi , Any ETA for this feature? Or any workaround for it in the meantime? Basically, I need to run some version of Chromium headless inside containers, and that requires more than the default 64M of shared memory so at the moment it's simply impossible to run it. Actually a quick but probably dirty hack is to mount the Thanks, |
+1, also running Chromium inside ECS here. Next to impossible with default shm size. |
+1, ditto on headless chromium. |
+1, I would really prefer support for this option vs implementing the possible work arounds |
+1, headless chromium is a shrinking violet with default 64mb shm |
+1, also stuck until this is implemented. |
we are also waiting for the Amazon ECS AMi to contain latest docker daemon to at least be able to change the default size of shm to be bigger than 64M |
+1, I am waiting to see this feature implemented. |
Any update on when this will be a reality? We are running into issues on this as well. |
@alinpa we use
in the EDIT: I should mention to aid understanding that this is the exact equivalent of @sdeprez's approach, for AWS instead of |
Anyone interested in this for use with Chrome/Chromium may also want to star / comment on these bugs: |
This article is amazing https://medium.com/@marco.luethy/running-headless-chrome-on-aws-lambda-fa82ad33a9eb as it shows how to remove the requirement on shm with a custom binary. |
Yes, its pretty cool, but if you're having SHM issues already with chromium, they are likely to continue with lambda. You can force it to run in that environment, but when I tried, it didn't work for our purposes. Very crashy. |
FWIW, we currently hack it by granting elevated privileges and remounting /dev/shm on container boot. Not optimal, especially if you have strong security requirements, but one of the only ways to safely make it happen from a memory allocation standpoint if you use more than one container. Other than that, you have to give up ECS and roll your own. |
I'm trying to use Google Puppeteer on ECS and I'm having this problem. I'm using Fargate as well, so there's no way to use the privileged mode hack... Do you have an ETA for that? That's keeping me and my team away of using cool stuff like ECS... |
FYI on latest Amazon ECS AMIs (or any AMI with docker 17.06+) it's possible to increase the size of /dev/shm by passing --default-shm-size 256M to the docker daemon on startup. |
@mkleint That are great news! I couldn't find the documentation about this option, do you have any source explaining how to use this? |
From reading the latest in https://bugs.chromium.org/p/chromium/issues/detail?id=736452#c56, it looks like this issue is fixed in Chrome >= 64.0.3281.0 with a |
A proposal for the implementation of shmsize is available in #1149. |
Hello everyone, we announced support for Closing this issue for now. Please let us know if you have any follow up comments/questions regarding this. |
@aaithal have you added this option to cloudformation? I don't see it in here: |
Has 7 +1s and the following mentions:
The text was updated successfully, but these errors were encountered: