Open vmilosevic opened 6 days ago
This action uses EBPF to trace two system calls so the correct way to run it is actually:
sudo docker run --privileged -ti catthehacker/ubuntu:act-latest /bin/bash -v /sys/:/sys/
This mounts the system tracepoints (/sys/) part into the docker image and it gives it root access rights. Allowing the tracer to hook into the system.
Hi, first of all this is a great action for GH. When running on Github runner it works great, however, it has problems running inside the docker image. At first it couldn't start inside the docker, until I added "sudo" to Ubuntu docker image. Now I can see "Step Trace" chart, "Process Trace" is showing but without information, and memory, CPU etc are not showing at all.
I can see some errors in the log:
The "start" step in the workflow doesn't show any errors.
I suppose I need to add some packages to Ubuntu for this to work, do you maybe know which one? Thanks!