KDE Plasma Desktop container designed for Kubernetes with direct access to the GPU with EGL using VirtualGL and Vulkan for GPUs with WebRTC and HTML5, providing an open-source remote cloud graphics or game streaming platform. Does not require /tmp/.X11-unix
host sockets or host configuration.
Use docker-nvidia-glx-desktop for a KDE Plasma Desktop container with better performance, with fully optimized OpenGL and Vulkan for NVIDIA GPUs by spawning its own fully isolated X Server instead of using /tmp/.X11-unix
host sockets.
Read the Troubleshooting section first before raising an issue. Support is also available with the Selkies Discord. Please redirect issues or discussions regarding the selkies-gstreamer WebRTC HTML5 interface to the project.
This container is composed fully of vendor-neutral applications and protocols except the NVIDIA base container itself, meaning that there is nothing stopping you from using this container with GPUs of other vendors including AMD and Intel. Use the respective vendor's container toolkit/runtime or Kubernetes device plugin and make sure that it provisions /dev/dri/card[n]
devices, then set the environment variable WEBRTC_ENCODER
to the value x264enc
, vp8enc
, or vp9enc
if using the selkies-gstreamer WebRTC interface. However, this is not officially supported and you must solve your own problems. This container also supports running without any GPUs with software fallback (set WEBRTC_ENCODER
to the value x264enc
, vp8enc
, or vp9enc
if using the selkies-gstreamer WebRTC interface).
Wine, Winetricks, Lutris, and PlayOnLinux are bundled by default. Comment out the section where it is installed within Dockerfile
if the user wants to remove them from the container.
There are two web interfaces that can be chosen in this container, the first being the default selkies-gstreamer WebRTC HTML5 interface (requires a TURN server or host networking), and the second being the fallback noVNC WebSocket HTML5 interface. While the noVNC interface does not support audio forwarding and remote cursors for gaming, it can be useful for troubleshooting the selkies-gstreamer WebRTC interface or using this container with low bandwidth environments.
The noVNC interface can be enabled by setting NOVNC_ENABLE
to true
. When using the noVNC interface, all environment variables related to the selkies-gstreamer WebRTC interface are ignored, with the exception of BASIC_AUTH_PASSWORD
. As with the selkies-gstreamer WebRTC interface, the noVNC interface password will be set to BASIC_AUTH_PASSWORD
, and uses PASSWD
by default if not set. The noVNC interface also additionally accepts the NOVNC_VIEWPASS
environment variable, where a view only password with only the ability to observe the desktop without controlling can also be set.
The container requires host NVIDIA GPU driver versions of at least 450.80.02 and preferably 470.42.01, with the NVIDIA Container Toolkit to be also configured on the host for allocating GPUs. All Maxwell or later generation GPUs in the consumer, professional, or datacenter lineups will not have significant issues running this container, although the selkies-gstreamer high-performance NVENC backend may not be available (see the next paragraph). Kepler GPUs are untested and likely does not support the NVENC backend, but can be mostly functional using fallback software acceleration.
The high-performance NVENC backend for the selkies-gstreamer WebRTC interface is only supported in GPUs listed as supporting H.264 (AVCHD)
under the NVENC - Encoding
section of NVIDIA's Video Encode and Decode GPU Support Matrix. If you are using software fallback without allocated GPUs or your GPU is not listed as supporting H.264 (AVCHD)
, add the environment variable WEBRTC_ENCODER
with the value x264enc
, vp8enc
, or vp9enc
in your container configuration for falling back to software acceleration, which also has a very good performance depending on your CPU.
The username is user
in both the container user account and the web authentication prompt. The environment variable PASSWD
is the password of the container user account, and BASIC_AUTH_PASSWORD
is the password for the HTML5 interface authentication prompt. If ENABLE_BASIC_AUTH
is set to true
for selkies-gstreamer (not required for noVNC) but BASIC_AUTH_PASSWORD
is unspecified, the HTML5 interface password will default to PASSWD
.
NOTES: Only one web browser can be connected at a time with the selkies-gstreamer WebRTC interface. If the signaling connection works, but the WebRTC connection fails, read the Using a TURN Server section.
- Run the container with Docker (or other similar container CLIs like Podman):
docker run --gpus 1 -it --tmpfs /dev/shm:rw -e TZ=UTC -e SIZEW=1920 -e SIZEH=1080 -e REFRESH=60 -e DPI=96 -e CDEPTH=24 -e PASSWD=mypasswd -e WEBRTC_ENCODER=nvh264enc -e BASIC_AUTH_PASSWORD=mypasswd -p 8080:8080 ghcr.io/selkies-project/nvidia-egl-desktop:latest
NOTES: The container tags available are
latest
and22.04
for Ubuntu 22.04, and20.04
for Ubuntu 20.04,. Replace all instances ofmypasswd
with your desired password.BASIC_AUTH_PASSWORD
will default toPASSWD
if unspecified. The container must not be run in privileged mode.
The environment variable VGL_DISPLAY
can also be passed to the container, but only do so after you understand what it implicates with VirtualGL, valid values being either egl[n]
, or /dev/dri/card[n]
only when --device=/dev/dri
was used for the container.
Change WEBRTC_ENCODER
to x264enc
, vp8enc
, or vp9enc
when using the selkies-gstreamer interface if you are using software fallback without allocated GPUs or your GPU does not support H.264 (AVCHD)
under the NVENC - Encoding
section in NVIDIA's Video Encode and Decode GPU Support Matrix.
- Connect to the web server with a browser on port 8080. You may also separately configure a reverse proxy to this port for external connectivity.
NOTES: Additional configurations and environment variables for the selkies-gstreamer WebRTC HTML5 interface are listed in lines that start with
parser.add_argument
within the selkies-gstreamer main script.
- (Not Applicable for noVNC) Read carefully if the selkies-gstreamer WebRTC HTML5 interface does not connect. Choose whether to use host networking or a TURN server. The selkies-gstreamer WebRTC HTML5 interface will likely just start working if you add
--network host
to the abovedocker run
command. However, this may be restricted or be undesired because of security reasons. If so, check if the container starts working after omitting--network host
. If it does not work, you need a TURN server. Read the Using a TURN Server section and add the environment variables-e TURN_HOST=
,-e TURN_PORT=
, and pick one of-e TURN_SHARED_SECRET=
or both-e TURN_USERNAME=
and-e TURN_PASSWORD=
environment variables to thedocker run
command based on your authentication method.
- Create the Kubernetes Secret with your authentication password:
kubectl create secret generic my-pass --from-literal=my-pass=YOUR_PASSWORD
NOTES: Replace
YOUR_PASSWORD
with your desired password, and change the namemy-pass
to your preferred name of the Kubernetes secret with theegl.yml
file changed accordingly as well. It is possible to skip the first step and directly provide the password withvalue:
inegl.yml
, but this exposes the password in plain text.
- Create the pod after editing the
egl.yml
file to your needs, explanations are available in the file:
kubectl create -f egl.yml
NOTES: The container tags available are
latest
and22.04
for Ubuntu 22.04, and20.04
for Ubuntu 20.04.BASIC_AUTH_PASSWORD
will default toPASSWD
if unspecified.
Change WEBRTC_ENCODER
to x264enc
, vp8enc
, or vp9enc
when using the selkies-gstreamer interface if you are using software fallback without allocated GPUs or your GPU does not support H.264 (AVCHD)
under the NVENC - Encoding
section in NVIDIA's Video Encode and Decode GPU Support Matrix.
- Connect to the web server spawned at port 8080. You may configure the ingress endpoint or reverse proxy that your Kubernetes cluster provides to this port for external connectivity.
NOTES: Additional configurations and environment variables for the selkies-gstreamer WebRTC HTML5 interface are listed in lines that start with
parser.add_argument
within the selkies-gstreamer main script.
- (Not Applicable for noVNC) Read carefully if the selkies-gstreamer WebRTC HTML5 interface does not connect. Choose whether to use host networking or a TURN server. The selkies-gstreamer WebRTC HTML5 interface will likely just start working if you uncomment
hostNetwork: true
inegl.yml
. However, this may be restricted or be undesired because of security reasons. If so, check if the container starts working after commenting outhostNetwork: true
. If it does not work, you need a TURN server. Read the Using a TURN Server section and fill in the environment variablesTURN_HOST
andTURN_PORT
, then pick one ofTURN_SHARED_SECRET
or bothTURN_USERNAME
andTURN_PASSWORD
environment variables based on your authentication method.
Note that this section is only required for the selkies-gstreamer WebRTC HTML5 interface. For an easy fix to when the signaling connection works, but the WebRTC connection fails, add the option --network host
to your Docker command, or uncomment hostNetwork: true
in your egl.yml
file when using Kubernetes (note that your cluster may have not allowed this, resulting in an error). This exposes your container to the host network, which disables network isolation. If this does not fix the connection issue (normally when the host is behind another firewall) or you cannot use this fix for security or technical reasons, read the below text.
In most cases when either of your server or client has a permissive firewall, the default Google STUN server configuration will work without additional configuration. However, when connecting from networks that cannot be traversed with STUN, a TURN server is required.
Read the instructions from selkies-gstreamer if want to deploy a TURN server or use a public TURN server instance.
With Docker (or Podman), use the -e
option to add the TURN_HOST
, TURN_PORT
environment variables. This is the hostname or IP and the port of the TURN server (3478 in most cases).
You may set TURN_PROTOCOL
to tcp
if you are only able to open TCP ports for the coTURN container to the internet, or if the UDP protocol is blocked or throttled in your client network. You may also set TURN_TLS
to true
with the -e
option if TURN over TLS/DTLS was properly configured.
You also require to provide either just TURN_SHARED_SECRET
for time-limited shared secret TURN authentication, or both TURN_USERNAME
and TURN_PASSWORD
for legacy long-term TURN authentication, depending on your TURN server configuration. Provide just one of these authentication methods, not both.
Your TURN server will use only one out of two ways to authenticate the client, so only provide one type of authentication method. The time-limited shared secret TURN authentication requires to only provide the Base64 encoded TURN_SHARED_SECRET
. The legacy long-term TURN authentication requires to provide both TURN_USERNAME
and TURN_PASSWORD
credentials.
- Create a secret containing the TURN shared secret:
kubectl create secret generic turn-shared-secret --from-literal=turn-shared-secret=MY_TURN_SHARED_SECRET
NOTES: Replace
MY_TURN_SHARED_SECRET
with the shared secret of the TURN server, then changing the nameturn-shared-secret
to your preferred name of the Kubernetes secret, with theegl.yml
file also being changed accordingly.
- Uncomment the lines in the
egl.yml
file related to TURN server usage, updating theTURN_HOST
andTURN_PORT
environment variable as needed:
- name: TURN_HOST
value: "turn.example.com"
- name: TURN_PORT
value: "3478"
- name: TURN_SHARED_SECRET
valueFrom:
secretKeyRef:
name: turn-shared-secret
key: turn-shared-secret
- name: TURN_PROTOCOL
value: "udp"
- name: TURN_TLS
value: "false"
NOTES: It is possible to skip the first step and directly provide the shared secret with
value:
, but this exposes the shared secret in plain text. SetTURN_PROTOCOL
totcp
if you were able to only open TCP ports while creating your own coTURN Deployment/DaemonSet, or if your client network throttles or blocks the UDP protocol.
- Create a secret containing the TURN password:
kubectl create secret generic turn-password --from-literal=turn-password=MY_TURN_PASSWORD
NOTES: Replace
MY_TURN_PASSWORD
with the password of the TURN server, then changing the nameturn-password
to your preferred name of the Kubernetes secret, with theegl.yml
file also being changed accordingly.
- Uncomment the lines in the
egl.yml
file related to TURN server usage, updating theTURN_HOST
,TURN_PORT
, andTURN_USERNAME
environment variable as needed:
- name: TURN_HOST
value: "turn.example.com"
- name: TURN_PORT
value: "3478"
- name: TURN_USERNAME
value: "username"
- name: TURN_PASSWORD
valueFrom:
secretKeyRef:
name: turn-password
key: turn-password
- name: TURN_PROTOCOL
value: "udp"
- name: TURN_TLS
value: "false"
NOTES: It is possible to skip the first step and directly provide the TURN password with
value:
, but this exposes the TURN password in plain text. SetTURN_PROTOCOL
totcp
if you were able to only open TCP ports while creating your own coTURN Deployment/DaemonSet, or if your client network throttles or blocks the UDP protocol.
Link
Run Input Method: Configure Input Method
from the start menu, uncheck Only Show Current Language
, search and add from available input methods (Hangul, Mozc, Pinyin, and others) by moving to the right, then use Ctrl + Space
to switch between the input methods. Raise an issue if you need more layouts.
Check that the NVIDIA Container Toolkit is properly configured in the host. Next, check whether your host NVIDIA GPU driver is the nvidia-headless
variant, which lacks the required display and graphics capabilities for this container.
After that, check the environment variable NVIDIA_DRIVER_CAPABILITIES
after starting a shell interface inside the container. NVIDIA_DRIVER_CAPABILITIES
should be set to all
, or include a comma-separated list of compute
(requirement for CUDA and OpenCL, or for the selkies-gstreamer WebRTC remote desktop interface), utility
(requirement for nvidia-smi
and NVML), graphics
(requirement for OpenGL and part of the requirement for Vulkan), video
(required for encoding or decoding videos using NVIDIA GPUs, or for the selkies-gstreamer WebRTC remote desktop interface), display
(the other requirement for Vulkan), and optionally compat32
if you use Wine or 32-bit graphics applications.
Moreover, if you are using custom configurations, check if your shared memory path /dev/shm
has sufficient capacity, where expanding the capacity is done by adding --tmpfs /dev/shm:rw
to your Docker command or adding the below lines to your Kubernetes configuration file.
spec:
template:
spec:
containers:
volumeMounts:
- mountPath: /dev/shm
name: dshm
volumes:
- name: dshm
emptyDir:
medium: Memory
If you checked everything here, scroll down.
I want to use systemd
, polkit
, FUSE mounts, or sandboxed (containerized) application distribution systems like Flatpak, Snapcraft (snap), AppImage, and etc.
Use the option --appimage-extract-and-run
or --appimage-extract
with your AppImage to run them in a container. Alternatively, set export APPIMAGE_EXTRACT_AND_RUN=1
to your current shell. For controlling PulseAudio, use pactl
instead of pacmd
as the latter corrupts the audio system within the container. Use sudoedit
to edit protected files in the desktop instead of using sudo
followed by the name of the editor.
Open Long Answer
For `systemd`, `polkit`, FUSE mounts, or sandboxed application distribution systems, do not use them with containers. You can use them if you add unsafe capabilities to your containers, but it will break the isolation of the containers. This is especially bad if you are using Kubernetes. For controlling PulseAudio, use `pactl` instead of `pacmd` as the latter corrupts the audio system within the container. Because `polkit` does not work, use `sudoedit` to edit protected files with the GUI instead of using `sudo` followed by the name of the editor. There will likely be an alternative way to install the applications, including [Personal Package Archives](https://launchpad.net/ubuntu/+ppas). For some applications, there will be options to disable sandboxing when running or options to extract files before running.This is likely an issue with VirtualGL, which is used to translate GLX commands to EGL commands and use OpenGL without Xorg. Some applications, including research workloads, show this problem. This cannot be solved by raising an issue here or contacting me.
First, check that the application works with docker-nvidia-glx-desktop in the same host environment. If it works, it is indeed a problem associated with VirtualGL. If it does not, raise an issue here. Second, use the error messages found with verbose mode and search similar issues for your application. Third, if there are no similar issues, raise the issue to the repository or contact the maintainers. Fourth, if the maintainers request that it should be redirected to VirtualGL, raise an issue there after confirming VirtualGL does not have similar issues raised. Note that in this case, you may have to wait for a new VirtualGL release and for this repository to use the new release.
Make sure that the NVIDIA_DRIVER_CAPABILITIES
environment variable is set to all
, or includes both graphics
and display
. The display
capability is especially crucial to Vulkan, but the container does start without noticeable issues other than Vulkan without display
, despite its name. AMD and Intel GPUs are not tested and therefore Vulkan is not guaranteed to work. A Vulkan ICD file is probably required to be added and related drivers like mesa-vulkan-drivers
should be installed inside the container. People are welcome to share their experiences, however.
Use the VGL_DISPLAY
environment variable, but only do so after you understand what it implicates with VirtualGL. Valid values are either egl[n]
, or /dev/dri/card[n]
only when --device=/dev/dri
was used for the container ([n]
is the order of the GPUs, where simply egl
without the number is the same as egl0
). Note that docker --gpus 1
means any single GPU, not the GPU device ID of 1. Use docker --gpus '"device=1,2"'
to provision GPUs with device IDs 1 and 2 to the container.
This work was supported in part by National Science Foundation (NSF) awards CNS-1730158, ACI-1540112, ACI-1541349, OAC-1826967, OAC-2112167, CNS-2100237, CNS-2120019, the University of California Office of the President, and the University of California San Diego's California Institute for Telecommunications and Information Technology/Qualcomm Institute. Thanks to CENIC for the 100Gbps networks.