Podman is a lot like Docker: a tool for running OCI containers. While it maintains backwards compatibility with Dockerfile and docker-compose syntax, it offers a lot of other benefits:

  • daemonless: it can run containers without a daemon process running in the background.
  • Rootless: can run containers without root privileges
  • pods: can group containers into secluded pods, which share resources and network namespace

Podman has other features I haven’t explored yet, like compatibility with Kubernetes yaml file, and being able to run containers as systemd units.

Have you used podman before? What are your thoughts on it?

  • @[email protected]
    link
    fedilink
    291 year ago

    I tried replacing some components of my NAS server that were on docker/docker-compose with podman but unfortunately it was not a 100% drop-in replacement. I had networking issues in podman that I did not have in docker.

    The network stack is implemented quite differently in podman than in docker, once you start using more advanced features the backward compatibility disappears.

    Since it came second, I think it has a lot of technical advantages, avoiding docker’s mistakes and what not. In the long term I’ll probably switch to it, unless Redhat keeps shooting itself in the foot…

    • CyclohexaneOP
      link
      fedilink
      71 year ago

      I personally liked podman’s networking a lot more, but my issue is that it is not well documented. I hope that improves.

      May I ask which networking issues you had?

      • @[email protected]
        link
        fedilink
        3
        edit-2
        1 year ago

        I think one of the issues I had was trying to run pihole with podman on a raspberry pi. I could not get DNS requests to work by just mapping the right ports. I ended up just running with --net=host and it worked, I didn’t feel like debugging further.

        I had other issues on my NAS but I don’t remember what it was, I have a lot of services on it, qBittorrent, Wireguard, Jellyfin, Jackett, netdata, prometheus, samba, syncthing, pihole (redundant), wsdd all in docker.

        • @herrvogel
          link
          71 year ago

          I ran into that same DNS issue with pi-hole but in a docker container, and the (bandaid) solution was to put the container in host network mode too. But turns out it’s not an issue but a feature. By default pi-hole only responds to DNS queries from within its local network. The host machine’s LAN is an external network to the containers, unless you set the container’s network mode to host. Pi-hole does have a setting to make it respond to DNS queries from other networks as well, though. What I’m saying is, that might not have been a podman issue.

  • Bizarroland
    link
    fedilink
    231 year ago

    I was scrolling through and this caught my eye but I totally misread it on first glance, I thought you typed “Pokemon is a demon” and I had to stop and scroll back cuz I was like oh shit this is going to be a good thread.

  • @[email protected]
    link
    fedilink
    141 year ago

    I exclusively use podman instead of docker at work and at home and haven’t encountered any unsolvable problems.

  • darq
    link
    fedilink
    131 year ago

    I tried a couple of times to get Docker running rootlessly on my local machine, without just granting root-like permissions to the user. Spent a few hours reading just the worst documentation that tells you to do things with absolutely no explanation of why, feeling like an idiot.

    Then I installed Podman. It worked more-or-less out of the box, and I got on with the rest of my project.

  • ono
    link
    fedilink
    English
    101 year ago

    Docker has rootless containers, too, although I think Podman has slightly better options for unprivileged uid management.

    Daemonless is appealing, especially for low-powered servers. Getting rid of Docker’s background resource usage is the main reason Podman is on my to-do list.

    I imagine pods could be handy to reduce network configuration for related services.

    I like that the tools exist to make Podman a drop-in replacement for Docker, including the building of containers.

    I have no interest in systemd; I hope it’s optional.

    • shastaxc
      link
      fedilink
      11 year ago

      In kubernetes, I often use multiple containers in a pod only to have init containers check certain status of other servers before running the main container. For example, making sure a database is online and I can query data from it. You can just add this to your main container’s start script though. Docker has a way to do this sort of thing too but it feels clunky.

    • CyclohexaneOP
      link
      fedilink
      1
      edit-2
      1 year ago

      Docker has rootless containers, too, although I think Podman has slightly better options for unprivileged uid management.

      I have not used Docker rootless, but I imagine podman has much better and more flexible network configuration as well?

      On systemd, I actually do not use systemd either, hence why I said I never tried those features. It is not a hard requirement at all. Though I have not tried to use any integrations with OpenRC and podman

  • @[email protected]
    link
    fedilink
    91 year ago

    I generally prefer podman to docker at this point for the reasons you stated. However, podman is not 100% compatible with docker, and I have run in to issues with a few tools, that were admittedly poorly written. Mostly around how they deal with file permission when move files in and out of containers.

  • DacoTaco
    link
    41 year ago

    Ive been using podman on my nas, and i like it.
    It has its issues, but knowing your containers dont run as root just makes me feel more at ease. I dont really understand why a docker should run as root, if the software in the container often run as their own user…

  • @[email protected]
    link
    fedilink
    21 year ago

    We are trying to use podman as a way to run Testcontainers and build images on a kubernetes cluster using Gitlab CI. Building works, but running Testcontainers doesn’t so far :(

      • @[email protected]
        link
        fedilink
        11 year ago

        Yes but imo it’s easier and nicer to integrate Podman into an existing build, for example with maven

        • @[email protected]
          link
          fedilink
          11 year ago

          You typically don’t use podman to build images and you would instead use something like buildah.

            • @[email protected]
              link
              fedilink
              21 year ago

              Somewhat, but just a few pieces of it. Podman build is mainly a way to be backwards compatible with the docker cli. Buildah has some more flexibility and the way it builds the images are slightly different. You can use podman to build, but it’s probably better to move to buildah for the build step as time permits.

      • @[email protected]
        link
        fedilink
        11 year ago

        We are using the kubernetes executor. You can add additional sidecar services for your jobs, and we’re using that mechanic to run podman as a daemon. There are some gotchas I had to solve if I remember, but now it works nicely for us. Except for Testcontainers, which throws an exception when your Testcontainer is exposing ports

        • agilob
          link
          fedilink
          English
          11 year ago

          I got it all working on self hosted kubernetes and crossplatform builds with buildah. What’s your problem exactly? For TC you need to use some env vars to configure ports in .gitlabci

              • @[email protected]
                link
                fedilink
                11 year ago

                I’m very interested in a solution. Our current setup, where we use an external docker host for Testcontainers and Podman to build images is quite painful

                • agilob
                  link
                  fedilink
                  English
                  11 year ago

                  I have this on my to-do list, but sorry, can’t promise when I’ll make a working demo. afair the trick was to use something like “podman in-podman”, like dind works in GitLab runners and then some env-vars manipulation so TC thinks it runs in docker, something like

                  DOCKER_HOST=unix:///run/user/1000/podman/podman.sock and I use alpine as gitlab-ci helper image:

                          image = "docker.io/alpine:3.17.2"
                          helper_image_flavor = "alpine"
                  

                  not sure if that matters, but i had lots of strange problems running with Ubuntu helper images, most were DNS propagation issues

  • @[email protected]
    link
    fedilink
    2
    edit-2
    1 year ago

    Using it on multiple servers and in small scale prod deployment. Works like a charm.

    podman-compose is also usable although noticeably unfinished.