toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

274
active users

#podman

5 posts5 participants0 posts today
Linux Magazine<p>ICYMI: <span class="h-card" translate="no"><a href="https://opensocial.at/profile/linuxnews" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>linuxnews</span></a></span> shows you how to install a containerized Linux distribution with Distrobox<br><a href="https://www.linux-magazine.com/Issues/2025/295/Distrobox?utm_source=mlm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Issues/2025</span><span class="invisible">/295/Distrobox?utm_source=mlm</span></a><br><a href="https://fosstodon.org/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://fosstodon.org/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> <a href="https://fosstodon.org/tags/Lilipod" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lilipod</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>containers</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://fosstodon.org/tags/Distrobox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Distrobox</span></a> <a href="https://fosstodon.org/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
ede@kakam:~#<p>Suche ein <a href="https://chaos.social/tags/Job" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Job</span></a> wo ich Linux administrieren darf. Habe den <a href="https://chaos.social/tags/LPIC1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LPIC1</span></a>. Will als nächsten den <a href="https://chaos.social/tags/LPIC2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LPIC2</span></a> machen. Tue Ding mit <a href="https://chaos.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a>, <a href="https://chaos.social/tags/nixOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nixOS</span></a> und andern <a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Distros. Bin im Layer1-4 zu Hause und würde mich gern zum <a href="https://chaos.social/tags/DevOp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOp</span></a> weiter entwickeln. Container und Virtualisierung sind kein Problem. Habe jahrelang mit <a href="https://chaos.social/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> und <a href="https://chaos.social/tags/vmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vmware</span></a> rumgespielt. Auch <a href="https://chaos.social/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> und <a href="https://chaos.social/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> sind nicht unbekannt für mich. <br>Hat jemand ne Idee oder ein Vorschlag?</p>
Leon Cowle<p>Played around with <a href="https://hachyderm.io/tags/Fastly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fastly</span></a>'s new <a href="https://hachyderm.io/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> Server over the last few days (<a href="https://github.com/fastly/mcp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fastly/mcp</span><span class="invisible"></span></a>). Really cool interactions! (/cc <span class="h-card" translate="no"><a href="https://mastodon.social/@fastlydevs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fastlydevs</span></a></span>)</p><p>I did find that trying to download a certain part of our Fastly content (a large VCL file), it was truncated, and that's because the Fastly MCP server has a hard limit of 50kb in responses.</p><p>So... I wrote my own little (very basic) MCP Server (I'm not a "programmer", but I like to tinker in Python) — only providing "initialize", "tools/list", and "tools/call", and one tool.</p><p>I integrated it into first <a href="https://hachyderm.io/tags/claudecode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>claudecode</span></a> and then <a href="https://hachyderm.io/tags/gemini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gemini</span></a> (both running inside <a href="https://hachyderm.io/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> containers) and soon had 2 working MCP servers configured into the AI assistants.</p><p>Now I can download our VCL files at will, and have the AI assistants read them, in full, from disk, and go from there!</p><p>That was fun!</p>
Max Resing<p>Anyone ever decided to run their own container registry? I am playing with the idea, but all I can find is how people deploy the <a href="https://hub.docker.com/_/registry/" rel="nofollow noopener" target="_blank">official docker registry</a>. Are there no alternatives to it?</p><p><a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/registry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>registry</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a> <a href="https://infosec.exchange/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> <a href="https://infosec.exchange/tags/askfedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>askfedi</span></a> <a href="https://infosec.exchange/tags/askmastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>askmastodon</span></a></p>
Andre Hofmeister<p>Does anyone know why JsonContent sometimes throws an IOException when it is used as HTTP request content, while creating a StringContent from JSON serialization does not?</p><p>I understand the difference, and that the second one creates the JSON content ahead, but I do not understand why JsonContent causes an IOException (connection reset by peer): <a href="https://github.com/testcontainers/Docker.DotNet/pull/33" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/testcontainers/Dock</span><span class="invisible">er.DotNet/pull/33</span></a>. <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://mastodon.social/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a></p>
Bo Morgan<p>Woot. Successfully set up a svelte vite server within a podman container along with an nginx reverse proxy running in another podman container. It's all certbot https, including websockets. That's a good goal accomplished. Still need the REST API and database containers, but getting closer to containerizing my first web app.</p><p><a href="https://kolektiva.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a> <a href="https://kolektiva.social/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> <a href="https://kolektiva.social/tags/svelte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>svelte</span></a> <a href="https://kolektiva.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://kolektiva.social/tags/vite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vite</span></a> <a href="https://kolektiva.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://kolektiva.social/tags/webapp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapp</span></a></p>
Wulfy<p>If you are using NPM (<a href="https://infosec.exchange/tags/NginX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NginX</span></a> proxy Manager container) you may be getting 502 Gateway errors from Resty.</p><p>There is a whole shopping list why it does not work...</p><p>But what I found works for me is replacing the container name with the internal Docker IP address.</p><p>Will probably fail when the stack is restarted... so better not restart 0_o</p><p>I was trying the NPM container because its got a nice GUI and allows Advanced NginX configurations.</p><p>My previous NginX container was <a href="https://infosec.exchange/tags/SteveLTN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SteveLTN</span></a> /https-portal which was pretty robust and flexible. But no GUI and no Advanced configs (not that I could get them working anyway).</p><p>Havnt tried <a href="https://infosec.exchange/tags/traefik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>traefik</span></a> yet. But it seems every proxy has its own weirdness.</p><p><a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a></p>
The Linux Lighthouse<p>Why openSUSE MicroOS is the Best Immutable Linux Distro</p><p><a href="https://www.youtube.com/watch?v=mFpsbmbAN8I" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=mFpsbmbAN8I</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/opensuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensuse</span></a> <a href="https://mastodon.social/tags/opensuseleap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensuseleap</span></a> <a href="https://mastodon.social/tags/opensusetumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensusetumbleweed</span></a> <a href="https://mastodon.social/tags/leap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leap</span></a> <a href="https://mastodon.social/tags/tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tumbleweed</span></a> <a href="https://mastodon.social/tags/slowroll" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>slowroll</span></a> <a href="https://mastodon.social/tags/aeon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aeon</span></a> <a href="https://mastodon.social/tags/leapmicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leapmicro</span></a> <a href="https://mastodon.social/tags/suse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>suse</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/MicroOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicroOS</span></a> <a href="https://mastodon.social/tags/ImmutableLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ImmutableLinux</span></a> <a href="https://mastodon.social/tags/LinuxForContainers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxForContainers</span></a> <a href="https://mastodon.social/tags/LinuxServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxServer</span></a> <a href="https://mastodon.social/tags/LinuxDistro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxDistro</span></a> <a href="https://mastodon.social/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubernetes</span></a> <a href="https://mastodon.social/tags/Flatpak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flatpak</span></a> <a href="https://mastodon.social/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> <a href="https://mastodon.social/tags/openSUSEMicroOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSEMicroOS</span></a> <a href="https://mastodon.social/tags/Tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tumbleweed</span></a> <a href="https://mastodon.social/tags/LinuxAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxAdmin</span></a> <a href="https://mastodon.social/tags/LinuxSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxSecurity</span></a> <a href="https://mastodon.social/tags/DevOpsLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOpsLinux</span></a></p>
Ian Wagner<p>Burned by Google’s latest(?) project shuttering? I wrote a quick post on how to build container images without resorting to hacks like docker-in-docker or privileged containers. Because somehow the year is 2025 and it’s STILL hard to build images without these hacks and access to a Docker daemon 🤣</p><p><a href="https://ianwwagner.com/til/rootless-gitlab-ci-container-builds-with-buildkit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ianwwagner.com/til/rootless-gi</span><span class="invisible">tlab-ci-container-builds-with-buildkit</span></a></p><p><a href="https://fosstodon.org/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://fosstodon.org/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://fosstodon.org/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> <a href="https://fosstodon.org/tags/kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kubernetes</span></a></p>
4zv4l<p>For a <a href="https://mastodon.social/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a>/#selfhosted project, would there be any reason to pick one of <a href="https://mastodon.social/tags/freebsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freebsd</span></a> or <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openbsd</span></a> ? (Just because <a href="https://mastodon.social/tags/netbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netbsd</span></a> seems amazingly portable it also interests me).<br>So far I mostly run <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> containers with <a href="https://mastodon.social/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> and VMs with <a href="https://mastodon.social/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a>, the only *BSD VM running is <a href="https://mastodon.social/tags/opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opnsense</span></a>. And so far <a href="https://mastodon.social/tags/btrfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>btrfs</span></a> seems pretty good alternative to <a href="https://mastodon.social/tags/zfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zfs</span></a>.<br>I hear the network stack is supposed to be better and the system overall more “unified” but I fail to see what to try or do with it.</p>
Wulfy<p>Yeah... so <a href="https://infosec.exchange/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> is defo not ready for show time.</p><p>"Rootless containers unable to be assigned static IP addresses" (I need it because the NginX address resolver takes too long... intermittent 502 reasons)</p><p><a href="https://github.com/containers/podman/issues/7842" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/containers/podman/i</span><span class="invisible">ssues/7842</span></a> (Bug reported 2020!)</p><p>I am beginning to suspect folks who are enthusiastic about <a href="https://infosec.exchange/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> are enthusiastic about the CONCEPT of Podman, not its production suitability.</p><p><a href="https://infosec.exchange/tags/podmancompose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podmancompose</span></a> always seems to be the showstopper.</p><p>I have invested a lot of time into Podman... but I may need to go back to <a href="https://infosec.exchange/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> and just screw down the containers to minimse <a href="https://infosec.exchange/tags/sploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sploits</span></a></p>
stefenauris<p><strong>Understanding Podman Coming from Docker</strong></p><p>This is going to be a bit of a ranty post, but engineers are good at that kind of thing. So here goes.</p><p><strong>A bit of Background</strong></p><p>I started my devops career learning about docker and docker-compose. I enjoyed the elegance of being able to write a file of what services I want in a yaml file and bring the entire thing up. Very very easy to rapidly deploy something for testing and into my own production. Use this image, on this port, here’s where to store your data and you can connect to this database. A simple compose file could look like this.</p><pre><code>services: memos: container_name: memos image: neosmemo/memos:stable ports: - 5230:5230 volumes: - ./memos/:/var/opt/memos restart: unless-stopped</code></pre><p>Download and run this webapp called memos, use port 5230, store your data in a directory called memos. Restart if anything crashes until I tell the daemon to stop it. Very easy to understand and follow along!</p><p><strong>Docker has a few cons</strong></p><p>Docker has a few pain points however. The biggest one being that it runs a centralized daemon and if you need to update docker, e.g. a security update is released well… all of your services have to come down for a moment while the patch is applied. That kind of sucks in terms of maintaining stable services and if you have your server set to automatically apply updates (remember automation is good!) who knows when your stuff can go down. </p><p>Docker also doesn’t come in the default Debian/Ubuntu repositories. You have to install it from a third party repo. This isn’t that big of a deal but the additional configuration is just something you have to remember when setting up a new test environment instead of a simple <em>apt install docker</em>.</p><p> Lastly docker does support a rootless mode, though it has some limitations. This leads me to my search for alternatives, wondering if there might be something better out there.</p><p><strong>Enter Podman</strong></p><p>So I decided to examine podman. I wanted to find a way to follow my same workflow (or as close as possible) while using this different implementation of containerization. It addresses my concerns: it comes default in the repos, it natively supports rootless without any monkeying around, and it is daemonless! Sounds good right? Not exactly. </p><p><strong>Podman-Compose</strong></p><p>Okay so as it turns out someone thought of this already! A python program to implement the same thing as docker compose except through podman as your backend. Perfect! Except… every time I try to run a stack I get python errors and crashes…. unless I run it as sudo! So much for trying to escape the need for root there. I’ve tried testing it with a simple deployment of bookstack with a backend mariadb. Never works right! I dont think it properly creates the environment variables defined in the yaml file. So really what’s the point of fighting this? Next!</p><p><strong>Podman generate/play</strong></p><p>So I start searching around to see if there’s a more native implementation of compose like files with podman and I find this redhat article! Written by the people who made the damn thing I expected a nice outline of how to do this. Holy shit was I mistaken reading this:</p><p><a href="https://www.redhat.com/en/blog/compose-podman-pods" rel="nofollow noopener" target="_blank">https://www.redhat.com/en/blog/compose-podman-pods</a></p><p>This is about as clear as mud. Basically the idea of podman-compose is still being worked about in their development. (To be fair this might have changed in the 5 years since this article was written) but they continue with the concept of podman “pods” and the command “podman generate” which will create a kubernetes style yaml file of what you’ve already created.</p><p>Well that’s nice but it seems completely ass backwards from what I’m needing here.<br>It seems I’m not the only one who’s had a negative experience:</p><blockquote><p><a href="https://www.reddit.com/r/podman/comments/1bk4nee/comment/kvvnxed/" rel="nofollow noopener" target="_blank">Comment</a><br> by<a href="https://www.reddit.com/user/avamk/" rel="nofollow noopener" target="_blank">u/avamk</a> from discussion<a href="https://www.reddit.com/r/podman/comments/1bk4nee/whats_the_current_canonical_way_to_run_docker/" rel="nofollow noopener" target="_blank"></a><br> in<a href="https://www.reddit.com/r/podman/" rel="nofollow noopener" target="_blank">podman</a></p></blockquote><p>I could continue trying to make this work, but at this point it seems like I’m fighting a fairly pointless battle. Yeah its daemonless, but my workflow isn’t compatible exactly. I could try systemd integration but that’s something I already barely tolerate as it is. I don’t see the point of continuing to fight this when docker already is perfectly functional as it is with a few minor nags. </p><p>Maybe someday Podman will be able to compete better on this front but for right now, it’s not for me!</p><p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://blog.theheart.land/tag/containerization/" target="_blank">#containerization</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://blog.theheart.land/tag/docker/" target="_blank">#docker</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://blog.theheart.land/tag/linux/" target="_blank">#linux</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://blog.theheart.land/tag/podman/" target="_blank">#podman</a></p>
Steve<p>Today I tried to remove a container being run under <a href="https://tech.joerger.us/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a>. I failed (quite miserably) to the point where I had to remove the <a href="https://tech.joerger.us/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> package from my <a href="https://tech.joerger.us/tags/ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ubuntu</span></a> desktop in order to get the container to stop automatically relaunching every time I stopped it. WTH am I missing?</p>
Miguel Afonso Caetano<p>"If you're looking to optimize your containerization workflow, here's the good news - the ecosystem has evolved far beyond Docker's original design.</p><p>Docker revolutionized software deployment by making containerization a standard, but the ecosystem has grown to address specific use cases that Docker wasn't originally designed for. Modern alternatives like Podman, containerd, and CRI-O offer specialized features like daemonless designs, rootless operations, and native Kubernetes integration. These tools don't just offer incremental improvements, but instead they represent fundamental shifts in how we think about container security, performance, and workflow integration.</p><p>The container ecosystem has matured beyond Docker's monolithic approach, with specialized runtimes optimizing for specific use cases. Whether you're running microservices in production, developing locally, or managing enterprise workloads, there's likely a tool that's better suited to your specific requirements.</p><p>In this guide, I'll walk you through the most promising Docker alternatives in 2025 and help you choose the right tool for your specific needs."</p><p><a href="https://www.datacamp.com/blog/docker-alternatives" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">datacamp.com/blog/docker-alter</span><span class="invisible">natives</span></a></p><p><a href="https://tldr.nettime.org/tags/DevOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevOps</span></a> <a href="https://tldr.nettime.org/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://tldr.nettime.org/tags/Containers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Containers</span></a> <a href="https://tldr.nettime.org/tags/Kubernetes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubernetes</span></a> <a href="https://tldr.nettime.org/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> <a href="https://tldr.nettime.org/tags/Containerd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Containerd</span></a> <a href="https://tldr.nettime.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://tldr.nettime.org/tags/CICD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CICD</span></a></p>
waldi<p>Someone decided it would be a good idea to use <a href="https://chaos.social/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> inside a <a href="https://chaos.social/tags/container" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>container</span></a>. This of cause results in the rather unpleasant error message:</p><p>Error: creating runtime static files directory "/var/lib/containers/storage/libpod": mkdir /var/lib/containers/storage: read-only file system</p>
David Chisnall (*Now with 50% more sarcasm!*)<p>Ooo, fun. All of the Linux tools that we ship in the <a href="https://infosec.exchange/tags/CHERIoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERIoT</span></a> dev container work in the Linuxulator on <a href="https://infosec.exchange/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> with <a href="https://infosec.exchange/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> </p><p>There appears to be a bug in the Podman with image tags that are multi-arch manifests if you specify <code>--os Linux</code>: it downloads the image and then fails to run it. If you specify the tag for the x86-64 version, it works fine.</p>
dorotaC<p>Weirdest <a href="https://fosstodon.org/tags/bug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bug</span></a> ever.</p><p>I have <a href="https://fosstodon.org/tags/podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>podman</span></a> with an open shell sitting in the background.<br>Every couple of hours, it jumps to 100% CPU for absolutely no reason. Even when the screen is locked and I'm away.</p><p>Until I press enter in the shell.</p><p>I've never seen a shell come to life for absolutely no reason before. I'm not even sure how I'd start <a href="https://fosstodon.org/tags/debugging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debugging</span></a> it.</p><p><a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://fosstodon.org/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://fosstodon.org/tags/fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fedora</span></a> <a href="https://fosstodon.org/tags/bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bash</span></a></p>
Martin Bishop<p>Interested in working with <a href="https://mastodon.social/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> on <a href="https://mastodon.social/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> ?<br><a href="https://www.youtube.com/watch?v=L5z1_T4nHSU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=L5z1_T4nHSU</span><span class="invisible"></span></a></p>
Maxi 11x 💉<p>Boah ey, ich möchte einfach nur rootless <a href="https://chaos.social/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> nutzen weil es sich ÄUẞERST vernünftig anhört und hatte erwartet, dass das ein Selbstläufer würde, aber es gibt bei der Initialisierung von Containern zig Probleme, die ich erstmal (planlos) lösen muss, nervt sehr. Alles nur, weil die depperte Docker-Crowd eine Pfadabhängigkeit auf Rootuser gewählt hat.</p>
bignose<p>I'm trying to figure out setting up an email (SMTP) service on my little hosted machines, so I don't need to rely on any particular mail provider.</p><p>Which leads me to thinking I really like how <a href="https://social.chinwag.org/tags/Podman" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Podman</span></a> can generate <a href="https://social.chinwag.org/tags/SystemD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemD</span></a> units to automatically manage the service containers.</p><p>And that has led me to the conclusion I probably should wait for <a href="https://social.chinwag.org/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> Trixie release next month, when I can migrate past Podman 4.3.</p><p>How do you manage SMTP service for yours, <span class="h-card" translate="no"><a href="https://social.chinwag.org/@mike" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mike</span></a></span>?</p>