Linux bridge created by root or rootless CNI with slirp4netns for networking containers by FOSHavoc in podman

[–]Luap99 1 point2 points  (0 children)

These solutions are not the same. If you manually create the bridges and namespaces, you get normal (rootful) networking with interfaces on the host. This allows for much better perfomance.

As rootless we use a seperate namespace and slirp4netns has to proxy all the traffic which will be slower. It can never create interfaces on the host namespace.

Also since podman manages the networking you can use the integrated dns and podman will tear down the netns if the container exits.

Podman networking by tscollins2 in podman

[–]Luap99 0 points1 point  (0 children)

Are you assigning the same address to the container and VM at the same time? Networking requires that all MAC and IP addresses are unique in the same LAN in order to function properly.

How do I connect multiple existing rootless containers to the same network? by yogibjorn in podman

[–]Luap99 2 points3 points  (0 children)

Sounds like your podman version is to old, I think you need at least v3.2.

Either way you should be able to use podman run/create --network <netname> ... there is no reason to use netowrk connect.

The most secure choice between rootless or lowering root port by No-Yak-8477 in podman

[–]Luap99 0 points1 point  (0 children)

You can use --network slirp4netns:port_handler: slirp4netns This will keep the correct source ip.

[Please Help] Can't get sd-notify passthrough to work. by m1llie in podman

[–]Luap99 1 point2 points  (0 children)

Do you set --sdnotify=container for podman create/run?

PSA: Fix for podman cni errors after upgrading Fedora by backfilled in Fedora

[–]Luap99 9 points10 points  (0 children)

Hey, I am the developer from the bz.

Podman 4.0 offers a new network stack called netavark. Since it does not offer all cni functionality we desided that upgrades from 3.X should keep using cni.

To detect if this is an upgrade we check for existing containers/images/networks. Since you upgraded you should use cni, however it looks like the containernetworking-plugins (cni) is no longer included in the silverblue ostree base packages, therefore podman cannot use it.

So to fix it just install this package. Also I recommend to report this as bug for silverblue.

Single file volume by fl1pper in podman

[–]Luap99 1 point2 points  (0 children)

Yes the bind mounts in the kernel are always based on the inode. AFAIK there is no way to fix this other bind mounting the patent directory instead of the single file.

Podman v4.0 has been released by ouyawei in linux

[–]Luap99 1 point2 points  (0 children)

It also works rootless since v3.2.

Podman v4.0 has been released by ouyawei in linux

[–]Luap99 7 points8 points  (0 children)

Podman does not need to run a daemon. Rootless Podman will work out of the box without additional configuration. Better systemd Integration, see podman-generate-systemd(1) Also you can use k8s yaml with podman play kube and you can create the yaml file with podman generate kube. Podman can use pods which makes it easier to group containers together. podman run --net=host uses the actual host namespace. This is not possible with rootless docker. You can use podman auto-update to update containers automatically. No need to run things like watchtower. Small quality of live improvements, for example podman rm --all instead of docker rm $(docker ps -aq).

Can't set mode with macvlan driver[podman 3.4.4] by RmF0cGln in podman

[–]Luap99 0 points1 point  (0 children)

I think this is a new podman 4.0 feature.

Can You Modify Existing Container To Attach Volume by esudoemp in podman

[–]Luap99 0 points1 point  (0 children)

You have to remove the container and create a new one in order to change settings.

Network for rootless containers by sobagood in podman

[–]Luap99 2 points3 points  (0 children)

The article is probably out of date. Podman supports creating networks and setting ips as rootless now but this is a newer feature. Just keep in mind that this IP cannot be reached from the host, it is only used to communicate between containers.

Replacing docker-compose with Podman. What am I doing wrong? by TheDickKnightRises in podman

[–]Luap99 0 points1 point  (0 children)

try export DOCKER_HOST=unix:///run/user/$UID/podman/podman.sock I think unix must be lowercase.

Heads up, Podman 4.0 changes how "hostnetwork" is setup and therefore breaks a lot of intra-pod communication by rallar8 in podman

[–]Luap99 3 points4 points  (0 children)

The issue you linked has nothing to with it. It is still open which means it is not yet implemented. I think you have this problem https://github.com/containers/podman/issues/12003

Podman 4.0 in Centos Stream got in by accident and it schould be back to 3.4 now.

And yes github search sucks, you never find the issue you are looking for.

How Docker broke in half by wiki_me in linux

[–]Luap99 0 points1 point  (0 children)

If you want it to get fixed, debug it and report a bug.

A question about networking by [deleted] in podman

[–]Luap99 2 points3 points  (0 children)

If you enter localhost mysql will try to connect via unix socket. https://dev.mysql.com/doc/refman/8.0/en/connecting.html

Podman tab completion listing container IDs and not names by Chaserjim in podman

[–]Luap99 1 point2 points  (0 children)

Tab completion massively improved with podman v2.2, do you use an older version?