• Shimitar
    link
    fedilink
    English
    arrow-up
    52
    ·
    2 months ago

    Podman guys… Podman All the way…

    • OpenPassageways@lemmy.zip
      link
      fedilink
      English
      arrow-up
      16
      ·
      2 months ago

      I don’t think you even need Docker licenses to run Linux containers, but unfortunately I need to deal with this because I have some legacy software running in windows containers.

      • Shimitar
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        That’s not the point. Maybe you can, but for how long? you will never stop asking the question with docker…

    • Narwhalrus@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      2 months ago

      We’ve completely transitioned from docker to podman where I work. The only pain point was podman compose being immature compared to docker compose, but turns out you can run docker compose with podman using the podman socket easily.

      • Shimitar
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 months ago

        I think you wrote it back ways: transitioned from docker to podman?

        Yeah podman should use quadlets, not compose, but still works just fine with docker compose and the podman socket!

        • Narwhalrus@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 months ago

          Oops. Thanks for the correction.

          I hadn’t heard of quadlets. I’ll have to give them a look.

      • gencha@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 months ago

        I gave podman compose a fresh try just the other day and was happy to see that it “just worked”.

        I’m personally pissed about aardvark-dns, which provides DNS for podman. The version that is still in Debian Stable sets a TTL of 24h on A record responses. This caused my entire service network to be disrupted whenever a pod restarted. The default behavior for similar resolvers is to set a TTL of 0. It’s like people who maintain it take it as an opportunity to rewrite existing solutions in Rust and implement all the bugs they can. Sometimes feels like someone just thought it would be a fun summer break project to implement DNS or network security.