Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

Scheduled Pinned Locked Moved Uncategorized
linuxredhatrhelpodmandevops
13 Posts 7 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • larvitz@burningboard.netL larvitz@burningboard.net

    I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

    TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

    Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

    Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

    #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

    sunscheinwerfer@mastodon.worldS This user is from outside of this forum
    sunscheinwerfer@mastodon.worldS This user is from outside of this forum
    sunscheinwerfer@mastodon.world
    wrote last edited by
    #4

    @Larvitz cool setup
    πŸ™‚
    Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

    larvitz@burningboard.netL 1 Reply Last reply
    0
    • sunscheinwerfer@mastodon.worldS sunscheinwerfer@mastodon.world

      @Larvitz cool setup
      πŸ™‚
      Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.net
      wrote last edited by
      #5

      @sunscheinwerfer Thanks a lot. Not gonna need a direct integration with Traefik. I just use OIDC to authenticate inside the applications (like forgejo). But good to know, this exists πŸ™‚

      1 Reply Last reply
      0
      • larvitz@burningboard.netL larvitz@burningboard.net

        I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

        TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

        Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

        Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

        #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

        reep@troet.cafeR This user is from outside of this forum
        reep@troet.cafeR This user is from outside of this forum
        reep@troet.cafe
        wrote last edited by
        #6

        @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
        And isn't it a lot of hassle to switch all services from one to the other?

        larvitz@burningboard.netL 1 Reply Last reply
        0
        • reep@troet.cafeR reep@troet.cafe

          @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
          And isn't it a lot of hassle to switch all services from one to the other?

          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.net
          wrote last edited by
          #7

          @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

          My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

          reep@troet.cafeR ringods@hachyderm.ioR 2 Replies Last reply
          0
          • larvitz@burningboard.netL larvitz@burningboard.net

            @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

            My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

            reep@troet.cafeR This user is from outside of this forum
            reep@troet.cafeR This user is from outside of this forum
            reep@troet.cafe
            wrote last edited by
            #8

            @Larvitz Thanks a lot! I'm working on my home lab, too. But not that much automation. Wanted to be sure not missing sth. important πŸ˜ƒ

            1 Reply Last reply
            0
            • larvitz@burningboard.netL larvitz@burningboard.net

              I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

              TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

              Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

              Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

              #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

              xris@social.farcaster.netX This user is from outside of this forum
              xris@social.farcaster.netX This user is from outside of this forum
              xris@social.farcaster.net
              wrote last edited by
              #9

              @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

              larvitz@burningboard.netL 1 Reply Last reply
              0
              • xris@social.farcaster.netX xris@social.farcaster.net

                @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                larvitz@burningboard.netL This user is from outside of this forum
                larvitz@burningboard.netL This user is from outside of this forum
                larvitz@burningboard.net
                wrote last edited by
                #10

                @xris oh interesting. Definitely going to take a look at that πŸ™‚ Thank you!

                1 Reply Last reply
                0
                • larvitz@burningboard.netL larvitz@burningboard.net

                  I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                  TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                  Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                  Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                  #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                  gooser3000@mastodon.socialG This user is from outside of this forum
                  gooser3000@mastodon.socialG This user is from outside of this forum
                  gooser3000@mastodon.social
                  wrote last edited by
                  #11

                  @Larvitz I haven't tried it yet but you should be able to use systemd-creds to encrypt those secrets (I haven't used them in quadlets yet).

                  1 Reply Last reply
                  0
                  • larvitz@burningboard.netL larvitz@burningboard.net

                    @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                    My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                    ringods@hachyderm.ioR This user is from outside of this forum
                    ringods@hachyderm.ioR This user is from outside of this forum
                    ringods@hachyderm.io
                    wrote last edited by
                    #12

                    @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                    larvitz@burningboard.netL 1 Reply Last reply
                    0
                    • ringods@hachyderm.ioR ringods@hachyderm.io

                      @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                      larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.net
                      wrote last edited by
                      #13

                      @ringods @reep

                      Yes! The shift to Quarkus (Keycloak 17+) reduced the baseline memory footprint by over 50%. Old WildFly containers used ~600-800 MB idle, whereas the Quarkus version sits around ~170-300 MB. It also cut startup times from ~30s down to <5s. The savings come from Quarkus using a build-time optimization step rather than WildFly's heavy runtime XML parsing and dynamic classloading. (Production still needs some RAM for session caching, but the server overhead is vastly smaller!)

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups