Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

Scheduled Pinned Locked Moved Uncategorized
linuxredhatrhelpodmandevops
13 Posts 7 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • larvitz@burningboard.netL larvitz@burningboard.net

    I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

    TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

    Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

    Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

    #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

    psyhackological@fosstodon.orgP This user is from outside of this forum
    psyhackological@fosstodon.orgP This user is from outside of this forum
    psyhackological@fosstodon.org
    wrote last edited by
    #2

    @Larvitz what hardware are you using?

    larvitz@burningboard.netL 1 Reply Last reply
    0
    • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

      @Larvitz what hardware are you using?

      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.netL This user is from outside of this forum
      larvitz@burningboard.net
      wrote last edited by
      #3

      @psyhackological That's a VPS 1000 arm64 from netcup.de. A reasonably cheap VM, running on Ampere Altra CPU cores.

      1 Reply Last reply
      0
      • larvitz@burningboard.netL larvitz@burningboard.net

        I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

        TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

        Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

        Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

        #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

        sunscheinwerfer@mastodon.worldS This user is from outside of this forum
        sunscheinwerfer@mastodon.worldS This user is from outside of this forum
        sunscheinwerfer@mastodon.world
        wrote last edited by
        #4

        @Larvitz cool setup
        πŸ™‚
        Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

        larvitz@burningboard.netL 1 Reply Last reply
        0
        • sunscheinwerfer@mastodon.worldS sunscheinwerfer@mastodon.world

          @Larvitz cool setup
          πŸ™‚
          Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.netL This user is from outside of this forum
          larvitz@burningboard.net
          wrote last edited by
          #5

          @sunscheinwerfer Thanks a lot. Not gonna need a direct integration with Traefik. I just use OIDC to authenticate inside the applications (like forgejo). But good to know, this exists πŸ™‚

          1 Reply Last reply
          0
          • larvitz@burningboard.netL larvitz@burningboard.net

            I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

            TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

            Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

            Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

            #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

            reep@troet.cafeR This user is from outside of this forum
            reep@troet.cafeR This user is from outside of this forum
            reep@troet.cafe
            wrote last edited by
            #6

            @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
            And isn't it a lot of hassle to switch all services from one to the other?

            larvitz@burningboard.netL 1 Reply Last reply
            0
            • reep@troet.cafeR reep@troet.cafe

              @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
              And isn't it a lot of hassle to switch all services from one to the other?

              larvitz@burningboard.netL This user is from outside of this forum
              larvitz@burningboard.netL This user is from outside of this forum
              larvitz@burningboard.net
              wrote last edited by
              #7

              @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

              My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

              reep@troet.cafeR ringods@hachyderm.ioR 2 Replies Last reply
              0
              • larvitz@burningboard.netL larvitz@burningboard.net

                @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                reep@troet.cafeR This user is from outside of this forum
                reep@troet.cafeR This user is from outside of this forum
                reep@troet.cafe
                wrote last edited by
                #8

                @Larvitz Thanks a lot! I'm working on my home lab, too. But not that much automation. Wanted to be sure not missing sth. important πŸ˜ƒ

                1 Reply Last reply
                0
                • larvitz@burningboard.netL larvitz@burningboard.net

                  I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                  TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                  Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                  Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                  #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                  xris@social.farcaster.netX This user is from outside of this forum
                  xris@social.farcaster.netX This user is from outside of this forum
                  xris@social.farcaster.net
                  wrote last edited by
                  #9

                  @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                  larvitz@burningboard.netL 1 Reply Last reply
                  0
                  • xris@social.farcaster.netX xris@social.farcaster.net

                    @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                    larvitz@burningboard.netL This user is from outside of this forum
                    larvitz@burningboard.netL This user is from outside of this forum
                    larvitz@burningboard.net
                    wrote last edited by
                    #10

                    @xris oh interesting. Definitely going to take a look at that πŸ™‚ Thank you!

                    1 Reply Last reply
                    0
                    • larvitz@burningboard.netL larvitz@burningboard.net

                      I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                      TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                      Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                      Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                      #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                      gooser3000@mastodon.socialG This user is from outside of this forum
                      gooser3000@mastodon.socialG This user is from outside of this forum
                      gooser3000@mastodon.social
                      wrote last edited by
                      #11

                      @Larvitz I haven't tried it yet but you should be able to use systemd-creds to encrypt those secrets (I haven't used them in quadlets yet).

                      1 Reply Last reply
                      0
                      • larvitz@burningboard.netL larvitz@burningboard.net

                        @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                        My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                        ringods@hachyderm.ioR This user is from outside of this forum
                        ringods@hachyderm.ioR This user is from outside of this forum
                        ringods@hachyderm.io
                        wrote last edited by
                        #12

                        @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                        larvitz@burningboard.netL 1 Reply Last reply
                        0
                        • ringods@hachyderm.ioR ringods@hachyderm.io

                          @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                          larvitz@burningboard.netL This user is from outside of this forum
                          larvitz@burningboard.netL This user is from outside of this forum
                          larvitz@burningboard.net
                          wrote last edited by
                          #13

                          @ringods @reep

                          Yes! The shift to Quarkus (Keycloak 17+) reduced the baseline memory footprint by over 50%. Old WildFly containers used ~600-800 MB idle, whereas the Quarkus version sits around ~170-300 MB. It also cut startup times from ~30s down to <5s. The savings come from Quarkus using a build-time optimization step rather than WildFly's heavy runtime XML parsing and dynamic classloading. (Production still needs some RAM for session caching, but the server overhead is vastly smaller!)

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups