Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

Scheduled Pinned Locked Moved Uncategorized
linuxredhatrhelpodmandevops
10 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.net
    wrote last edited by
    #1

    I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

    TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

    Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

    Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

    #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

    Link Preview ImageLink Preview Image
    psyhackological@fosstodon.orgP sunscheinwerfer@mastodon.worldS reep@troet.cafeR xris@social.farcaster.netX 4 Replies Last reply
    0
    • larvitz@burningboard.netL larvitz@burningboard.net

      I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

      TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

      Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

      Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

      #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

      Link Preview ImageLink Preview Image
      psyhackological@fosstodon.orgP This user is from outside of this forum
      psyhackological@fosstodon.orgP This user is from outside of this forum
      psyhackological@fosstodon.org
      wrote last edited by
      #2

      @Larvitz what hardware are you using?

      larvitz@burningboard.netL 1 Reply Last reply
      0
      • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

        @Larvitz what hardware are you using?

        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.net
        wrote last edited by
        #3

        @psyhackological That's a VPS 1000 arm64 from netcup.de. A reasonably cheap VM, running on Ampere Altra CPU cores.

        1 Reply Last reply
        0
        • larvitz@burningboard.netL larvitz@burningboard.net

          I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

          TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

          Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

          Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

          #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

          Link Preview ImageLink Preview Image
          sunscheinwerfer@mastodon.worldS This user is from outside of this forum
          sunscheinwerfer@mastodon.worldS This user is from outside of this forum
          sunscheinwerfer@mastodon.world
          wrote last edited by
          #4

          @Larvitz cool setup
          πŸ™‚
          Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

          larvitz@burningboard.netL 1 Reply Last reply
          0
          • sunscheinwerfer@mastodon.worldS sunscheinwerfer@mastodon.world

            @Larvitz cool setup
            πŸ™‚
            Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

            larvitz@burningboard.netL This user is from outside of this forum
            larvitz@burningboard.netL This user is from outside of this forum
            larvitz@burningboard.net
            wrote last edited by
            #5

            @sunscheinwerfer Thanks a lot. Not gonna need a direct integration with Traefik. I just use OIDC to authenticate inside the applications (like forgejo). But good to know, this exists πŸ™‚

            1 Reply Last reply
            0
            • larvitz@burningboard.netL larvitz@burningboard.net

              I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

              TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

              Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

              Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

              #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

              Link Preview ImageLink Preview Image
              reep@troet.cafeR This user is from outside of this forum
              reep@troet.cafeR This user is from outside of this forum
              reep@troet.cafe
              wrote last edited by
              #6

              @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
              And isn't it a lot of hassle to switch all services from one to the other?

              larvitz@burningboard.netL 1 Reply Last reply
              0
              • reep@troet.cafeR reep@troet.cafe

                @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
                And isn't it a lot of hassle to switch all services from one to the other?

                larvitz@burningboard.netL This user is from outside of this forum
                larvitz@burningboard.netL This user is from outside of this forum
                larvitz@burningboard.net
                wrote last edited by
                #7

                @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                reep@troet.cafeR 1 Reply Last reply
                0
                • larvitz@burningboard.netL larvitz@burningboard.net

                  @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                  My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                  reep@troet.cafeR This user is from outside of this forum
                  reep@troet.cafeR This user is from outside of this forum
                  reep@troet.cafe
                  wrote last edited by
                  #8

                  @Larvitz Thanks a lot! I'm working on my home lab, too. But not that much automation. Wanted to be sure not missing sth. important πŸ˜ƒ

                  1 Reply Last reply
                  0
                  • larvitz@burningboard.netL larvitz@burningboard.net

                    I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                    TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                    Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                    Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                    #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                    Link Preview ImageLink Preview Image
                    xris@social.farcaster.netX This user is from outside of this forum
                    xris@social.farcaster.netX This user is from outside of this forum
                    xris@social.farcaster.net
                    wrote last edited by
                    #9

                    @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                    larvitz@burningboard.netL 1 Reply Last reply
                    0
                    • xris@social.farcaster.netX xris@social.farcaster.net

                      @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                      larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.netL This user is from outside of this forum
                      larvitz@burningboard.net
                      wrote last edited by
                      #10

                      @xris oh interesting. Definitely going to take a look at that πŸ™‚ Thank you!

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups