Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1.

Scheduled Pinned Locked Moved Uncategorized
linuxredhatrhelpodmandevops
13 Posts 7 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • psyhackological@fosstodon.orgP psyhackological@fosstodon.org

    @Larvitz what hardware are you using?

    larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.netL This user is from outside of this forum
    larvitz@burningboard.net
    wrote last edited by
    #3

    @psyhackological That's a VPS 1000 arm64 from netcup.de. A reasonably cheap VM, running on Ampere Altra CPU cores.

    1 Reply Last reply
    0
    • larvitz@burningboard.netL larvitz@burningboard.net

      I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

      TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

      Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

      Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

      #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

      sunscheinwerfer@mastodon.worldS This user is from outside of this forum
      sunscheinwerfer@mastodon.worldS This user is from outside of this forum
      sunscheinwerfer@mastodon.world
      wrote last edited by
      #4

      @Larvitz cool setup
      πŸ™‚
      Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

      larvitz@burningboard.netL 1 Reply Last reply
      0
      • sunscheinwerfer@mastodon.worldS sunscheinwerfer@mastodon.world

        @Larvitz cool setup
        πŸ™‚
        Just a small tip, may be useful to you: I use an traefik Addon https://github.com/lukaszraczylo/traefikoidc to use oidc with keycloak even for applications that do not support oauth natively

        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.netL This user is from outside of this forum
        larvitz@burningboard.net
        wrote last edited by
        #5

        @sunscheinwerfer Thanks a lot. Not gonna need a direct integration with Traefik. I just use OIDC to authenticate inside the applications (like forgejo). But good to know, this exists πŸ™‚

        1 Reply Last reply
        0
        • larvitz@burningboard.netL larvitz@burningboard.net

          I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

          TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

          Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

          Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

          #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

          reep@troet.cafeR This user is from outside of this forum
          reep@troet.cafeR This user is from outside of this forum
          reep@troet.cafe
          wrote last edited by
          #6

          @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
          And isn't it a lot of hassle to switch all services from one to the other?

          larvitz@burningboard.netL 1 Reply Last reply
          0
          • reep@troet.cafeR reep@troet.cafe

            @Larvitz Why do you replace Authentik with Keycloak? I always found keycloak too heavy, Authentik seemed far easier to handle, especially in a home lab.
            And isn't it a lot of hassle to switch all services from one to the other?

            larvitz@burningboard.netL This user is from outside of this forum
            larvitz@burningboard.netL This user is from outside of this forum
            larvitz@burningboard.net
            wrote last edited by
            #7

            @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

            My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

            reep@troet.cafeR ringods@hachyderm.ioR 2 Replies Last reply
            0
            • larvitz@burningboard.netL larvitz@burningboard.net

              @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

              My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

              reep@troet.cafeR This user is from outside of this forum
              reep@troet.cafeR This user is from outside of this forum
              reep@troet.cafe
              wrote last edited by
              #8

              @Larvitz Thanks a lot! I'm working on my home lab, too. But not that much automation. Wanted to be sure not missing sth. important πŸ˜ƒ

              1 Reply Last reply
              0
              • larvitz@burningboard.netL larvitz@burningboard.net

                I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                xris@social.farcaster.netX This user is from outside of this forum
                xris@social.farcaster.netX This user is from outside of this forum
                xris@social.farcaster.net
                wrote last edited by
                #9

                @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                larvitz@burningboard.netL 1 Reply Last reply
                0
                • xris@social.farcaster.netX xris@social.farcaster.net

                  @Larvitz ... I use a similar setup for a couple of services (on netcup, too) - PocketID for passkey-only oauth2 is super lightweight - with oauth2-proxy for those legacy services.

                  larvitz@burningboard.netL This user is from outside of this forum
                  larvitz@burningboard.netL This user is from outside of this forum
                  larvitz@burningboard.net
                  wrote last edited by
                  #10

                  @xris oh interesting. Definitely going to take a look at that πŸ™‚ Thank you!

                  1 Reply Last reply
                  0
                  • larvitz@burningboard.netL larvitz@burningboard.net

                    I run 21 OCI containers with Podman (and Quadlets!) on my ARM aarch64 server on Netcup with Red Hat Enterprise Linux (RHEL) 10.1. Memory utilization is a bit high, but the system is working absolutely stable for months.

                    TLS certificates and ingress-routing is handled fully automatically by Traefik and labels, attached to the containers.

                    Having everything containerized, makes it really easy to clean up πŸ™‚ There's some applications, that I don't even use anymore. Time to clean up.

                    Then I'll continue, replacing the old Authentik installation with Keycloak for my OIDC applications (Forgejo, Wallos etc.)

                    #linux #redhat #rhel #podman #devops #containers #forgejo #netcup

                    gooser3000@mastodon.socialG This user is from outside of this forum
                    gooser3000@mastodon.socialG This user is from outside of this forum
                    gooser3000@mastodon.social
                    wrote last edited by
                    #11

                    @Larvitz I haven't tried it yet but you should be able to use systemd-creds to encrypt those secrets (I haven't used them in quadlets yet).

                    1 Reply Last reply
                    0
                    • larvitz@burningboard.netL larvitz@burningboard.net

                      @reep Keycloak WAS heavy before version 20. Now it's a super lightweight, cloud-native application with Quarkus.

                      My main reason to switch is the better compatibility with Ansible (the collections for Keycloak >20 for automation are just very very good imho)

                      ringods@hachyderm.ioR This user is from outside of this forum
                      ringods@hachyderm.ioR This user is from outside of this forum
                      ringods@hachyderm.io
                      wrote last edited by
                      #12

                      @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                      larvitz@burningboard.netL 1 Reply Last reply
                      0
                      • ringods@hachyderm.ioR ringods@hachyderm.io

                        @Larvitz @reep Is there any info regarding memory usage pre- and post-Quarkus for Keycloak?

                        larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.netL This user is from outside of this forum
                        larvitz@burningboard.net
                        wrote last edited by
                        #13

                        @ringods @reep

                        Yes! The shift to Quarkus (Keycloak 17+) reduced the baseline memory footprint by over 50%. Old WildFly containers used ~600-800 MB idle, whereas the Quarkus version sits around ~170-300 MB. It also cut startup times from ~30s down to <5s. The savings come from Quarkus using a build-time optimization step rather than WildFly's heavy runtime XML parsing and dynamic classloading. (Production still needs some RAM for session caching, but the server overhead is vastly smaller!)

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups