diff --git a/_posts/2018-10-05-tripleo-systemd.md b/_posts/2018-10-05-tripleo-systemd.md index 828fed12..9bd4b871 100644 --- a/_posts/2018-10-05-tripleo-systemd.md +++ b/_posts/2018-10-05-tripleo-systemd.md @@ -1,5 +1,5 @@ --- -title: OpenStack Containerization with Podman – Part 2 (SystemD) +title: OpenStack Containerization with Podman – Part 2 (systemd) layout: default author: emacchi categories: [blogs] @@ -9,10 +9,10 @@ tags: podman, containers, openstack ![podman logo](https://podman.io/images/podman.svg) {% assign author = site.authors[page.author] %} -# Manage Podman containers with SystemD +# Manage Podman containers with systemd ## By {{ author.display_name }} [GitHub](https://github.com/{{ author.github }}) [Twitter](https://twitter.com/{{ author.twitter }}) -I wrote a blog post about how we manage Podman containers with SystemD in +I wrote a blog post about how we manage Podman containers with systemd in OpenStack TripleO. [Read More](https://my1.fr/blog/openstack-containerization-with-podman-part-2-operations/) diff --git a/_posts/2019-05-10-podman-release-v1.3.0.md b/_posts/2019-05-10-podman-release-v1.3.0.md index bf567bc0..40387796 100644 --- a/_posts/2019-05-10-podman-release-v1.3.0.md +++ b/_posts/2019-05-10-podman-release-v1.3.0.md @@ -16,7 +16,7 @@ Podman 1.3.0 has been released! We've focused firmly on stability with 1.3.0, fi -The biggest new features in Podman 1.3.0 are for managing container restart. The `--restart` flag allows Podman to restart containers when they exit, and the `podman generate systemd` command makes unit files so you can leverage systemd to manage container lifecycle. These commands seem very similar, but are very different in practice. The `--restart` flag is much simpler, but more limited - it restarts containers when they exit, but cannot deal with a system restart or dependencies between containers. If you need access to these more advanced features, `podman generate systemd` will allow you to manage your containers via Systemd, leveraging all of its service management capabilities. +The biggest new features in Podman 1.3.0 are for managing container restart. The `--restart` flag allows Podman to restart containers when they exit, and the `podman generate systemd` command makes unit files so you can leverage systemd to manage container lifecycle. These commands seem very similar, but are very different in practice. The `--restart` flag is much simpler, but more limited - it restarts containers when they exit, but cannot deal with a system restart or dependencies between containers. If you need access to these more advanced features, `podman generate systemd` will allow you to manage your containers via systemd, leveraging all of its service management capabilities. As always, please visit our release notes on [GitHub](https://github.com/containers/podman/blob/main/RELEASE_NOTES.md) to see the full changelog. diff --git a/_posts/2020-04-14-new.md b/_posts/2020-04-14-new.md index 5961e2ff..a3af9dce 100644 --- a/_posts/2020-04-14-new.md +++ b/_posts/2020-04-14-new.md @@ -1,9 +1,9 @@ --- -title: Dockerless: Build and Run Containers with Podman and Systemd +title: Dockerless: Build and Run Containers with Podman and systemd layout: default categories: [new] author: kshirinkin tags: podman, containers, systemd, video, docker --- -[In this video](https://www.youtube.com/watch?v=RfL_CjXfQds), Kirill Shirinkin will show how to use Podman to build container images and run Java applications in containers with Systemd. We are going to learn why we should at least try alternatives to Docker, how container runtime landscape changed and how Podman is different and in certain ways better than Docker. [Watch now](https://www.youtube.com/watch?v=RfL_CjXfQds). +[In this video](https://www.youtube.com/watch?v=RfL_CjXfQds), Kirill Shirinkin will show how to use Podman to build container images and run Java applications in containers with systemd. We are going to learn why we should at least try alternatives to Docker, how container runtime landscape changed and how Podman is different and in certain ways better than Docker. [Watch now](https://www.youtube.com/watch?v=RfL_CjXfQds). diff --git a/_posts/2020-04-14-podman-systemd.md b/_posts/2020-04-14-podman-systemd.md index 7fb0a705..361523ac 100644 --- a/_posts/2020-04-14-podman-systemd.md +++ b/_posts/2020-04-14-podman-systemd.md @@ -1,5 +1,5 @@ --- -title: Dockerless: Build and Run Containers with Podman and Systemd +title: Dockerless: Build and Run Containers with Podman and systemd layout: default author: kshirinkin categories: [blogs] @@ -7,11 +7,11 @@ tags: podman, containers, systemd, video, docker --- ![podman logo](https://podman.io/images/podman.svg) -## Dockerless: Build and Run Containers with Podman and Systemd +## Dockerless: Build and Run Containers with Podman and systemd ## By {{ author.display_name }} [GitHub](https://github.com/{{ author.github }}) [Twitter](https://twitter.com/{{ author.twitter }}) -[In this video](https://www.youtube.com/watch?v=RfL_CjXfQds), Kirill Shirinkin will show how to use Podman to build container images and run Java applications in containers with Systemd. +[In this video](https://www.youtube.com/watch?v=RfL_CjXfQds), Kirill Shirinkin will show how to use Podman to build container images and run Java applications in containers with systemd. We are going to learn why we should at least try alternatives to Docker, how container runtime landscape changed and how Podman is different and in certain ways better than Docker. diff --git a/_posts/2020-06-29-podman-v2-announce.md b/_posts/2020-06-29-podman-v2-announce.md index 4a917411..d9a05717 100644 --- a/_posts/2020-06-29-podman-v2-announce.md +++ b/_posts/2020-06-29-podman-v2-announce.md @@ -38,9 +38,9 @@ One of the consequences of our re-plumbing work is that our remote clients for W It is also worth noting that a ‘--remote’ flag has been added to the Podman binary to allow it to act as a remote client. ## Auto-update -The `podman auto-update` command allows for updating Systemd-managed running containers when their images have been updated on the container registry. While it is still a tech preview in Podman v2.0, we added a number of improvements to better support authentication and to select the correct images on ARM. If you’re interested in auto updates, please check them out and let us know what you think. +The `podman auto-update` command allows for updating systemd-managed running containers when their images have been updated on the container registry. While it is still a tech preview in Podman v2.0, we added a number of improvements to better support authentication and to select the correct images on ARM. If you’re interested in auto updates, please check them out and let us know what you think. -## Systemd Integration Improvements +## systemd Integration Improvements A major improvement for Podman’s systemd support is that `podman generate systemd` now supports using the `--new` flag on pods. This allows for creating shareable systemd units not only for containers but also for pods. Additionally, we added a number of changes to make the systemd units more robust and reliable, such as cleanly starting after a system crash and clean shutdowns even when conmon has been killed. The names of generated files can further be altered with the new `--container-prefix` and `--pod-prefix` flags. ## Conclusion diff --git a/_posts/2020-09-18-multi-blog-posts.md b/_posts/2020-09-18-multi-blog-posts.md index 49b5459e..ce012646 100644 --- a/_posts/2020-09-18-multi-blog-posts.md +++ b/_posts/2020-09-18-multi-blog-posts.md @@ -15,5 +15,5 @@ tags: containers, podman, networking, pod, api, kubernetes, kube, v2, hpc, windo * Jack Wallen - [How to install Podman support in Cockpit](https://www.techrepublic.com/article/how-to-install-podman-support-in-cockpit/) - Learn how to add Cockpit support to manage images and containers. * Dan Walsh - [SELinux changes for KVM-separated (Kata) containers](https://www.redhat.com/sysadmin/selinux-kata-containers?sc_cid=701f2000000txokAAA&utm_source=bambu&utm_medium=social&utm_campaign=abm) - Understanding SELinux types that improve security in container engines such as Podman and CRI-O. * Brian Smith - [Scanning containers for vulnerabilities with OpenSCAP and Podman](https://www.redhat.com/sysadmin/container-vulnerabilities-openscap) - Containers are no more secure than physical machines. Find out how to scan yours for vulnerabilities. - * Brian Smith - (Video)[Managing Containers in Podman with Systemd Unit Files](https://www.youtube.com/watch?v=AGkM2jGT61Y) + * Brian Smith - (Video)[Managing Containers in Podman with systemd Unit Files](https://www.youtube.com/watch?v=AGkM2jGT61Y) * Mrivik - (asciinema)[GIMP working on rootless Podman container](https://asciinema.org/a/FKU4CaX96MgnlZQ8aTBBMPIv2) diff --git a/_posts/2020-09-18-new.md b/_posts/2020-09-18-new.md index 18668d2e..584052ec 100644 --- a/_posts/2020-09-18-new.md +++ b/_posts/2020-09-18-new.md @@ -14,5 +14,5 @@ to the posts. Enjoy! * Jack Wallen - [How to install Podman support in Cockpit](https://www.techrepublic.com/article/how-to-install-podman-support-in-cockpit/) - Learn how to add Cockpit support to manage images and containers. * Dan Walsh - [SELinux changes for KVM-separated (Kata) containers](https://www.redhat.com/sysadmin/selinux-kata-containers?sc_cid=701f2000000txokAAA&utm_source=bambu&utm_medium=social&utm_campaign=abm) - Understanding SELinux types that improve security in container engines such as Podman and CRI-O. * Brian Smith - [Scanning containers for vulnerabilities with OpenSCAP and Podman](https://www.redhat.com/sysadmin/container-vulnerabilities-openscap) - Containers are no more secure than physical machines. Find out how to scan yours for vulnerabilities. - * Brian Smith - (Video)[Managing Containers in Podman with Systemd Unit Files](https://www.youtube.com/watch?v=AGkM2jGT61Y) + * Brian Smith - (Video)[Managing Containers in Podman with systemd Unit Files](https://www.youtube.com/watch?v=AGkM2jGT61Y) * Mrivik - (asciinema)[GIMP working on rootless Podman container](https://asciinema.org/a/FKU4CaX96MgnlZQ8aTBBMPIv2) diff --git a/_posts/2020-12-09-new.md b/_posts/2020-12-09-new.md index c2767942..ea0d0dfa 100644 --- a/_posts/2020-12-09-new.md +++ b/_posts/2020-12-09-new.md @@ -1,11 +1,11 @@ --- -title: Using Podman and Systemd to manage container lifecycle +title: Using Podman and systemd to manage container lifecycle layout: default author: ehaynes categories: [new] tags: containers, podman, networking, pod, api, kubernetes, kube, v2, hpc, windows, mac --- {% assign author = site.authors[page.author] %} -Ed Haynes has put together a demo of using Podman and Systemd to manage a container lifecycle that's available +Ed Haynes has put together a demo of using Podman and systemd to manage a container lifecycle that's available on GitHub. He's written up a [post](https://podman.io/blogs/2020/12/09/podman-systemd-demo.html) that does a nice job of walking through setting up the demo and running it. diff --git a/_posts/2020-12-09-podman-systemd-demo.md b/_posts/2020-12-09-podman-systemd-demo.md index e02a2a12..16c37362 100644 --- a/_posts/2020-12-09-podman-systemd-demo.md +++ b/_posts/2020-12-09-podman-systemd-demo.md @@ -1,5 +1,5 @@ --- -title: Using Podman and Systemd to manage container lifecycle +title: Using Podman and systemd to manage container lifecycle layout: default author: ehaynes categories: [blogs] @@ -8,7 +8,7 @@ tags: containers, podman, api, kubernetes, linux ![podman logo](https://podman.io/images/podman.svg) {% assign author = site.authors[page.author] %} -# Using Podman and Systemd to manage container lifecycle +# Using Podman and systemd to manage container lifecycle ## By {{ author.display_name }} [GitHub](https://github.com/{{ author.github }}) [Twitter](https://twitter.com/{{ author.twitter }}) My background is in industrial automation, and in most cases, the edge devices in the factory are too underpowered to run Kubernetes as a method to manage the lifecycle of containers. The workloads have a very long lifecycle, and generally are "tied" to the edge device. There is a lot of value in containerizing applications on these edge devices, however, as it decouples the application dependencies from the OS and provides a level of isolation between applications. This demo will show how using Podman in conjunction with systemd provides an elegant solution for this sort of use case. In addition, this will be done as a "rootless" user - a key benefit of Podman that helps keep the device secure. @@ -40,7 +40,7 @@ redis_server.service - Podman container-redis_ Loaded: loaded Active: active (running) since Wed 2020-12-09 09:22:40 EST; 1h 58min ago ``` -Now that redis is running you can run the test script that sets a key value, retrieves it, and then kills the redis container. Systemd will then restart the container and you can see all is working again. Do this with: +Now that redis is running you can run the test script that sets a key value, retrieves it, and then kills the redis container. systemd will then restart the container and you can see all is working again. Do this with: ```console ./test_redis_container.sh diff --git a/_posts/2022-08-17-podman-release-v4.2.0.md b/_posts/2022-08-17-podman-release-v4.2.0.md index 6e2d4421..e9f4b567 100644 --- a/_posts/2022-08-17-podman-release-v4.2.0.md +++ b/_posts/2022-08-17-podman-release-v4.2.0.md @@ -21,7 +21,7 @@ Our new release now supports being used with the GitLab Runner as part of GitLab As part of the 4.2.0 release, we have made many changes to both Podman pods and the `podman play kube` command. Pods now have early support for resource limits, allowing CPU and memory use for a pod to be limited. All containers in the pod will share this limit but can still set their own limits. Pods can also be cloned now via the new `podman pod clone` command. Support for YAML in `play kube` has also been improved, with additional support for security context settings and the ability to use `BlockDevice` and `CharDevice` volumes. -Systemd integration with `podman play kube` has been introduced. Pods launched by `podman play kube` can be managed by systemd, using the new `podman-kube@.service` service - e.g. `systemctl --user start podman-play-kube@$(systemd-escape my.yaml).service` will run the `my.yaml` file managed by systemd. +systemd integration with `podman play kube` has been introduced. Pods launched by `podman play kube` can be managed by systemd, using the new `podman-kube@.service` service - e.g. `systemctl --user start podman-play-kube@$(systemd-escape my.yaml).service` will run the `my.yaml` file managed by systemd. Several other features and changes also landed in Podman v4.2.0. Early support for Sigstore signatures is now available in `podman push` and `podman manifest push` - expect more in this area in the future as we further integrate Sigstore and Podman. Podman networks can now be isolated (preventing traffic from being sent to other Podman-managed networks) with the `--opt isolate=` option to `podman network create`. diff --git a/community/meeting/notes/2021-05-04/index.md b/community/meeting/notes/2021-05-04/index.md index f8f4ba20..abe5819f 100644 --- a/community/meeting/notes/2021-05-04/index.md +++ b/community/meeting/notes/2021-05-04/index.md @@ -34,7 +34,7 @@ Developers of the Sysbox runtime, founders of Nestybox. Enhance containers to run most workloads that run in VMs, seamlessly and with strong isolation. -Systemd, Docker, Podman and K8s, etc are the system workloads they're looking to run, seamlessly and with strong isolation. +systemd, Docker, Podman and K8s, etc are the system workloads they're looking to run, seamlessly and with strong isolation. A command like `podman run --userns=auto:size=65536 -it any-image` could run a container running any system, easy, powerful and secure. diff --git a/community/meeting/notes/2022-08-02/index.md b/community/meeting/notes/2022-08-02/index.md index 410f92a7..226becd1 100644 --- a/community/meeting/notes/2022-08-02/index.md +++ b/community/meeting/notes/2022-08-02/index.md @@ -47,7 +47,7 @@ Dan noted that sigstore functionality will be baked into Podman v4.2 and Fetchit Demos (12:40 in the video) * Scale up * Podman Kube + Clean up - * Podman Systemd + * Podman systemd Showed the Fetchit config file, launched an RHEL 8 instance on Amazon, and kept it tiny. Added Podman install instructions and launched 10 instances at once. All systems up, and no touching necessary from Ryan. This runs the commands on each node, and they go to the git location to get their instructions. diff --git a/community/meeting/notes/2022-12-06/index.md b/community/meeting/notes/2022-12-06/index.md index 469d5873..cb5b0883 100644 --- a/community/meeting/notes/2022-12-06/index.md +++ b/community/meeting/notes/2022-12-06/index.md @@ -67,7 +67,7 @@ The instructions format may vary: Using `podman kube play`, users can reuse K8S YAML file -Podman is daemonless, who will monitor the container when it stops? Systemd is use. Tools like `podman generate systemd`, soon "Quadlet" to facilitate this. +Podman is daemonless, who will monitor the container when it stops? systemd is use. Tools like `podman generate systemd`, soon "Quadlet" to facilitate this. OSBuild is a tool for composing O/S images, it allows embedding files and enabling of services in the image. You can compose an image for an edge device using it.