Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
arouene@mastodon.socialA

arouene@mastodon.social

@arouene@mastodon.social
About
Indlæg
1
Emner
0
Fremhævelser
0
Grupper
0
Følgere
0
Følger
0

Vis Original

Indlæg

Seneste Bedste Controversial

  • Running Podman in production for years now, and I don't miss the Docker daemon one bit.
    arouene@mastodon.socialA arouene@mastodon.social

    @Larvitz Thanks for this great guide! I’m also a heavy user of
    podman since years, and it's my number one solution for deploying services.

    I had a question about the pod-in-pod deployment of forgejo / traefik,
    giving access to the docker.socket allows thoses pods to create pods, but then
    it can create privileged pods which mount the root volume of the host, right?
    Even with the NoNewPrivileges arg?

    Is there a way to control what a pod having access to the docker.socket can
    create?

    Ikke-kategoriseret podman linux devops systemd homelab
  • Log ind

  • Har du ikke en konto? Tilmeld

  • Login or register to search.
Powered by NodeBB Contributors
Graciously hosted by data.coop
  • First post
    Last post
0
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper