Podman is a lot like Docker: a tool for running OCI containers. While it maintains backwards compatibility with Dockerfile and docker-compose syntax, it offers a lot of other benefits:
- daemonless: it can run containers without a daemon process running in the background.
- Rootless: can run containers without root privileges
- pods: can group containers into secluded pods, which share resources and network namespace
Podman has other features I haven’t explored yet, like compatibility with Kubernetes yaml file, and being able to run containers as systemd units.
Have you used podman before? What are your thoughts on it?
I tried replacing some components of my NAS server that were on docker/docker-compose with podman but unfortunately it was not a 100% drop-in replacement. I had networking issues in podman that I did not have in docker.
The network stack is implemented quite differently in podman than in docker, once you start using more advanced features the backward compatibility disappears.
Since it came second, I think it has a lot of technical advantages, avoiding docker’s mistakes and what not. In the long term I’ll probably switch to it, unless Redhat keeps shooting itself in the foot…
I personally liked podman’s networking a lot more, but my issue is that it is not well documented. I hope that improves.
May I ask which networking issues you had?
I think one of the issues I had was trying to run pihole with podman on a raspberry pi. I could not get DNS requests to work by just mapping the right ports. I ended up just running with --net=host and it worked, I didn’t feel like debugging further.
I had other issues on my NAS but I don’t remember what it was, I have a lot of services on it, qBittorrent, Wireguard, Jellyfin, Jackett, netdata, prometheus, samba, syncthing, pihole (redundant), wsdd all in docker.
I ran into that same DNS issue with pi-hole but in a docker container, and the (bandaid) solution was to put the container in host network mode too. But turns out it’s not an issue but a feature. By default pi-hole only responds to DNS queries from within its local network. The host machine’s LAN is an external network to the containers, unless you set the container’s network mode to host. Pi-hole does have a setting to make it respond to DNS queries from other networks as well, though. What I’m saying is, that might not have been a podman issue.
You know they’re going to
I exclusively use podman instead of docker at work and at home and haven’t encountered any unsolvable problems.
Docker has rootless containers, too, although I think Podman has slightly better options for unprivileged uid management.
Daemonless is appealing, especially for low-powered servers. Getting rid of Docker’s background resource usage is the main reason Podman is on my to-do list.
I imagine pods could be handy to reduce network configuration for related services.
I like that the tools exist to make Podman a drop-in replacement for Docker, including the building of containers.
I have no interest in systemd; I hope it’s optional.
In kubernetes, I often use multiple containers in a pod only to have init containers check certain status of other servers before running the main container. For example, making sure a database is online and I can query data from it. You can just add this to your main container’s start script though. Docker has a way to do this sort of thing too but it feels clunky.
Docker has rootless containers, too, although I think Podman has slightly better options for unprivileged uid management.
I have not used Docker rootless, but I imagine podman has much better and more flexible network configuration as well?
On systemd, I actually do not use systemd either, hence why I said I never tried those features. It is not a hard requirement at all. Though I have not tried to use any integrations with OpenRC and podman
I generally prefer podman to docker at this point for the reasons you stated. However, podman is not 100% compatible with docker, and I have run in to issues with a few tools, that were admittedly poorly written. Mostly around how they deal with file permission when move files in and out of containers.
Works great. You can even make it pretend to be Docker so you can use the Docker commands.
It’s pretty cool. I yeeted docker and now use podman instead.
Ive been using podman on my nas, and i like it.
It has its issues, but knowing your containers dont run as root just makes me feel more at ease. I dont really understand why a docker should run as root, if the software in the container often run as their own user…


