Most active commenters
  • pydry(10)
  • dharmab(3)
  • robertlagrant(3)

←back to thread

180 points teleforce | 23 comments | | HN request time: 1.409s | source | bottom
Show context
orthoxerox ◴[] No.43685880[source]
What is the killer feature that will make me want to switch from Docker Compose to Podman Quadlets?
replies(7): >>43685989 #>>43685992 #>>43686728 #>>43687129 #>>43687706 #>>43688911 #>>43690483 #
dharmab ◴[] No.43685989[source]
I prefer quadlet for 2 reasons:

1. Podman is simpler than Docker. There is no long-running daemon. Rootless is default.

2. Quadlets can be managed as systemd services, giving me the same tools to manage and view logs for system daemons and containers.

Quadlets have been especially nice for bundling up an AI app I wrote as a cloud-init file, making it easy to deploy the hardware, software and models as one artifact.

replies(2): >>43686670 #>>43687155 #
pydry ◴[] No.43686670[source]
quadlets == systemd which requires root to run. this is NOT the same thing as "systemd cant run non root containers". OBVIOUSLY it can, just as docker can run non root containers.

Making systemd a necessary dependency to run > 1 container kinda negates many of the the nice advantages that podman has of not requiring root.

podman compose doesnt require root and would serve as a substitute but it's a very neglected piece of software.

replies(3): >>43686855 #>>43686924 #>>43686928 #
voxadam ◴[] No.43686924[source]
systemd user units can be run by non-root users.

https://wiki.archlinux.org/title/Systemd/User

replies(1): >>43686977 #
1. pydry ◴[] No.43686977[source]
not the point as i mentioned above.

systemd itself requires root.

replies(3): >>43687015 #>>43687216 #>>43687686 #
2. voxadam ◴[] No.43687015[source]
Installing packages (like podman or moby/docker) using dnf and apt requires root as well, so I'm not sure what your point is.
replies(1): >>43687039 #
3. pydry ◴[] No.43687039[source]
making systemd - a root service - a necessary dependency in order to orchestrate > 1 nonroot containers is both unnecessary and bad architecture.

It was a shitty decision that renders it just "a less popular docker" and not "a better docker".

replies(2): >>43687114 #>>43687211 #
4. linuxandrew ◴[] No.43687114{3}[source]
Podman doesn't have a dependency on systemd. e.g. it is packaged in Void Linux.

Podman has a better architecture than Docker in that it can easily run on a non-privileged user.

Quadlet (aka podman-systemd.unit) is a podman-systemd integration which can make it easy to launch and orchestrate podman containers via systemd. You can get all if the systemd dependency handling, require other units to run after a container finishes, and all sorts of other useful things. Systemd "user" units (systemctl --user) also works here with the containers running as a non-privileged user in a non-root systemd context.

Just to be clear, Quadlet is just an integration and you can still run podman without it. You can still run podman on non-systemd systems as well.

replies(2): >>43687516 #>>43689894 #
5. exceptione ◴[] No.43687211{3}[source]
wut? Containers need an operating system.

systemd runs on a linux host, the rootless container runs on a linux host, controlled by `systemctl --user ...`.

replies(1): >>43725344 #
6. steeleduncan ◴[] No.43687216[source]
systemd is the init process, the Linux kernel non-optionally runs the init process as root
replies(1): >>43689906 #
7. dharmab ◴[] No.43687516{4}[source]
And you can use podman to run multiple containers together (as a Pod). With or without systemd.
8. dharmab ◴[] No.43687686[source]
How were you planning to run podman compose without an init process running as root?
replies(1): >>43689997 #
9. pydry ◴[] No.43689894{4}[source]
>Podman doesn't have a dependency on systemd

Just to be clear we're talking about QUADLETS, red hat's recommended way to orchestrate containers.

>Just to be clear, Quadlet is just an integration and you can still run podman without it.

Just to be clear, nobody was unclear about that.

It is, just to be clear, red hat's recommended way to orchestrate podman containers despite having this nasty dependency analogous to the one docker has on a root service.

Hope that helps.

replies(1): >>43691517 #
10. pydry ◴[] No.43689906[source]
yeah thats what i said.

and that particular init process did way more than any init process ever should even before somebody had the bright idea to add "docker compose substitite" to its ever growing list of responsibilities.

you could put a word processor and games in their too if you really wanted. is that a good idea? ill leave that for the reader's judgment.

replies(2): >>43690004 #>>43690583 #
11. pydry ◴[] No.43689997[source]
what else would you like to bundle in the init process? docker compose as well? maybe kubernetes too. a webserver? a word processor perhaps? maybe an email client?
replies(2): >>43691084 #>>43691476 #
12. ratorx ◴[] No.43690004{3}[source]
systemd just provides the feature to use a custom external application to configure a service based on a declarative spec, which podman uses to create actual systemd services from a declarative container spec.

From the podman docs:

> Podman supports building and starting containers (and creating volumes) via systemd by using a systemd generator.

Putting aside all the other issues one may have with systemd, this feels like a decent feature for a service manager to have (custom generation of service specifications).

> bright idea to add “Docker compose substitute”

Why is this so revolutionary? Docker-compose is just a service manager for containers. Systemd is a service manager. Systemd allowing podman to give it “container” features seems pretty reasonable.

13. xienze ◴[] No.43690583{3}[source]
> before somebody had the bright idea to add "docker compose substitite" to its ever growing list of responsibilities.

systemd itself isn’t acting as a docker-compose substitute. Podman simply translates unit files containing docker-esque configuration (image name, volumes, etc.) into plain systemd unit files that contain (among other things) an ExecStart line that starts the container with the proper arguments.

14. robertlagrant ◴[] No.43691084{3}[source]
Podman compose isn't bundled in the init process.
replies(1): >>43692093 #
15. coldtea ◴[] No.43691476{3}[source]
>what else would you like to bundle in the init process? docker compose as well?

You can complain that you don't liken systemd's design or that it does too much (very overplayed complaint, but ok).

But that's an orthogonal point to the initial complaint you've made that it's somehow bad that this requires systemd to run.

That complain is moot, since you'd be running systemd anyway, with or without those containers. And it's double moot, because you can run > 1 containers (with podman) without root too.

(It's also wrong that systemd was added container compose capabilities - podman is what translates things to systemd "speak")

replies(1): >>43692037 #
16. coldtea ◴[] No.43691517{5}[source]
>Just to be clear, nobody was unclear about that

Oh, you were quite unclear. Also wrong in saying you need systemd with podman to orchestrate multiple containers without root.

>It is, just to be clear, red hat's recommended way to orchestrate podman containers despite having this nasty dependency analogous to the one docker has on a root service.

It's not "red hat's recommended way to orchestrate podman containers" in general. It's "red hat's recommended way to orchestrate containers on top of systemd", that its whole point.

Nothing nasty about it either, you'd already be running systemd on your redhat system (and many non red-hat ones).

replies(1): >>43696520 #
17. pydry ◴[] No.43692037{4}[source]
>You can complain that you don't liken systemd's design or that it does too much (very overplayed complaint, but ok).

It's not at all orthogonal. Making the "default" way to run > 1 containers together require the init process is fucking stupid.

Similar to how requiring ROOT to run containers was a stupid design decision made by docker.

This decision to make quadlets the "default podman orchestrator" and to double down on it relegates podman from being "a better docker" to just "docker just with different design mistakes".

>That complain is moot, since you'd be running systemd anyway

false. systemd is not the only pid 1 in existence (much as it likes to pretend it is). when you run a container inside a container there also isn't a systemd.

>And it's double moot, because you can run > 1 containers (with podman) without root too.

except there is NO good orchestration system for doing that. podman compose is a steaming pile of shit. quadlets requires systemd which requires root. docker compose requires a root service. you can run podman compose inside a container but not quadlets.

might as well just use docker at this rate.

>That complain is moot

Your comment comprehensively missed my point 3 times. It's triple moot. It would have been better left unmade.

18. pydry ◴[] No.43692093{4}[source]
Yep, but have you used it? It's crap. It implements about half of what docker compose does.

I'd stop complaining about quadlets being a hunk of crap if podman compose were decently maintained.

replies(1): >>43692555 #
19. robertlagrant ◴[] No.43692555{5}[source]
I'm contesting your claim that podman compose is bundled with systemd.
replies(1): >>43694811 #
20. pydry ◴[] No.43694811{6}[source]
I never made this claim.
replies(1): >>43702981 #
21. pydry ◴[] No.43696520{6}[source]
>Also wrong in saying you need systemd with podman to orchestrate multiple containers without root

I explicitly said thay it wasnt needed and that there werent other ways just that it was the recommended way.

>It's not "red hat's recommended way to orchestrate podman containers

It is.

22. robertlagrant ◴[] No.43702981{7}[source]
So what was this about? What's the thing that the "else" refers to?

> what else would you like to bundle in the init process? docker compose as well? maybe kubernetes too. a webserver? a word processor perhaps? maybe an email client?

23. esseph ◴[] No.43725344{4}[source]
But you don't understand, it also needs an operating system therefore it is vulnerable, because things on it run as root! /s