Top
Best
New

Posted by codesmash 9/5/2025

I ditched Docker for Podman(codesmash.dev)
1123 points | 654 commentspage 13
leoc 9/5/2025|
To bikeshed a little, "Why I Ditched Docker for Podman, And Why You Should Too" would be better than the current headline of "Why I Ditched Docker for Podman (And You Should Too)": the "you should too" part is after all the main message of the article, not a side-point.
0_gravitas 9/5/2025||
I'm a fan of grammatical radicalism, the parens are appropriate if they're meant to convey a certain tone/voice in the writing, like a quick added-in-fragment after you're done saying the original title (as if you were giving a presentation).
leoc 9/5/2025|||
It sounds as if what you want there is an em-dash.
0_gravitas 9/5/2025||
Also valid--but I think both work.
unethical_ban 9/5/2025|||
The HN title was altered from the exact title to a modified title that changes the meaning. I don't understand why.
osigurdson 9/5/2025||
"You should too" is the part that annoys me. I use podman but if you are happy with docker, fill your boots.
tietjens 9/5/2025||
How does Podman work with Alpine? Lots of talk of Ubuntu and Debian below.
lisbbb 9/5/2025||
Orbstack if you have a Mac.
ac130kz 9/5/2025||
Podman compose isn't compatible with Docker compose, end of story.
minton 9/5/2025||
We are are migrating back to Docker org-wide after 5 months on Podman.
hatch_q 9/5/2025||
Don't give iXsystems (TrueNAS) ideas. 3 times was enough.
rubenv 9/5/2025||
Is there anything like Skaffold that works with Podman?
Gud 9/5/2025||
FreeBSD jails ftw!
pvtmert 9/5/2025||
I mean I get the overall benefits of having rootless and all, but the premise of security in this article is a bit misleading.

Obviously having a daemon running as root is larger attack surface than a program running as the user.

Going to the github.com/containers/podman/releases, the latest release is actually addressing a security risk that involves overwriting files of the host.

    # v5.6.1 (Latest)
    ## Security
    - This release addresses CVE-2025-9566, where Kubernetes YAML run by podman play kube containing ConfigMap and Secret volumes can use crafted symlinks to overwrite content on the host.
As always, the most secure computer is the one that is unplugged & turned off.
avereveard 9/5/2025|
same, not because compose, but because I wanted a software to run containers and docker only provides a solution
More comments...