• 0 Posts
  • 18 Comments
Joined 5 months ago
cake
Cake day: October 13th, 2024

help-circle
  • Do you actually need to move the admin ui off of port 80/443 if you are just forwarding ports? I don’t think you need to. That said I actually don’t know much about port forwarding since I use Tailscale because of CGNAT.

    My understanding of port forwarding is that you are forwarding connections to your WAN IP/port to a LAN IP/port. Since the router admin ui is available only on LAN by default, you don’t need to change it’s port from 80/443.





  • I ran a podman quadlet setup as a test some time ago. My setup was a little like this:

    • Create a pod if the app uses multiple containers
    • Create a seperate network for each app (an app is either a single container or multiple containers grouped in a pod)
    • Add the reverse proxy container to all networks
    • I don’t expose any ports to the host unless necessary

    If you create a new network in podman you can access other containers and pods in the same network with their name like so container_name:port or pod_name:port. This functionality is disabled in the default network by default. This works at least in the newer versions last I tried, so I have no idea about older podman versions.

    For auto-updates just add this in your .container file under [Container] section:

    [Container]
    AutoUpdate=registry
    

    Now there’s two main ways you can choose to update:

    1. Enable podman-auto-update.timer to enable periodic updates similar to watchtower
    2. Run podman auto-update manually
    # Check for updates
    podman auto-update --dry-run
    
    # Update containers
    podman auto-update
    









  • Yeah quadlets are pretty cool. I have them organized into folders for each pod. podman auto-update is also another pretty nice feature. I don’t use the systemd timer for auto-update. Instead I just do podman auto-update --dry-run to check for updates and update my quadlet files and configs if any changes are required then I run the updates with podman auto-update.




  • Do you mean networking between them? There’s two ways of networking between containers. One of them is to create a custom network for a set of containers that you want to connect between each other. Then you can access other containers in that network using their name and port number like so

    container_name:1234
    

    Note: DNS is disabled in the default network by default so you can’t access other containers by their name if using it. You need to create a new network for it to work.

    Another way is to group them together with a pod. Then you can access other services in that same pod using localhost like so

    localhost:1234
    

    Personally in my current setup I’m using both pods and seperate networks for each of them. The reason is I use traefik and I don’t want all of my containers in a single network along with traefik. So I just made a seperate network for each of my pods and give traefik access to that network. As an example here’s my komga setup:

    I have komga and komf running in a single pod with a network called komga assigned to the pod. So now I can communicate between komga and komf using localhost. I also added traefik to the komga network so that I can reverse proxy my komga instance.