
User namespaces and capabilities are important kernel functionality to make containers secure. They allow to better isolate containers and limit the privileges a container might have. A while back a user reported a bug where some odd behavior was noticed when namespaces are shared between containers which could lead to security problems. Lets take closer…

We’re excited to announce that Podman v4.8.0 has been released! This release includes over 20 features and over 20 bugfixes each. Some highlights include: For a full list of changes, see our GitHub release page. Big thanks to our contributors and community! Try it out and let us know what you think! Upcoming Deprecation Notices:…

One longstanding problem with Podman is that your rootful containers may loose network connectivity after a while. For many users it is not be obvious what is causing such problems. Netavark configures NAT and port forwarding firewall rules. When another process is deleting our firewall rules the containers will loose connectivity. One such process is…

We recently branched Podman 4.8 for a soon to be release. But the big news is our main branch is now 5.0.0-dev. For our users, this means a new major version of Podman has begun its genesis. What can users expect? We plan to begin releases of Podman 5.0.0 in early 2024. At this point,…

As written in an earlier blog by Brent we are going to replace the older CNI stack Netavark and Aardvark-dns. With Podman 5.0 on the horizon we have decided that it will be the perfect time to drop CNI support from our upstream builds. As mentioned in the prior blog post we will most likely…

I recently had a discussion in a container-selinux issue on why we allow certain capabilities by default for containers. The conversation is around DAC_OVERRIDE, a Linux capability which allows privileged processes, usually root, to ignore ownership and read/write permissions Discretionary Access Control (DAC). “As @wrabcak notes in Why do you see DAC_OVERRIDE SELinux denials?, In…

One of the frequent complaints I hear from users moving to Podman is about performance. I’ve always found this confusing, as the Podman team has spent significant time and effort on improving our performance, and we are quite confident that our speed is broadly comparable to Docker. Indeed, an academic paper found that Podman was…

In my personal opinion, user-namespace are one of the most brain-twisting aspects of rootless containers to understand. Arguably right up there with Kubernetes, the learning curve can be quite steep. In this article, I will attempt to reduce that slope for new Podman users (and converts), with an easy to understand analogy. Hopefully this will…

Podman version 4.5 was released upstream last Friday. The latest release brings a large variety of changes including bug fixes and features. Noteworthy ones being: Podman v4.5.0 is available in the stable repos for Fedora 37, 38 and rawhide and should be making its way soon into CentOS Stream and other distributions. So, please give it a…

As Brent announced Netavark v1.6 with DHCP support is released, together with podman v4.5 you can now use DHCP with your macvlan networks in only a few simple steps. In order to use macvlan and DHCP you must run Podman as root. First enable the dhcp proxy via systemd socket: Now just create a macvlan…
Sign up with your email address to receive updates by email from this website.