-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document Podman limitations #6653
Document Podman limitations #6653
Conversation
✅ Deploy Preview for odo-docusaurus-preview ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
@@ -0,0 +1,27 @@ | |||
--- | |||
title: Podman limitations |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This sounds like the document is describing limitation of the podman itself.
How about something like this:?
title: Podman limitations | |
title: Podman support limitations |
|
||
The motivation behind the support for the Podman platform is to lower the learning curve | ||
for developers working on containerized applications. As a matter of fact, Podman is simpler | ||
to apprehend, install and maintain than a Kubernetes cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It would be good to also mention that with Podman you have everything locally with much lower overhead (resources)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good point, I'm adding it
docs/website/docs/development/architecture/podman-support-limitations.md
Outdated
Show resolved
Hide resolved
docs/website/docs/development/architecture/podman-support-limitations.md
Outdated
Show resolved
Hide resolved
docs/website/docs/development/architecture/podman-support-limitations.md
Outdated
Show resolved
Hide resolved
docs/website/docs/development/architecture/podman-support-limitations.md
Outdated
Show resolved
Hide resolved
|
||
This command without the `--platform` flag will delete components from both the cluster and Podman. You can use the `--platform` flag to limit the deletion from a specific platform, either `cluster` or `podman`. | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe you can add a section here instead of directly starting with the limitations. Or convert the section "Commands working with Podman" to a normal list.
|
||
Podman is natively not able to forward ports bound to localhost. In this situation, you may have two solutions: | ||
- you can change your application to listen on `0.0.0.0`. This will be necessary for the ports giving access to the application or, in Production, this port would not be available (this port will most probably be exposed through an Ingress or a Route in Production, and these methods need the port to be bound to `0.0.0.0`), | ||
- you can keep the port bound to `localhost`. This is the best choice for the Debug port, to restrict access to this Debug port. In this case, you can use the flag `--forward-localhost` when running `odo dev` on Podman. This way, you keep the Debug port secure on cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This part is not very clear to me.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I might have been biased when I read this as I worked on --forward-localhost
, but just curious: what did you find not very clear?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be necessary for the ports giving access to the application or
This. Does it mean that this will be necessary to allow application access on the certain ports?
This is the best choice for the Debug port, to restrict access to this Debug port.
What does it mean to restrict access to this debug port?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be necessary for the ports giving access to the application or
This. Does it mean that this will be necessary to allow application access on the certain ports?
It is more about reaching the port opened by the application from the outside. If you want the port to be reachable from outside of the container/pod, the application needs to bind the port to 0.0.0.0
(or more specifically to an interface that is connected to an outside network).
This is the best choice for the Debug port, to restrict access to this Debug port.
What does it mean to restrict access to this debug port?
Same point, about not making this port accessible from outside of the container/pod. It is generally recommended to restrict access to this Debug port by not exposing it. So here we are saying that --forward-localhost
allows users to reach such ports on Podman while still keeping them unreachable on the cluster.
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is not the first time I stumbled upon this issue with namespaces/projects. Something to keep an eye on.. Overriding it for now since this is only a doc PR. /override Kubernetes-Integration-Tests/Kubernetes-Integration-Tests |
@rm3l: Overrode contexts on behalf of rm3l: Kubernetes-Integration-Tests/Kubernetes-Integration-Tests In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I am fine with merging this PR. Thank you for documenting this, Philippe. |
/hold cancel |
What type of PR is this:
Document Podman limitations
Preview: https://deploy-preview-6653--odo-docusaurus-preview.netlify.app/docs/development/architecture/podman-support-limitations
/area documentation
What does this PR do / why we need it:
Which issue(s) this PR fixes:
Fixes #6592
PR acceptance criteria:
Unit test
Integration test
Documentation
How to test changes / Special notes to the reviewer: