Shameless self-plug here. I wrote a blog post to document my methodology after having some issues with publicly available examples of using Podman and traefik in a best-practices config. Hopefully this finds the one other person that was in my shoes and helps them out. Super happy for feedback if others care to share.

  • Lem453@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    20 days ago

    What’s the advantage of socket activation? Is it more secure than exposing a docker port?