{"id":807,"date":"2018-11-29T12:32:27","date_gmt":"2018-11-29T12:32:27","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw93\/?p=807"},"modified":"2018-12-06T23:22:28","modified_gmt":"2018-12-06T23:22:28","slug":"managing-containerized-system-services-with-podman","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw93\/index.php\/2018\/11\/29\/managing-containerized-system-services-with-podman\/","title":{"rendered":"Managing containerized system services with Podman"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/08\/podman-logo-source-1.png\" alt=\"Managing containerized system services with Podman\" width=\"1663\" height=\"425\" \/><\/p>\n<p>In this article, I discuss <a href=\"https:\/\/developers.redhat.com\/blog\/category\/containers\/\">containers<\/a>, but look at them from another angle. We usually refer to containers as the best technology for developing new cloud-native applications and orchestrating them with something like <a href=\"https:\/\/developers.redhat.com\/topics\/kubernetes\/\">Kubernetes<\/a>. Looking back at the origins of containers, we\u2019ve mostly forgotten that containers were born for simplifying application distribution on standalone systems.<\/p>\n<p>In this article, we\u2019ll talk about the use of containers as the perfect medium for installing applications and services on a <a href=\"https:\/\/developers.redhat.com\/products\/rhel\/\">Red Hat Enterprise Linux<\/a> (RHEL) system. Using containers doesn\u2019t have to be complicated, I\u2019ll show how to run MariaDB, Apache HTTPD, and WordPress in containers, while managing those containers like any other service, through systemd and systemctl.<\/p>\n<p>Additionally, we\u2019ll explore Podman, which Red Hat has developed jointly with the Fedora community. If you don\u2019t know what Podman is yet, see my previous article, <a href=\"https:\/\/developers.redhat.com\/blog\/2018\/08\/29\/intro-to-podman\/\">Intro to Podman (Red Hat Enterprise Linux 7.6)<\/a> and Tom Sweeney\u2019s <a href=\"https:\/\/developers.redhat.com\/blog\/2018\/11\/20\/buildah-podman-containers-without-daemons\/\">Containers without daemons: Podman and Buildah available in RHEL 7.6 and RHEL 8 Beta<\/a>.<\/p>\n<h2>Red Hat Container Catalog<\/h2>\n<p>First of all, let\u2019s explore the containers that are available for Red Hat Enterprise Linux through the <a href=\"https:\/\/access.redhat.com\/containers\/\">Red Hat Container Catalog <\/a><a href=\"https:\/\/access.redhat.com\/containers\/\">(access.redhat.com\/containers)<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/FireShot-Capture-021-Container-Catalog-Red-Hat-Customer_-https___access.redhat.com_containers_-1.png\" alt=\"\" width=\"1920\" height=\"1150\" \/><\/p>\n<p>By clicking Explore The Catalog, we\u2019ll have access to the full list of containers categories and products available in Red Hat Container Catalog.<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/FireShot-Capture-010-Container-Catalog-Red-Hat_-https___access.redhat.com_containers__explore.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/FireShot-Capture-010-Container-Catalog-Red-Hat_-https___access.redhat.com_containers__explore-1024x178.png\" alt=\"Exploring the available containers\" width=\"640\" height=\"111\" \/><\/a><\/p>\n<p>Clicking Red Hat Enterprise Linux will bring us to the RHEL section, displaying all the available containers images for the system:<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/FireShot-Capture-009-Container-Catalog-Red-Hat-Customer-_-https___access.redhat.com_containe.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/FireShot-Capture-009-Container-Catalog-Red-Hat-Customer-_-https___access.redhat.com_containe-1024x905.png\" alt=\"Available RHEL containers\" width=\"640\" height=\"566\" \/><\/a><\/p>\n<p>At the time of writing this article, in the RHEL category there were more than 70 containers images, ready to be installed and used on RHEL 7 systems.<\/p>\n<p>So let\u2019s choose some container images and try them on a Red Hat Enterprise Linux 7.6 system. For demo purposes, we\u2019ll try to use Apache HTTPD + PHP and the MariaDB database for a WordPress blog.<\/p>\n<h2>Install a containerized service<\/h2>\n<p>We\u2019ll start by installing our first containerized service for setting up a MariaDB database that we\u2019ll need for hosting the WordPress blog\u2019s data.<\/p>\n<p>As a prerequisite for installing containerized system services, we need to install the utility named Podman on our Red Hat Enterprise Linux 7 system:<\/p>\n<p>[root@localhost ~]# subscription-manager repos &#8211;enable rhel-7-server-rpms &#8211;enable rhel-7-server-extras-rpms<br \/>\n[root@localhost ~]# yum install podman<\/p>\n<p>As explained in my previous article, Podman complements Buildah and Skopeo by offering an experience similar to the Docker command line: allowing users to run standalone (non-orchestrated) containers. And Podman doesn\u2019t require a daemon to run containers and pods, so we can easily say goodbye to big fat daemons.<\/p>\n<p>By installing Podman, you\u2019ll see that Docker is no longer a required dependency!<\/p>\n<p>As suggested by the Red Hat Container Catalog\u2019s MariaDB page, we can run the following commands to get the things done (we\u2019ll replace, of course, docker with podman):<\/p>\n<p>[root@localhost ~]# podman pull registry.access.redhat.com\/rhscl\/mariadb-102-rhel7<br \/>\nTrying to pull registry.access.redhat.com\/rhscl\/mariadb-102-rhel7&#8230;Getting image source signatures<br \/>\nCopying blob sha256:9a1bea865f798d0e4f2359bd39ec69110369e3a1131aba6eb3cbf48707fdf92d<br \/>\n72.21 MB \/ 72.21 MB [======================================================] 9s<br \/>\nCopying blob sha256:602125c154e3e132db63d8e6479c5c93a64cbfd3a5ced509de73891ff7102643<br \/>\n1.21 KB \/ 1.21 KB [========================================================] 0s<br \/>\nCopying blob sha256:587a812f9444e67d0ca2750117dbff4c97dd83a07e6c8c0eb33b3b0b7487773f<br \/>\n6.47 MB \/ 6.47 MB [========================================================] 0s<br \/>\nCopying blob sha256:5756ac03faa5b5fb0ba7cc917cdb2db739922710f885916d32b2964223ce8268<br \/>\n58.82 MB \/ 58.82 MB [======================================================] 7s<br \/>\nCopying config sha256:346b261383972de6563d4140fb11e81c767e74ac529f4d734b7b35149a83a081<br \/>\n6.77 KB \/ 6.77 KB [========================================================] 0s<br \/>\nWriting manifest to image destination<br \/>\nStoring signatures<br \/>\n346b261383972de6563d4140fb11e81c767e74ac529f4d734b7b35149a83a081<\/p>\n<p>[root@localhost ~]# podman images<br \/>\nREPOSITORY TAG IMAGE ID CREATED SIZE<br \/>\nregistry.access.redhat.com\/rhscl\/mariadb-102-rhel7 latest 346b26138397 2 weeks ago 449MB<\/p>\n<p>After that, we can look at the <a href=\"https:\/\/access.redhat.com\/containers\/?tab=tech-details&amp;platform=systemimages#\/registry.access.redhat.com\/rhscl\/mariadb-102-rhel7\">Red Hat Container Catalog page<\/a> for details on the needed variables for starting the MariaDB container image.<\/p>\n<p>Inspecting the previous page, we can see that under <em>Labels<\/em>, there is a label named <em>usage<\/em> containing an example string for running this container image:<\/p>\n<p>usage docker run -d -e MYSQL_USER=user -e MYSQL_PASSWORD=pass -e MYSQL_DATABASE=db -p 3306:3306 rhscl\/mariadb-102-rhel7<\/p>\n<p>After that we need some other information about our container image: the \u201c<em>user ID running inside the container<\/em>\u201d and the \u201c<em>persistent volume location to attach<\/em>\u201c:<\/p>\n<p>[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/mariadb-102-rhel7 | grep User<br \/>\n&#8220;User&#8221;: &#8220;27&#8221;,<br \/>\n[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/mariadb-102-rhel7 | grep -A1 Volume<br \/>\n&#8220;Volumes&#8221;: {<br \/>\n&#8220;<i>\/var\/lib\/mysql\/data<\/i>&#8220;: {}<br \/>\n[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/mariadb-102-rhel7 | grep -A1 ExposedPorts<br \/>\n&#8220;ExposedPorts&#8221;: {<br \/>\n&#8220;<i>3306<\/i>\/tcp&#8221;: {}<\/p>\n<p>At this point, we have to create the directories that will handle the container\u2019s data; remember that containers are ephemeral by default. Then we set also the right permissions:<\/p>\n<p>[root@localhost ~]# mkdir -p \/opt\/var\/lib\/mysql\/data<br \/>\n[root@localhost ~]# chown 27:27 \/opt\/var\/lib\/mysql\/data<\/p>\n<p>Then we can set up our systemd unit file for handling the database. We\u2019ll use a unit file similar to the one prepared in the previous article:<\/p>\n<p>[root@localhost ~]# cat \/etc\/systemd\/system\/mariadb-service.service<br \/>\n[Unit]<br \/>\nDescription=Custom MariaDB Podman Container<br \/>\nAfter=network.target<\/p>\n<p>[Service]<br \/>\nType=simple<br \/>\nTimeoutStartSec=5m<br \/>\nExecStartPre=-\/usr\/bin\/podman rm &#8220;mariadb-service&#8221;<\/p>\n<p>ExecStart=\/usr\/bin\/podman run &#8211;name mariadb-service -v \/opt\/var\/lib\/mysql\/data:\/var\/lib\/mysql\/data:Z -e MYSQL_USER=wordpress -e MYSQL_PASSWORD=mysecret -e MYSQL_DATABASE=wordpress &#8211;net host registry.access.redhat.com\/rhscl\/mariadb-102-rhel7<\/p>\n<p>ExecReload=-\/usr\/bin\/podman stop &#8220;mariadb-service&#8221;<br \/>\nExecReload=-\/usr\/bin\/podman rm &#8220;mariadb-service&#8221;<br \/>\nExecStop=-\/usr\/bin\/podman stop &#8220;mariadb-service&#8221;<br \/>\nRestart=always<br \/>\nRestartSec=30<\/p>\n<p>[Install]<br \/>\nWantedBy=multi-user.target<\/p>\n<p>Let\u2019s take apart our ExecStart command and analyze how it\u2019s built:<\/p>\n<ul>\n<li>\/usr\/bin\/podman run &#8211;name mariadb-service says we want to run a container that will be named mariadb-service.<\/li>\n<li><em>\u2013<\/em>v \/opt\/var\/lib\/mysql\/data:\/var\/lib\/mysql\/data:Z says we want to map the just-created data directory to the one inside the container. The Z option informs Podman to map correctly the SELinux context for avoiding permissions issues.<\/li>\n<li><em>\u2013<\/em>e MYSQL_USER=wordpress -e MYSQL_PASSWORD=mysecret -e MYSQL_DATABASE=wordpress identifies the additional environment variables to use with our MariaDB container. We\u2019re defining the username, the password, and the database name to use.<\/li>\n<li>&#8211;net host maps the container\u2019s network to the RHEL host.<\/li>\n<li>registry.access.redhat.com\/rhscl\/mariadb-102-rhel7 specifies the container image to use.<\/li>\n<\/ul>\n<p>We can now reload the systemd catalog and start the service:<\/p>\n<p>[root@localhost ~]# systemctl daemon-reload<br \/>\n[root@localhost ~]# systemctl start mariadb-service<br \/>\n[root@localhost ~]# systemctl status mariadb-service<br \/>\nmariadb-service.service &#8211; Custom MariaDB Podman Container<br \/>\nLoaded: loaded (\/etc\/systemd\/system\/mariadb-service.service; static; vendor preset: disabled)<br \/>\nActive: active (running) since Thu 2018-11-08 10:47:07 EST; 22s ago<br \/>\nProcess: 16436 ExecStartPre=\/usr\/bin\/podman rm mariadb-service \u200b(code=exited, status=0\/SUCCESS)<br \/>\nMain PID: 16452 (podman)<br \/>\nCGroup: \/system.slice\/mariadb-service.service<br \/>\n\u2514\u250016452 \/usr\/bin\/podman run &#8211;name mariadb-service -v \/opt\/var\/lib\/mysql\/data:\/var\/lib\/mysql\/data:Z -e MYSQL_USER=wordpress -e MYSQL_PASSWORD=mysecret -e MYSQL_DATABASE=wordpress &#8211;net host regist&#8230;<\/p>\n<p>Nov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140276291061504 [Note] InnoDB: Buffer pool(s) load completed at 181108 15:47:14<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Note] Plugin &#8216;FEEDBACK&#8217; is disabled.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Note] Server socket created on IP: &#8216;::&#8217;.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Warning] &#8216;user&#8217; entry &#8216;root@b75779533f08&#8217; ignored in &#8211;skip-name-resolve mode.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Warning] &#8216;user&#8217; entry &#8216;@b75779533f08&#8217; ignored in &#8211;skip-name-resolve mode.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Warning] &#8216;proxies_priv&#8217; entry &#8216;@% root@b75779533f08&#8217; ignored in &#8211;skip-name-resolve mode.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Note] Reading of all Master_info entries succeded<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Note] Added new Master_info &#8221; to hash table<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: 2018-11-08 15:47:14 140277156538560 [Note] \/opt\/rh\/rh-mariadb102\/root\/usr\/libexec\/mysqld: ready for connections.<br \/>\nNov 08 10:47:14 localhost.localdomain podman[16452]: Version: &#8216;10.2.8-MariaDB&#8217; socket: &#8216;\/var\/lib\/mysql\/mysql.sock&#8217; port: 3306 MariaDB Server<\/p>\n<p>Perfect! MariaDB is running, so we can now start working on the Apache HTTPD + PHP container for our WordPress service.<\/p>\n<p>First of all, let\u2019s pull the right container from Red Hat Container Catalog:<\/p>\n<p>[root@localhost ~]# podman pull registry.access.redhat.com\/rhscl\/php-71-rhel7<br \/>\nTrying to pull registry.access.redhat.com\/rhscl\/php-71-rhel7&#8230;Getting image source signatures<br \/>\nSkipping fetch of repeat blob sha256:9a1bea865f798d0e4f2359bd39ec69110369e3a1131aba6eb3cbf48707fdf92d<br \/>\nSkipping fetch of repeat blob sha256:602125c154e3e132db63d8e6479c5c93a64cbfd3a5ced509de73891ff7102643<br \/>\nSkipping fetch of repeat blob sha256:587a812f9444e67d0ca2750117dbff4c97dd83a07e6c8c0eb33b3b0b7487773f<br \/>\nCopying blob sha256:12829a4d5978f41e39c006c78f2ecfcd91011f55d7d8c9db223f9459db817e48<br \/>\n82.37 MB \/ 82.37 MB [=====================================================] 36s<br \/>\nCopying blob sha256:14726f0abe4534facebbfd6e3008e1405238e096b6f5ffd97b25f7574f472b0a<br \/>\n43.48 MB \/ 43.48 MB [======================================================] 5s<br \/>\nCopying config sha256:b3deb14c8f29008f6266a2754d04cea5892ccbe5ff77bdca07f285cd24e6e91b<br \/>\n9.11 KB \/ 9.11 KB [========================================================] 0s<br \/>\nWriting manifest to image destination<br \/>\nStoring signatures<br \/>\nb3deb14c8f29008f6266a2754d04cea5892ccbe5ff77bdca07f285cd24e6e91b<\/p>\n<p>We can now look through this container image to get some details:<\/p>\n<p>[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/php-71-rhel7 | grep User<br \/>\n&#8220;User&#8221;: &#8220;1001&#8221;,<br \/>\n&#8220;User&#8221;: &#8220;1001&#8221;<br \/>\n[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/php-71-rhel7 | grep -A1 Volume<br \/>\n[root@localhost ~]# podman inspect registry.access.redhat.com\/rhscl\/php-71-rhel7 | grep -A1 ExposedPorts<br \/>\n&#8220;ExposedPorts&#8221;: {<br \/>\n&#8220;8080\/tcp&#8221;: {},<\/p>\n<p>As you can see from the previous commands, we got no volume from the container details. Are you asking why? It\u2019s because this container image, even if it\u2019s part of RHSCL (formerly known as Red Hat Software Collections), has been prepared for working with the Source-to-Image (S2I) builder. For more info on the S2I builder, please take a look at its <a href=\"https:\/\/github.com\/openshift\/source-to-image\">GitHub project page<\/a>.<\/p>\n<p>Unfortunately, at this moment, the S2I utility is strictly dependent on Docker, but for demo purposes, we would like to avoid it..!<\/p>\n<p>So moving back to our issue, what can we do for guessing the right folder to mount on our PHP container? We can easily guess the right location by looking at all the environment variables for the container image, where we will find APP_DATA=\/opt\/app-root\/src.<\/p>\n<p>So let\u2019s create this directory with the right permissions; we\u2019ll also download the latest package for our WordPress service:<\/p>\n<p>[root@localhost ~]# mkdir -p \/opt\/app-root\/src\/<br \/>\n[root@localhost ~]# curl -o latest.tar.gz https:\/\/wordpress.org\/latest.tar.gz<br \/>\n[root@localhost ~]# tar -vxf latest.tar.gz<br \/>\n[root@localhost ~]# mv wordpress\/* \/opt\/app-root\/src\/<br \/>\n[root@localhost ~]# chown 1001 -R \/opt\/app-root\/src<\/p>\n<p>We\u2019re now ready for creating our Apache http + PHP systemd unit file:<\/p>\n<p>[root@localhost ~]# cat \/etc\/systemd\/system\/httpdphp-service.service<br \/>\n[Unit]<br \/>\nDescription=Custom httpd + php Podman Container<br \/>\nAfter=mariadb-service.service<\/p>\n<p>[Service]<br \/>\nType=simple<br \/>\nTimeoutStartSec=30s<br \/>\nExecStartPre=-\/usr\/bin\/podman rm &#8220;httpdphp-service&#8221;<\/p>\n<p>ExecStart=\/usr\/bin\/podman run &#8211;name httpdphp-service -p 8080:8080 -v \/opt\/app-root\/src:\/opt\/app-root\/src:Z registry.access.redhat.com\/rhscl\/php-71-rhel7 \/bin\/sh -c \/usr\/libexec\/s2i\/run<\/p>\n<p>ExecReload=-\/usr\/bin\/podman stop &#8220;httpdphp-service&#8221;<br \/>\nExecReload=-\/usr\/bin\/podman rm &#8220;httpdphp-service&#8221;<br \/>\nExecStop=-\/usr\/bin\/podman stop &#8220;httpdphp-service&#8221;<br \/>\nRestart=always<br \/>\nRestartSec=30<\/p>\n<p>[Install]<br \/>\nWantedBy=multi-user.target<\/p>\n<p>We need then to reload the systemd unit files and start our latest service:<\/p>\n<p>[root@localhost ~]# systemctl daemon-reload<\/p>\n<p>[root@localhost ~]# systemctl start httpdphp-service<\/p>\n<p>[root@localhost ~]# systemctl status httpdphp-service<br \/>\nhttpdphp-service.service &#8211; Custom httpd + php Podman Container<br \/>\nLoaded: loaded (\/etc\/systemd\/system\/httpdphp-service.service; static; vendor preset: disabled)<br \/>\nActive: active (running) since Thu 2018-11-08 12:14:19 EST; 4s ago<br \/>\nProcess: 18897 ExecStartPre=\/usr\/bin\/podman rm httpdphp-service (code=exited, status=125)<br \/>\nMain PID: 18913 (podman)<br \/>\nCGroup: \/system.slice\/httpdphp-service.service<br \/>\n\u2514\u250018913 \/usr\/bin\/podman run &#8211;name httpdphp-service -p 8080:8080 -v \/opt\/app-root\/src:\/opt\/app-root\/src:Z registry.access.redhat.com\/rhscl\/php-71-rhel7 \/bin\/sh -c \/usr\/libexec\/s2i\/run<\/p>\n<p>Nov 08 12:14:20 localhost.localdomain podman[18913]: =&gt; sourcing 50-mpm-tuning.conf &#8230;<br \/>\nNov 08 12:14:20 localhost.localdomain podman[18913]: =&gt; sourcing 40-ssl-certs.sh &#8230;<br \/>\nNov 08 12:14:20 localhost.localdomain podman[18913]: AH00558: httpd: Could not reliably determine the server&#8217;s fully qualified domain name, using 10.88.0.12. Set the &#8216;ServerName&#8217; directive globall&#8230; this message<br \/>\nNov 08 12:14:20 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:20.925637 2018] [ssl:warn] [pid 1] AH01909: 10.88.0.12:8443:0 server certificate does NOT include an ID which matches the server name<br \/>\nNov 08 12:14:20 localhost.localdomain podman[18913]: AH00558: httpd: Could not reliably determine the server&#8217;s fully qualified domain name, using 10.88.0.12. Set the &#8216;ServerName&#8217; directive globall&#8230; this message<br \/>\nNov 08 12:14:21 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:21.017164 2018] [ssl:warn] [pid 1] AH01909: 10.88.0.12:8443:0 server certificate does NOT include an ID which matches the server name<br \/>\nNov 08 12:14:21 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:21.017380 2018] [http2:warn] [pid 1] AH10034: The mpm module (prefork.c) is not supported by mod_http2. The mpm determines how things are &#8230;<br \/>\nNov 08 12:14:21 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:21.018506 2018] [lbmethod_heartbeat:notice] [pid 1] AH02282: No slotmem from mod_heartmonitor<br \/>\nNov 08 12:14:21 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:21.101823 2018] [mpm_prefork:notice] [pid 1] AH00163: Apache\/2.4.27 (Red Hat) OpenSSL\/1.0.1e-fips configured &#8212; resuming normal operations<br \/>\nNov 08 12:14:21 localhost.localdomain podman[18913]: [Thu Nov 08 17:14:21.101849 2018] [core:notice] [pid 1] AH00094: Command line: &#8216;httpd -D FOREGROUND&#8217;<br \/>\nHint: Some lines were ellipsized, use -l to show in full.<\/p>\n<p>Let\u2019s open the 8080 port on our system\u2019s firewall for connecting to our brand new WordPress service:<\/p>\n<p>[root@localhost ~]# firewall-cmd &#8211;permanent &#8211;add-port=8080\/tcp<br \/>\n[root@localhost ~]# firewall-cmd &#8211;add-port=8080\/tcp<\/p>\n<p>We can surf to our Apache web server:<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-18-16-06.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-18-16-06.png\" alt=\"Apache web server\" width=\"688\" height=\"371\" \/><\/a><\/p>\n<p>Start the installation process, and define all the needed details:<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-19-04-46.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-19-04-46.png\" alt=\"Start the installation process\" width=\"700\" height=\"395\" \/><\/a><\/p>\n<p>And finally, run the installation!<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-19-07-07.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-19-07-07.png\" alt=\"Run the installation\" width=\"701\" height=\"280\" \/><\/a><\/p>\n<p>At the end, we should reach out our brand new blog, running on Apache httpd + PHP backed by a great MariaDB database!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/developers.redhat.com\/blog\/wp-content\/uploads\/2018\/11\/Screenshot-from-2018-11-08-19-08-39.png\" alt=\"\" width=\"701\" height=\"552\" \/><\/p>\n<p>That\u2019s all folks; may containers be with you!<\/p>\n<p><a href=\"https:\/\/developers.redhat.com\/blog\/2018\/11\/29\/managing-containerized-system-services-with-podman\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, I discuss containers, but look at them from another angle. We usually refer to containers as the best technology for developing new cloud-native applications and orchestrating them with something like Kubernetes. Looking back at the origins of containers, we\u2019ve mostly forgotten that containers were born for simplifying application distribution on standalone systems. &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw93\/index.php\/2018\/11\/29\/managing-containerized-system-services-with-podman\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Managing containerized system services with Podman&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-807","post","type-post","status-publish","format-standard","hentry","category-docker"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/posts\/807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/comments?post=807"}],"version-history":[{"count":2,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/posts\/807\/revisions"}],"predecessor-version":[{"id":849,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/posts\/807\/revisions\/849"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/media?parent=807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/categories?post=807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw93\/index.php\/wp-json\/wp\/v2\/tags?post=807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}