Containers

Podman vs Docker: Which is best to run containers?

Podman vs Docker - find out the differences, pros, and cons of running each containerization tool. Learn why Podman may be a secure alternative for you.

You may have seen the name Podman come up recently in looking at Docker containers or containerized technologies. Podman is becoming more popular among those who want to run containers. What is the difference between Podman and Docker? Let’s look at Podman vs Docker as your default virtualization container engine and see the pros and cons and comparison of each one when it comes to running containerization tools.

TLDR of Podman vs Docker

Feature/AspectPodmanDocker
ArchitectureDaemonless, runs containers directly as child processesClient-server, uses a daemon
SecuritySupports rootless containers nativelySupports rootless containers, but with some limitations
Storage DriversFlexible, similar to DockerSupports overlay2, fuse-overlayfs, btrfs, vfs
Cgroup SupportCompatible with cgroup v2Requires cgroup v2 for rootless mode
Extensions/ToolsSupports Docker Compose; compatible with Docker toolsOffers Docker Compose, Docker Swarm
Kubernetes IntegrationCompatible with Kubernetes; generates Kubernetes YAMLDirect integration with Kubernetes environments
Container OrchestrationCompatible with Kubernetes but no native tool like SwarmDocker Swarm for container orchestration
Container ImagesHandles Docker images; no central daemon for imagesManages Docker images via Docker daemon
Root PrivilegesContainers run as non-root usersContainers typically require root privileges
Network NamespacingNetwork namespaced inside RootlessKitIP address is reachable from the host
Limitations in Rootless ModeFewer limitations compared to DockerLimited storage drivers, no AppArmor, no checkpoint, etc.
SELinux SupportRequires appropriate SELinux labels for volumesSimilar SELinux considerations as Podman
Popularity/CommunityGrowing user base, less extensive than DockerLarger community, extensive documentation
Use CasesPreferred for security-focused and rootless operationsWidely used for its comprehensive tools and ecosystem
Comparing Podman vs Docker

1. Docker Daemon vs Podman Daemonless Design

Docker operates using a client-server architecture where the Docker daemon runs as a root user. This Docker daemon creates, runs, and manages Docker containers. When compared to Docker, Podman adopts a daemonless model. 

This allows it to operate containers without a root daemon. When looking at both engines from a security perspective, Podman’s design offers a significant advantage since running as a root daemon can be a vulnerability. It instead runs these in user namespaces. However, Podman pods can still include the dependencies in the pods needed to run your application.

Security: Rootless Containers in Focus

It is interesting to note that Docker also supports rootless containers but with limitations. Implementing rootless containers minimizes the risk of unauthorized root-level access to the host system. Podman does not run pods using a daemon requiring root access, so it uses fewer resources. A developer who is security conscious will understand the benefits of minimizing the ways an attacker can compromise the system. Eliminating the need for root is a big win for a higher security standard.

In rootless mode, Docker has certain limitations that users should be aware of. The below is summarized from: Run the Docker daemon as a non-root user (Rootless mode) | Docker Docs.

These constraints primarily revolve around storage drivers, cgroup support, and specific feature support. In rootless mode, Docker’s storage driver support is limited to:

  • overlay2: This is only supported if you’re running on a kernel version 5.11 or later, or using an Ubuntu-flavored kernel.
  • fuse-overlayfs: Requires kernel version 4.18 or later, and the installation of fuse-overlayfs.
  • btrfs: Supported on kernel version 4.18 or later, or if ~/.local/share/docker is mounted with the user_subvol_rm_allowed mount option.
  • vfs: This driver is also supported in rootless mode.

Cgroup Support

  • Cgroup functionality is available only with cgroup version 2 and when using systemd. This is particularly relevant for limiting resources in Docker containers.

Non-Supported Features in Rootless Mode

There are several features not supported in rootless mode:

  • AppArmor: Security features provided by AppArmor are not available.
  • Checkpoint: The ability to checkpoint and restore containers is not supported.
  • Overlay Network: Overlay networks cannot be utilized in this mode.
  • Exposing SCTP Ports: SCTP port exposure is not an option.
  • Ping Command: To use the ping command, specific routing adjustments are necessary.
  • Exposing Privileged TCP/UDP Ports: For ports under 1024, there are additional steps required for exposure.
  • Internal IPAddress: The IP address shown in docker inspect is confined within RootlessKit’s network namespace, making it inaccessible from the host without specific network namespace entry commands.
  • Host Network: The –net=host option is also limited to RootlessKit’s namespace.
  • NFS Mounts: Using NFS mounts as the Docker data-root is incompatible with rootless mode, though this is not exclusive to the rootless operation.

Interestingly, when using Podman on a host with SELinux enabled, container processes are confined within the system_u:system_r:container_t:s0 SE Linux domain standard. For containers to access volumes, these volumes must have suitable SELinux labels. With this point, containers will be unable to access these volumes if the labels are not correctly set. 

2. Interoperability with Podman vs Docker

A key aspect of container management is orchestrating multi-container applications. Docker Compose, a tool for defining and running multi-container Docker applications, is widely used. Podman supports Docker Compose code syntax and Docker commands in the CLI.

Managing Containers with Docker Swarm and Podman

Docker Swarm, Docker’s native clustering and scheduling tool, is not supported by Podman to manage containers across multiple hosts. Podman is compatible with Kubernetes and even Kubernetes manifest files to run applications. Kubernetes is arguably the more popular container orchestration tool. Podman’s support of Kubernetes (Minikube integration and others) as well as the ability to create “pods” of containers that closely aligns with Kubernetes is a great benefit.

3. Building Container Images

Both Docker and Podman deal with container images. Building your own container images allows you to customize containers for your needs. Then, you can create containers using the custom image. Docker images are stored in Docker Hub by default but can work with other registries. 

When comparing Podman, it can work with images from any container registry. Building and managing these images are similar but differ subtly in syntax and workflow.

Container Creation and Image Building

Docker uses Dockerfiles to build a container image. Podman uses Containerfiles, as they call them. The syntax for the Containerfile is exactly the same internally in the file. The process involves specifying the base image, adding necessary files, and defining commands. 

Building containers with either tool is straightforward, but Podman offers the added benefit of doing this without needing a daemon.

4. Run Containers with Podman vs Docker

Running containers effectively is a basic requirement for either Podman or Docker in development and production environments. The Docker daemon runs Docker containers, while Podman runs containers directly as child processes of the Podman process. 

One of the smart things the developers of Podman have done is made the syntax basically the same as Docker, so you have drop-in replacements for the commands used in Docker for Podman. 

Using standard commands like podman pspodman run, and podman inspect, do what you would expect them to do as an equivalent for Docker. Below we are running a new Podman pod using the example podman hello container.

Running a pod in podman
Running a pod in podman

Root Privileges and User Permissions

One of the key differences lies in how Docker and Podman handle user permissions. Dockerโ€™s model often requires root privileges, which can pose security risks. Podman addresses this by enabling containers to run as non-root users, thus providing an added layer of security.

5. Podman vs Docker extensions

Docker and Podman both have extensions. Docker Desktop contains many extensions as part of the Docker Desktop tool. This allows extending Docker with new and cool functionality from third-party solutions. You can install tools like Headlamp and Kubescape to name a couple.

The Docker extensions catalog is extensive and contains many extensions you can add to your Docker Desktop installation.

Docker desktop extensions
Docker desktop extensions

Podman on the other hand also has extensions that allow extending its functionality. Unlike Docker, some of the core functionality you can add with extensions allows Podman to run other types of containers like Docker container runtime, Minikube, Openshift and others from the Podman interface.

Podman desktop extensions
Podman desktop extensions

As you would expect, the extensions catalog for Podman is a lot smaller than the one with Docker. Docker has been around “forever” in computer years compared to Podman, so it is expected to see more extensions for Docker. 

6. Kubernetes features

Both Docker and Podman have strong Kubernetes features built into their interfaces. With Docker, you can run Kubernetes mode natively as part of Docker Desktop. You can reset the cluster and manage other aspects of the configuration from the Docker Desktop program.

Running kubernetes in docker desktop
Running kubernetes in docker desktop

Podman also has extensions like Minikube, Kind, and others you can take advantage of. Also, Podman, by its nature, can run “pods”, hence the name. With Podman, you can group containers together into pods that share the same network connection, etc, making these more efficient. Podman I think gives you the Kubernetes feel more than Docker.

Podman kubernetes capabilities
Podman kubernetes capabilities

7. Future of Podman and Docker

As containerization continues to evolve, Docker and Podman are two of the most popular. Docker is the 800 lb gorilla in the room with an extensive community and comprehensive suite of tools in the ecosystem to build and run software in your environment. This makes it a popular choice for app deployment.

However, Podman’s approach to security and daemonless architecture is gaining ground as security continues to be at the forefront of everyone’s mind. Since the Docker documentation can be easily carried over to Podman projects, for this reason, the barrier to entry is low.

Installing Podman

Since most are probably familiar with installing and configuring Docker Desktop, let’s look at how to install the Podman Desktop product, which is the equivalent solution in the Podman world to the Docker GUI tool for local development.

You can download the Podman Desktop binary from the official Podman download page here: https://podman-desktop.io/downloads.

Also, for the Windows operating system you can now use the winget tool to install Podman Desktop. Use the following winget command:winget install -e –id RedHat.Podman-Desktop

Using winget to install podman desktop
Using winget to install podman desktop

Initial configuration of Podman desktop

After you install Podman desktop, there is some initial configuration you will need to perform.

Welcome to podman desktop
Welcome to podman desktop

You can click the Set up button to begin the prerequisites check and configuration of Podman.

Set up podman desktop
Set up podman desktop

Podman desktop requires the underlying Podman to be installed. If it doesn’t find it, it will prompt you to install it from the Podman Desktop GUI. Click Next.

Begin installing podman in podman desktop
Begin installing podman in podman desktop

Overcoming an error when installing Podman from Podman Desktop

One of the interesting things I ran into was the prerequisites check saw WSL2 but had an issue with the WSL check. This is noted in the following GitHub bug for the project: Podman Desktop setup failed on requirement check: WSL version should be >= 1.2.5. ยท Issue #4982 ยท containers/podman-desktop ยท GitHub. The workaround is to install Podman manually from the official GitHub releases page here: Releases ยท containers/podman ยท GitHub.

Cant find wsl in podman installation
Cant find wsl in podman installation

After manually downloading the Podman installer, I step through the installation.

Manually installing podman
Manually installing podman

Podman is now successfully installed.

Manual podman installation completes successfully
Manual podman installation completes successfully

Initializing and starting Podman

Now, we can run the initialize and start from the Podman Desktop.

Initialize and start podman
Initialize and start podman

Podman is now running. It will display the featured extensions for Podman.

Podman extensions displayed after installation
Podman extensions displayed after installation

Podman vs Docker: The Verdict

Podman is a great alternative to Docker, especially when security is front and center. While Docker can also be secure, Podman makes this more of a default with the rootless nature of the solution and the lack of a daemon being required. This helps to minimize the attack surface, as we have discussed in this article.

All in all though, Docker is still hard to beat for development, running services, and doing all the things we know and love to do with it. The maturity and wide scope of Docker are hard to beat when you are looking for a way to have the easiest approach possible and use a solution that has maturity behind it. Podman has definitely matured a lot over the past couple of years. Ultimately, it comes down to your priorities and what you are looking to do.

Subscribe to VirtualizationHowto via Email ๐Ÿ””

Enter your email address to subscribe to this blog and receive notifications of new posts by email.



Brandon Lee

Brandon Lee is the Senior Writer, Engineer and owner at Virtualizationhowto.com, and a 7-time VMware vExpert, with over two decades of experience in Information Technology. Having worked for numerous Fortune 500 companies as well as in various industries, He has extensive experience in various IT segments and is a strong advocate for open source technologies. Brandon holds many industry certifications, loves the outdoors and spending time with family. Also, he goes through the effort of testing and troubleshooting issues, so you don't have to.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.