Shameless self-plug here. I wrote a blog post to document my methodology after having some issues with publicly available examples of using Podman and traefik in a best-practices config. Hopefully this finds the one other person that was in my shoes and helps them out. Super happy for feedback if others care to share.

  • deadcatbounce@reddthat.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    19 hours ago

    I’m not criticising you. I cannot validity criticise you, even if I was so inclined (I’m not), because I cannot proficiently grasp the subject matter. I would like to understand, NOT criticise. You’ve written an engaging piece which is opaque to me; apparently a contradiction. Hopefully I’ve rephrased that enough times to get across that no criticism is intended. 😁

    I don’t know the product names. I don’t tend to be focused on product names because they come and go. Your first message didn’t help me.

    Your last precis is just what I needed. Ideal. Thank-you. I now know what you’re trying to achieve.

    • StarkZarn@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      16 hours ago

      Awesome! Thanks for the banter. It’s easy to get stuck in your own echo chamber working IT every day, so it’s nice to have these kinds of questions. Feel free to drop anything into comments too, maybe other readers will benefit too!