Managing Containers and Providing Secure Access to You Own ChatGPT Interface

A guide on managing containers with podman and providing secure web access using traefik. The second of three parts in the series to a working remotely accessible ChatGPT alternative.
devops
llm
cloud
ai
containers
https
web
Author
Affiliation

miah0x41

Published

March 22, 2025

Modified

March 22, 2025

The Hetzner logo on the backdrop of a green mountain and low clouds.

The following guide is the second of a three part series to create a working ChatGPT alternative. The series will cover:

The purpose of this guide is the installation and setup of podman to manage containers including traefik to provide secure web access over HyperText Transfer Protocol Secure (HTTPS). In addition, building from Part 1 how to provide additional security using the Hetzner firewall.

Linux Containers

Containers [1] (e.g. Docker) are lightweight and portable, sharing the host kernel to optimize resource efficiency. They encapsulate software and dependencies for consistent runtime across environments, excelling in CI/CD, web apps, and development.

MicroVMs [2] (e.g. Firecracker) provide stronger isolation by running applications in dedicated Virtual Machines (VMs), combining security with lightweight and fast boot times, ideal for high-security or untrusted workloads.

Hybrid approaches like Kata Containers [3] merge containers and microVMs, offering the portability and speed of containers within a VM for enhanced security, suitable for cloud-native apps requiring both agility and protection.

What is Docker?

When we think of Hoover or Dyson, we often associate those brand names with the general concept of vacuum cleaners. Similarly, Docker has become synonymous with containerization, encompassing a suite of tools and technologies that streamline application development and deployment.

Docker is an open-source platform that enables developers to package applications and their dependencies into standardized units called containers [1]. These containers can then run consistently across any environment.

Key Docker Components:

  • Docker Daemon (dockerd): This is the background service that manages Docker images, containers, networks, and storage volumes
  • Docker Client (docker): This is the command-line interface (CLI) that users interact with to issue commands to the Docker daemon.
  • Docker Images: These are read-only templates that contain multiple layers of applications.
  • Docker Containers: These are runnable instances of Docker images. They are isolated environments that contain everything needed to run an application using the hosts kernel.
  • Docker Registry: This is a storage and distribution system for Docker images. Docker Hub is a public registry, while private registries can also be set up.
  • Dockerfiles: These are text documents that contain all the commands a user could call on the command line to assemble an image.
  • Docker Compose (docker-compose): A tool for defining and running multi-container Docker applications.
  • Docker Desktop: An application for Mac and Windows that provides an easy way to run Docker on user desktops.
  • Docker Networks: These enable communication between Docker containers typically by modifying iptables and local routes on Linux hosts.
  • Docker Volumes: These provide persistent storage for Docker containers.

The list above is incomplete and doesn’t include tools such as BuildKit used to create container images.

What is Podman?

Podman [4] is a daemonless, open-source containerization tool designed to offer a more secure and efficient alternative to Docker. It allows users to run containers and pods [5] (as in Kubernetes [6] compatible multiple containers) without the need for a central daemon.

It’s key advantages over docker are:

  1. Daemonless Architecture: Unlike Docker, which relies on a central daemon, podman operates without one, eliminating a single point of failure and enhancing security by reducing potential attack surfaces.
  2. Rootless Containers: podman simplifies running containers without root (or admin) privileges. This improves security by minimizing the risk of system-wide impact from container vulnerabilities.
  3. Compatibility with Docker: podman is compatible with Docker’s API and container images, allowing users to use existing Dockerfiles and commands with minimal adaptation.
  4. Native systemd Integration: podman integrates smoothly with systemd providing a native, single host container orchestration.

Installing Podman

Log in to your Hetzner server and run the following commands to install podman:

# Update the package list
sudo apt update

[sudo] password for charlie:
Hit:1 https://mirror.hetzner.com/ubuntu/packages noble InRelease
Get:2 https://mirror.hetzner.com/ubuntu/packages noble-updates InRelease [126 kB]
Get:3 https://mirror.hetzner.com/ubuntu/packages noble-backports InRelease [126 kB]
Get:4 https://mirror.hetzner.com/ubuntu/security noble-security InRelease [126 kB]
Fetched 378 kB in 1s (562 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
All packages are up-to-date.

# Install podman
sudo apt install podman podman-compose

Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages were automatically installed and are no longer required:
  hwdata linux-tools-common
Use 'sudo apt autoremove' to remove them.
The following additional packages will be installed:
  aardvark-dns buildah catatonit conmon containernetworking-plugins crun fuse-overlayfs golang-github-containers-common podman-compose python3-dotenv
  golang-github-containers-image libgpgme11t64 libslirp0 libsubid4 libyajl2 netavark passt slirp4netns uidmap
Suggested packages:
  containers-storage libwasmedge0 docker-compose
The following NEW packages will be installed
  aardvark-dns buildah catatonit conmon containernetworking-plugins crun fuse-overlayfs golang-github-containers-common
  golang-github-containers-image libgpgme11t64 libslirp0 libsubid4 libyajl2 netavark passt podman slirp4netns uidmap
0 to upgrade, 18 to newly install, 0 to remove and 0 not to upgrade.
Need to get 32.6 MB of archives.
After this operation, 132 MB of additional disk space will be used.
Do you want to continue? [Y/n]

<snip>

Scanning processes...
Scanning Linux images...

Running kernel seems to be up-to-date.

No services need to be restarted.

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.

# Confirm the tool has been installed
podman version

Client:       Podman Engine
Version:      4.9.3
API Version:  4.9.3
Go Version:   go1.22.2
Built:        Thu Jan  1 00:00:00 1970
OS/Arch:      linux/amd64

Unlike docker the podman tool requires full paths to pull images; for Docker Hub this is usually docker.io/library/<image>. As per the Tutorial we can use the nginx image to test our installation, note that we are running the command as a normal user without the use of sudo or other admin rights:

# Pull and run the nginx image as a container called basic_httpd
podman run --name basic_httpd -dt -p 8080:80/tcp docker.io/nginx

Trying to pull docker.io/library/nginx:latest...
Getting image source signatures
Copying blob 943ea0f0c2e4 done   |
Copying blob 7cf63256a31a done   |
Copying blob 513c3649bb14 done   |
Copying blob bf9acace214a done   |
Copying blob d014f92d532d done   |
Copying blob 9dd21ad5a4a6 done   |
Copying blob 103f50cb3e9f done   |
Copying config b52e0b094b done   |
Writing manifest to image destination
b1debf9897d38efc65b4be712b3467a275ae5e301b38c6bd120ab7ce98f1b291

# Check the status of the container
podman ps

CONTAINER ID  IMAGE                           COMMAND               CREATED        STATUS        PORTS                 NAMES
b1debf9897d3  docker.io/library/nginx:latest  nginx -g daemon o...  7 seconds ago  Up 7 seconds  0.0.0.0:8080->80/tcp  basic_httpd

The nginx container is now running and accessible on port 8080 of the server. To check the container is running correctly we can use curl to access the server. Note that Nginx is both a web server and a reverse proxy. The PORTS section shows the IP address as 0.0.0.0 which means it’s open to all networking interfaces on the server with a port of 8080. This is mapped internally in the container as port 80 which is the default port for the nginx web server.

Conduct two tests via two terminals. Run the first on the cloud server and use the IP address of 127.0.0.1, which is a way of saying localhost. The second test is from your local machine using the server’s public IP address:

Run the following command on the cloud server:

# Check access to the container using curl
curl 127.0.0.1:8080

<!DOCTYPE html>
<html>
<head>
<title>Welcome to nginx!</title>
<style>
html { color-scheme: light dark; }
body { width: 35em; margin: 0 auto;
font-family: Tahoma, Verdana, Arial, sans-serif; }
</style>
</head>
<body>
<h1>Welcome to nginx!</h1>
<p>If you see this page, the nginx web server is successfully installed and
working. Further configuration is required.</p>

<p>For online documentation and support please refer to
<a href="http://nginx.org/">nginx.org</a>.<br/>
Commercial support is available at
<a href="http://nginx.com/">nginx.com</a>.</p>

<p><em>Thank you for using nginx.</em></p>
</body>
</html>

Run the following command on your local machine:

# Check access to the container using curl
curl 159.77.77.207:8080

<!DOCTYPE html>
<html>
<head>
<title>Welcome to nginx!</title>
<style>
html { color-scheme: light dark; }
body { width: 35em; margin: 0 auto;
font-family: Tahoma, Verdana, Arial, sans-serif; }
</style>
</head>
<body>
<h1>Welcome to nginx!</h1>
<p>If you see this page, the nginx web server is successfully installed and
working. Further configuration is required.</p>

<p>For online documentation and support please refer to
<a href="http://nginx.org/">nginx.org</a>.<br/>
Commercial support is available at
<a href="http://nginx.com/">nginx.com</a>.</p>

<p><em>Thank you for using nginx.</em></p>
</body>
</html>

Note both outputs are the same, this is because the nginx container is running on the cloud server and accessible from both the server and your local machine. The next step is to install traefik to provide secure access over HTTPS.

Traefik

Introduction

Traefik [7] is an open-source, modern reverse-proxy, and load balancing tool designed to simplify the management of containerized applications. This makes it effective routing traffic to the appropriate application running typically in containers and balancing the load across all available nodes.

It dynamically routes incoming HyperText Transport Protocol (HTTP) requests to appropriate services, eliminating the need for manual port management. Traefik integrates seamlessly with container orchestration tools like Kubernetes, Docker Swarm and Podman, automatically discovering containers and updating its configurations accordingly. This uses the native features of these orchestration tools such as labels. This means the user can set the routing configuration directly in the container orchestration declarative file such as a docker-compose.yml or a pod definition.

It also supports automation of Let’s Encrypt [8] SSL/TLS certificates, ensuring secure communication. Essentially, Traefik acts as a bridge between the internet and containerized applications, enhancing security, efficiency, and ease of use in managing application traffic.

The guide is based on the excellent blog by Chris Hudson [9] but adapted to be more file based using the docker-compose format.

Prerequisites

Enable the socket for podman to provide API [10] access to traefik:

# Start the socket
systemctl --user start podman.socket

# Auto start the socker by enabling it
systemctl --user enable podman.socket

Created symlink /home/charlie/.config/systemd/user/sockets.target.wants/podman.socket → /usr/lib/systemd/user/graphical-session-pre.target.wants/

# Check its status
systemctl --user status podman.socket

 podman.socket - Podman API Socket
     Loaded: loaded (/usr/lib/systemd/user/podman.socket; enabled; preset: enabled)
     Active: active (listening) since Mon 2025-03-10 21:29:17 UTC; 31s ago
   Triggers: ● podman.service
       Docs: man:podman-system-service(1)
     Listen: /run/user/1000/podman/podman.sock (Stream)
     CGroup: /user.slice/user-1000.slice/[email protected]/app.slice/podman.socket

Mar 10 21:29:17 chatty-cheetah systemd[5736]: Listening on podman.socket - Podman AP>

Note next to the key Loaded it states enabled and next to the key Active it states active demonstrating the socket is working.

Host Setup

Port Access

Typically for HTTPS traffic the default port is 443, however on Linux insallations ports below 1024 are reserved for the root user. To avoid running traefik as root we need to provide unprivileged users to bind privileged ports. This can be done by modifying the Linux kernel using the sysctl tool as a root user or the sudo command:

# Set the start of unprivileged ports to 443 for this session
sudo sysctl net.ipv4.ip_unprivileged_port_start=443

[sudo] password for charlie:
net.ipv4.ip_unprivileged_port_start = 443

# Set the same setting permanently
echo "net.ipv4.ip_unprivileged_port_start=443" | sudo tee /etc/sysctl.d/user_priv_ports.conf

net.ipv4.ip_unprivileged_port_start=443

# Verify changes for current session
sudo sysctl net.ipv4.ip_unprivileged_port_start

net.ipv4.ip_unprivileged_port_start = 443

# Verify changes for permanent settings
sudo cat /proc/sys/net/ipv4/ip_unprivileged_port_start

443

SSL/TLS Certificates

Create a directory to store the settings for engaging with Lets Encrypt and creating an empty file for the acme.json file:

TODO: Lets Encrypt service definition.

# Create directory
mkdir traefik && cd traefik

# Create acme file
touch acme.json

# Change permissions
chmod 600 acme.json

Domain Name Service (DNS) Records

The Domain Name Service (DNS) converts a domain like example.com into an IP address using nameservers. These are for configured typically by your domain provider unless you have opted for another service or party to manage them on your behalf. For example, it’s common when using third-part Content Delivery Networks (CDNs) like Cloudflare [11] or Akamai [12] to manage the DNS records for you.

The DNS records for the domain name must be set to the public IP address of the server. The traefik service will then map the domain to the container. Each domain provider has its own method (and help guide) but if using an IPv4 address then an A record is required; for IPv6 an AAAA record is required.

Confirm DNS records have been set using the dig tool or a public DNS lookup service as those from Google’s Admin Toolbox [13]:

# Check latest DNS records
dig dandy.rootinsights.io

; <<>> DiG 9.18.30-0ubuntu0.24.04.2-Ubuntu <<>> dandy.rootinsights.io
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21030
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;dandy.rootinsights.io.         IN      A

;; ANSWER SECTION:
dandy.rootinsights.io.  300     IN      A       159.77.77.207

;; Query time: 25 msec
;; SERVER: 127.0.0.53#53(127.0.0.53) (UDP)
;; WHEN: Mon Mar 10 22:10:30 UTC 2025
;; MSG SIZE  rcvd: 66

Configure and Launch Traefik

Use the following docker-compose file:

version: '3'

services:
  traefik:
    image: docker.io/library/traefik:latest
    container_name: traefik
    restart: unless-stopped
    networks:
      - podman
    security_opt:
      - label=type:container_runtime_t
    volumes:
1      - /run/user/<user_id>/podman/podman.sock:/var/run/docker.sock:z
2      - ./acme.json:/acme.json:z
    ports:
      - "443:443"
    command:
      - --api.dashboard=true
      - --api.insecure=true
3      - --certificatesresolvers.lets-encrypt.acme.email=<email_address>
      - --certificatesresolvers.lets-encrypt.acme.storage=/acme.json
      - --certificatesresolvers.lets-encrypt.acme.tlschallenge=true
      - --entrypoints.https.address=:443
      - --providers.docker=true
    labels:
      # Dashboard router
      - "traefik.enable=true"
4      - "traefik.http.routers.dashboard.rule=Host(`dandy.rootinsights.io`)"
      - "traefik.http.routers.dashboard.entrypoints=https"
      - "traefik.http.routers.dashboard.service=api@internal"
      - "traefik.http.routers.dashboard.tls=true"
      - "traefik.http.routers.dashboard.tls.certresolver=lets-encrypt"

networks:
  podman:
    external: true
1
Enter the user id (obtained by running id <username>) in the path.
2
Map the internal file name for the Lets Encrypt service (left hand side) to the container file name.
3
Enter a valid email address for the Lets Encrypt service.
4
Specify the domain name for the dashboard.
Entry Points

There key variable needed to ensure other containers can utilise traefik effectively is the entrypoints variable, in this instance called https. If this is changed to say websecure then it must be propergated through all the container definitions.

In order for the domain to map to the container, the Domain Name System (DNS) record must be set to the public IP address of the server. The traefik service will then map the domain to the container. Each domain provider has its own method (and help guide) but if using an IPv4 address then an A record is required; for IPv6 an AAAA record is required.

Run the file as an unprivileged user (note no use of the sudo command):

# Run and test compose file
podman compose up

>>>> Executing external compose provider "/usr/bin/podman-compose". Please refer to the documentation for details. <<<<

podman-compose version: 1.0.6
['podman', '--version', '']
using podman version: 4.9.3
** excluding:  set()
['podman', 'ps', '--filter', 'label=io.podman.compose.project=traefik', '-a', '--format', '{{ index .Labels "io.podman.compose.config-hash"}}']
recreating: ...
** excluding:  set()
podman stop -t 10 traefik
traefik
exit code: 0
podman rm traefik
traefik
exit code: 0
recreating: done


['podman', 'network', 'exists', 'podman']
podman create --name=traefik --security-opt label=type:container_runtime_t --label traefik.enable=true --label traefik.http.routers.dashboard.rule=Host(`dandy.rootinsights.io`) --label traefik.http.routers.dashboard.entrypoints=https --label traefik.http.routers.dashboard.service=api@internal --label traefik.http.routers.dashboard.tls=true --label traefik.http.routers.dashboard.tls.certresolver=lets-encrypt --label io.podman.compose.config-hash=904074c0fd852603ab5c1af81afb3ae06b336bdadc172722f58f574ea229cc37 --label io.podman.compose.project=traefik --label io.podman.compose.version=1.0.6 --label [email protected] --label com.docker.compose.project=traefik --label com.docker.compose.project.working_dir=/home/charlie/traefik --label com.docker.compose.project.config_files=docker-compose.yml --label com.docker.compose.container-number=1 --label com.docker.compose.service=traefik -v /run/user/1000/podman/podman.sock:/var/run/docker.sock:z -v /home/charlie/traefik/acme.json:/acme.json:z --net podman --network-alias traefik -p 443:443 --restart unless-stopped docker.io/library/traefik:latest --api.dashboard=true --api.insecure=true --certificatesresolvers.lets-encrypt.acme.email=<email_address> --certificatesresolvers.lets-encrypt.acme.storage=/acme.json --certificatesresolvers.lets-encrypt.acme.tlschallenge=true --entrypoints.https.address=:443 --providers.docker=true
4afe8390a3f8da692167e229889810347354e3a19b16d964f466515cf650dd45
exit code: 0
podman start -a traefik
[traefik] | 2025-03-10T22:19:24Z ERR error="service \"basic-httpd\" error: unable to
find the IP address for the container \"/basic_httpd\": the server is ignored" container=basic-httpd-b1debf9897d38efc65b4be712b3467a275ae5e301b38c6bd120ab7ce98f1b291 providerName=docker

In another terminal check the status of the traefik container:

# List running containers
podman ps

CONTAINER ID  IMAGE                             COMMAND               CREATED         STATUS         PORTS                 NAMES
d67e4ad68c7d  docker.io/library/traefik:latest  --api.dashboard=t...  31 seconds ago  Up 30 seconds  0.0.0.0:443->443/tcp  traefik

We can now access the dashabord via the domain name we specified earlier:

Traefik Dashboard

Press Ctrl-C to stop the container running in the foreground and remove the existing container as we intend to use the same name:

# Kill current container
^CTraceback (most recent call last):
  File "/usr/bin/podman-compose", line 33, in <module>
sys.exit(load_entry_point('podman-compose==1.0.6', 'console_scripts', 'podman-compose')())
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/podman_compose.py", line 2941, in main
    podman_compose.run()
  File "/usr/lib/python3/dist-packages/podman_compose.py", line 1423, in run
    cmd(self, args)
  File "/usr/lib/python3/dist-packages/podman_compose.py", line 1754, in wrapped
    return func(*args, **kw)
           ^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3/dist-packages/podman_compose.py", line 2117, in compose_up
    thread.join(timeout=1.0)
  File "/usr/lib/python3.12/threading.py", line 1151, in join
    self._wait_for_tstate_lock(timeout=max(timeout, 0))
  File "/usr/lib/python3.12/threading.py", line 1167, in _wait_for_tstate_lock
    if lock.acquire(block, timeout):
       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
KeyboardInterrupt
Error: unable to start container d67e4ad68c7d0bb0203419c1cb99ae9fe295d5805f57bd5fd25bdcda17d5f234: attaching to container d67e4ad68c7d0bb0203419c1cb99ae9fe295d5805f57bd5fd25bdcda17d5f234: write /dev/stdout: broken pipe

# Check if container is running
podman ps

CONTAINER ID  IMAGE                             COMMAND               CREATED        STATUS             PORTS                 NAMES
d67e4ad68c7d  docker.io/library/traefik:latest  --api.dashboard=t...  9 minutes ago  Up About a minute  0.0.0.0:443->443/tcp  traefik

# Stop the container
podman stop traefik

traefik

# List previously run containers
podman ps -a

CONTAINER ID  IMAGE                             COMMAND               CREATED        STATUS                 PORTS
 NAMES
b1debf9897d3  docker.io/library/nginx:latest    nginx -g daemon o...  5 days ago     Exited (0) 5 days ago  0.0.0.0:8080->80/tcp
 basic_httpd
d67e4ad68c7d  docker.io/library/traefik:latest  --api.dashboard=t...  8 minutes ago  Up 45 seconds          0.0.0.0:443->443/tcp
 traefik

# Remove container `traefik`
podman container rm traefik

traefik

We can now rerun the compose file and the containers within in the background as a process daemon with the -d flag:

# Run the compose file in the background
podman compose up -d

>>>> Executing external compose provider "/usr/bin/podman-compose". Please refer to the documentation for details. <<<<

podman-compose version: 1.0.6
['podman', '--version', '']
using podman version: 4.9.3
** excluding:  set()
['podman', 'ps', '--filter', 'label=io.podman.compose.project=traefik', '-a', '--format', '{{ index .Labels "io.podman.compose.config-hash"}}']
['podman', 'network', 'exists', 'podman']
podman run --name=traefik -d --security-opt label=type:container_runtime_t --label traefik.enable=true --label traefik.http.routers.dashboard.rule=Host(`dandy.rootinsights.io`) --label traefik.http.routers.dashboard.entrypoints=https --label traefik.http.routers.dashboard.service=api@internal --label traefik.http.routers.dashboard.tls=true --label traefik.http.routers.dashboard.tls.certresolver=lets-encrypt --label io.podman.compose.config-hash=904074c0fd852603ab5c1af81afb3ae06b336bdadc172722f58f574ea229cc37 --label io.podman.compose.project=traefik --label io.podman.compose.version=1.0.6 --label [email protected] --label com.docker.compose.project=traefik --label com.docker.compose.project.working_dir=/home/charlie/traefik --label com.docker.compose.project.config_files=docker-compose.yml --label com.docker.compose.container-number=1 --label com.docker.compose.service=traefik -v /run/user/1000/podman/podman.sock:/var/run/docker.sock:z -v /home/charlie/traefik/acme.json:/acme.json:z --net podman --network-alias traefik -p 443:443 --restart unless-stopped docker.io/library/traefik:latest --api.dashboard=true --api.insecure=true --certificatesresolvers.lets-encrypt.acme.email=<email_address> --certificatesresolvers.lets-encrypt.acme.storage=/acme.json --certificatesresolvers.lets-encrypt.acme.tlschallenge=true --entrypoints.https.address=:443 --providers.docker=true
b3bf470d13b549d88489649e6e2eead0952cb3b5987fa962ab990971baad62d4
exit code: 0

Test Automatic DNS Provisioning

The purpose of traefik is to automatically provision Transport Layer Security (TLS) certificates for a given domain name, secure its traffic with HTTPS and route the traffic to the correct container, just using the labels feature of a docker-compose file and therefore without any complex configuration files. We can test this with another container, typically used to confirm container management software (an there are many to choose from) called crcchek/hello-word:

# Create a new folder
mkdir ~/hello && cd ~/hello

# Copy the previous docker-compose file or create a new one
cp ../traefik/docker-compose.yml .

# Or
touch docker-compose.yml

Edit the file for the following content:

version: '3'

services:
  hello:
    image: docker.io/crccheck/hello-world
    container_name: hello
    hostname: hello.rootinsights.io
    labels:
      - traefik.enable=true
      - traefik.http.routers.hello-secure.entrypoints=https
      - traefik.http.routers.hello-secure.rule=Host(`hello.rootinsights.io`)
      - traefik.http.middlewares.hello-https-redirect.redirectscheme.scheme=https
      - traefik.http.routers.hello.middlewares=hello-https-redirect
      - traefik.http.routers.hello-secure.tls=true
      - traefik.http.routers.hello-secure.tls.certresolver=lets-encrypt
      - traefik.http.services.hello.loadbalancer.server.port=8000
Note

Ensure that you have created the DNS records for the domain name to point to the public IP address of the server i.e. hello.domain.com points to the IP address of your public server (use ip -o -4 addr show dev eth0 | awk '{print $4}' | cut -d'/' -f1).

We can test using the curl command or visiting the address directly in a web browser:

curl https://hello.rootinsights.io

<pre>
Hello World


                                       ##         .
                                 ## ## ##        ==
                              ## ## ## ## ##    ===
                           /""""""""""""""""\___/ ===
                      ~~~ {~~ ~~~~ ~~~ ~~~~ ~~ ~ /  ===- ~~~
                           \______ o          _,/
                            \      \       _,'
                             `'--.._\..--''
</pre>

We can use the dashboard to better understand the routing and security features of traefik:

Dashboard Home

The image above reiterates the name of each entry point, in this case port 443 is labelled https. We can click on the Services area to determine what containers are connected to the traefik service:

List of Services

We can further explore a given service, in this case the hello service:

Details of the Hello Service

Any error messages can be found in this section, it also shows the address and port of the container itself. The other as aspect to explore is the routers section:

Routers

Note the two green shields to indicate secure through TLS and the nature of the provider (i.e. Docker) even though we are using podman. We can select the external hello-secure@docker router to get more details:

Router Details

The diagram at the top summarises where this router sits in that it’s between the Entrypoint and the Service. Having illustrated that additional containers can be started and connected to traefik for efficient routing and secure access using HTTPS we can either disable the hello container or re-run it as a daemon.

Persistence

Whilst the host is up, the containers should keep running but what happens if there is an error and the service crashes or the host loses power or is turned off? Currently, the containers require manual intervention to restart. To automate this process we can use the systemd service manager to create a service file to start the traefik service on boot and the other containers as required.

There a number of pre-requisites to create a systemd service file:

# Check if the systemd user instance is running
systemctl --user status

 chatty-cheetah
    State: running
    Units: 153 loaded (incl. loaded aliases)
     Jobs: 0 queued
   Failed: 0 units
    Since: Sun 2025-03-16 10:10:29 UTC; 1h 41min ago
  systemd: 255.4-1ubuntu8.5
   CGroup: /user.slice/user-1000.slice/[email protected]
           ├─app.slice
            └─podman.service
              └─21406 /usr/bin/podman --log-level=info system service
           ├─init.scope
            ├─20405 /usr/lib/systemd/systemd --user
            └─20406 "(sd-pam)"
           ├─session.slice
            └─dbus.service
              └─20593 /usr/bin/dbus-daemon --session --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
           └─user.slice
             ├─libpod-b3bf470d13b549d88489649e6e2eead0952cb3b5987fa962ab990971baad62d4.scope
              └─container
                └─21393 traefik traefik --api.dashboard=true --api.insecure=true --certificatesresolvers.lets-encrypt.acme.emai>
             ├─libpod-conmon-b3bf470d13b549d88489649e6e2eead0952cb3b5987fa962ab990971baad62d4.scope
              └─21391 /usr/bin/conmon --api-version 1 -c b3bf470d13b549d88489649e6e2eead0952cb3b5987fa962ab990971baad62d4 -u b3>
             ├─podman-21316.scope
              ├─21378 rootlessport
              └─21383 rootlessport-child
             ├─podman-pause-7e7badf0.scope
              └─20581 catatonit -P
             └─rootless-netns-72e6d007.scope
               └─21328 /usr/bin/slirp4netns --disable-host-loopback --mtu=65520 --enable-sandbox --enable-seccomp --enable-ipv6 >

# Check podman is running rootless i.e. as unprivileged user
podman info

The are some guides on how to use the podman tool with systemd most notably from its authors, Red Hat [14] but the documentation is out of date. The current approach is use a declarative file format to generate the systemd unit files using a technology called a quadlet introduced by Dan Walsh in a blog post for podman 4.4 [15].

Let’s start with the traeik container. Usin the now deprecated podman generate systemd command we can create a systemd unit file:

# Generate a systemd unit file for the traefik container
podman generate systemd --name traefik --new --restart-policy=always > ~/.config/systemd/user/traefik.service

DEPRECATED command:
It is recommended to use Quadlets for running containers and pods under systemd.

Please refer to podman-systemd.unit(5) for details.

# Check contents of systemd file
cat ~/.config/systemd/user/traefik.service

# container-traefik.service
# autogenerated by Podman 4.9.3
# Sun Mar 16 14:31:03 UTC 2025

[Unit]
Description=Podman container-traefik.service
Documentation=man:podman-generate-systemd(1)
Wants=network-online.target
After=network-online.target
RequiresMountsFor=%t/containers

[Service]
Environment=PODMAN_SYSTEMD_UNIT=%n
Restart=always
TimeoutStopSec=70
ExecStart=/usr/bin/podman run \
        --cidfile=%t/%n.ctr-id \
        --cgroups=no-conmon \
        --rm \
        --sdnotify=conmon \
        --replace \
        --name=traefik \
        -d \
        --security-opt label=type:container_runtime_t \
        --label traefik.enable=true \
        --label traefik.http.routers.dashboard.rule=Host(`dandy.rootinsights.io`) \
        --label traefik.http.routers.dashboard.entrypoints=https \
        --label traefik.http.routers.dashboard.service=api@internal \
        --label traefik.http.routers.dashboard.tls=true \
        --label traefik.http.routers.dashboard.tls.certresolver=lets-encrypt \
        --label io.podman.compose.config-hash=904074c0fd852603ab5c1af81afb3ae06b336bdadc172722f58f574ea229cc37 \
        --label io.podman.compose.project=traefik \
        --label io.podman.compose.version=1.0.6 \
        --label [email protected] \
        --label com.docker.compose.project=traefik \
        --label com.docker.compose.project.working_dir=/home/charlie/traefik \
        --label com.docker.compose.project.config_files=docker-compose.yml \
        --label com.docker.compose.container-number=1 \
        --label com.docker.compose.service=traefik \
        -v /run/user/1000/podman/podman.sock:/var/run/docker.sock:z \
        -v /home/charlie/traefik/acme.json:/acme.json:z \
        --net podman \
        --network-alias traefik \
        -p 443:443 docker.io/library/traefik:latest \
        --api.dashboard=true \
        --api.insecure=true \
        --certificatesresolvers.lets-encrypt.acme.email=<email_address> \
        --certificatesresolvers.lets-encrypt.acme.storage=/acme.json \
        --certificatesresolvers.lets-encrypt.acme.tlschallenge=true \
        --entrypoints.https.address=:443 \
        --providers.docker=true
ExecStop=/usr/bin/podman stop \
        --ignore -t 10 \
        --cidfile=%t/%n.ctr-id
ExecStopPost=/usr/bin/podman rm \
        -f \
        --ignore -t 10 \
        --cidfile=%t/%n.ctr-id
Type=notify
NotifyAccess=all

[Install]
WantedBy=default.target

The flag -new is intended to create the container if it doesn’t already exist and most importantly the flag --name is for identifying an existing container to manage. Check the status of the new service:

# Check the status of the traefik service
systemctl --user status traefik.service

 traefik.service - Podman container-traefik.service
     Loaded: loaded (/home/charlie/.config/systemd/user/traefik.service; disabled; preset: enabled)
     Active: inactive (dead)
       Docs: man:podman-generate-systemd(1)

# Start it
systemctl --user start traefik.service

# Check status
systemctl --user status traefik.service

 traefik.service - Podman container-traefik.service
     Loaded: loaded (/home/charlie/.config/systemd/user/traefik.service; disabled; preset: enabled)
     Active: active (running) since Sun 2025-03-16 14:39:04 UTC; 2s ago
       Docs: man:podman-generate-systemd(1)
   Main PID: 25371 (conmon)
      Tasks: 14 (limit: 4540)
     Memory: 4.8M (peak: 16.8M)
        CPU: 455ms
     CGroup: /user.slice/user-1000.slice/[email protected]/app.slice/traefik.service
             ├─25358 rootlessport
             ├─25363 rootlessport-child
             └─25371 /usr/bin/conmon --api-version 1 -c dc115a837dee0f0e4fd7ded2d41ed51a05efcb69213296a1563bf37f537596f9 -u dc11>

Mar 16 14:39:04 chatty-cheetah systemd[23709]: Starting traefik.service - Podman container-traefik.service...
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.445604615 +0000 UTC m=+0.084052690 container remove b3bf470d13>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.467599556 +0000 UTC m=+0.106047587 container create dc115a837d>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.415456823 +0000 UTC m=+0.053904849 image pull e49b83f3e049cba3>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.761482864 +0000 UTC m=+0.399930940 container init dc115a837dee>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.774941862 +0000 UTC m=+0.413389937 container start dc115a837de>
Mar 16 14:39:04 chatty-cheetah systemd[23709]: Started traefik.service - Podman container-traefik.service.
Mar 16 14:39:04 chatty-cheetah podman[25295]: dc115a837dee0f0e4fd7ded2d41ed51a05efcb69213296a1563bf37f537596f9


# Enable at boot
systemctl --user enable traefik.service

Created symlink /home/charlie/.config/systemd/user/default.target.wants/traefik.service → /home/charlie/.config/systemd/user/traefik.service.

We can test by stopping the traefik container manually:

# Stop the container
podman stop traefik

traefik

# Check status (note it has restarted)
podman ps

CONTAINER ID  IMAGE                             COMMAND               CREATED         STATUS         PORTS                 NAMES
0323b47330c0  docker.io/library/traefik:latest  --api.dashboard=t...  31 seconds ago  Up 31 seconds  0.0.0.0:443->443/tcp  traefik

# Check the journal logs
journalctl --user -u traefik.service
Mar 16 14:39:04 chatty-cheetah systemd[23709]: Starting traefik.service - Podman container-traefik.service...
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.445604615 +0000 UTC m=+0.084052690 container remove b3bf470d13>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.467599556 +0000 UTC m=+0.106047587 container create dc115a837d>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.415456823 +0000 UTC m=+0.053904849 image pull e49b83f3e049cba3>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.761482864 +0000 UTC m=+0.399930940 container init dc115a837dee>
Mar 16 14:39:04 chatty-cheetah podman[25295]: 2025-03-16 14:39:04.774941862 +0000 UTC m=+0.413389937 container start dc115a837de>
Mar 16 14:39:04 chatty-cheetah systemd[23709]: Started traefik.service - Podman container-traefik.service.
Mar 16 14:39:04 chatty-cheetah podman[25295]: dc115a837dee0f0e4fd7ded2d41ed51a05efcb69213296a1563bf37f537596f9
Mar 16 14:44:54 chatty-cheetah traefik[25371]: 2025-03-16T14:44:54Z ERR error="accept tcp [::]:8080: use of closed network conne>
Mar 16 14:44:54 chatty-cheetah traefik[25371]: 2025-03-16T14:44:54Z ERR error="close tcp [::]:8080: use of closed network connec>
Mar 16 14:44:54 chatty-cheetah traefik[25371]: 2025-03-16T14:44:54Z ERR error="accept tcp [::]:443: use of closed network connec>
Mar 16 14:44:54 chatty-cheetah traefik[25371]: 2025-03-16T14:44:54Z ERR error="close tcp [::]:443: use of closed network connect>
Mar 16 14:44:55 chatty-cheetah podman[25752]: 2025-03-16 14:44:55.625054815 +0000 UTC m=+0.297059413 container remove dc115a837d>
Mar 16 14:44:55 chatty-cheetah systemd[23709]: traefik.service: Scheduled restart job, restart counter is at 1.

Notice the last line of the log that states Scheduled restart job... For a more realistic test, we can start the hello container previously with the -d flag and then restart the host. Note that traefik is supported by the systemd, whereas the hello container has no orchestrator defined:

# Navigate to the hello directory
cd ~/hello

# Either remove existing container, amend compose file with replace flag and then start container
podman compose up -d

>>>> Executing external compose provider "/usr/bin/podman-compose". Please refer to the documentation for details. <<<<

podman-compose version: 1.0.6
['podman', '--version', '']
using podman version: 4.9.3
** excluding:  set()
['podman', 'ps', '--filter', 'label=io.podman.compose.project=hello', '-a', '--format', '{{ index .Labels "io.podman.compose.config-hash"}}']
recreating: ...
** excluding:  set()
podman stop -t 10 hello
hello
exit code: 0
podman rm hello
hello
exit code: 0
recreating: done


['podman', 'network', 'exists', 'hello_default']
podman run --name=hello -d --label traefik.enable=true --label traefik.http.routers.hello-secure.entrypoints=https --label traefik.http.routers.hello-secure.rule=Host(`hello.rootinsights.io`) --label traefik.http.middlewares.hello-https-redirect.redirectscheme.scheme=https --label traefik.http.routers.hello.middlewares=hello-https-redirect --label traefik.http.routers.hello-secure.tls=true --label traefik.http.routers.hello-secure.tls.certresolver=lets-encrypt --label traefik.http.services.hello.loadbalancer.server.port=8000 --label io.podman.compose.config-hash=6091c48699dc500027d62df90c0bed36986f668e84d4d6ab2a39d1b5c61b2eff --label io.podman.compose.project=hello --label io.podman.compose.version=1.0.6 --label [email protected] --label com.docker.compose.project=hello --label com.docker.compose.project.working_dir=/home/charlie/hello --label com.docker.compose.project.config_files=docker-compose.yml --label com.docker.compose.container-number=1 --label com.docker.compose.service=hello --net hello_default --network-alias hello --hostname hello.rootinsights.io docker.io/crccheck/hello-world
5b46ef67c505a644073f9ebf46eac3e492d3a68319700803736fddf2b8a3bbeb
exit code: 0

# Check container status
podman ps

CONTAINER ID  IMAGE                                  COMMAND               CREATED        STATUS                  PORTS
       NAMES
0323b47330c0  docker.io/library/traefik:latest       --api.dashboard=t...  8 minutes ago  Up 8 minutes            0.0.0.0:443->443/tcp  traefik
5b46ef67c505  docker.io/crccheck/hello-world:latest  /bin/sh -c echo "...  7 seconds ago  Up 8 seconds (healthy)
       hello


# Reboot the host
sudo reboot

# Post reboot check status
podman ps

CONTAINER ID  IMAGE                             COMMAND               CREATED        STATUS        PORTS                 NAMES
405cb202d1b3  docker.io/library/traefik:latest  --api.dashboard=t...  3 seconds ago  Up 3 seconds  0.0.0.0:443->443/tcp  traefik

Note that only the traefik container has been restarted; this demonstrates that the systemd unit is working as intended.

Securing Access

We saw from the earlier example with nginx that it’s possible to open a port to the public internet, which can have unintended consequences. Unfortunately, most container engines and associated management tools bypass local (as in on the host) firewall rules meaning tools such as iptables, nftables or ufw are ineffective [16].

Hetnzer provides a firewall service that can be used to secure access to the server. The service is available in the Cloud Console under the Network section. The firewall rules are applied to the public interface of the server and can be used to restrict access to specific ports and IP addresses.

The aim is to restrict inbound traffic to the SSH port defined in Part 1 of the guide and port 443 for HTTPS traffic. The outbound traffic is restricted to non-private IP addresses. A common attack process is to takeover a host and conduct a scan of machines local to the host. These will have IP ranges that fall into the IPv4 Private Address Space [17], typically in the range:

  • 10.0.0.0/8
  • 172.16.0.0/12
  • 192.168.0.0/16

Log into the console to access the dashboard:

Hetzner Console

Click on Firewalls:

Firewalls

Set the first rule to allow SSH traffic, followed by responding to ping request via the ICMP protocol and finally HTTPS traffic via port 443:

Inbound Rules

Restrict the outbound traffic to exclude the Private Internet Address Space:

Outbound Rules

Apply the firewall and waiting for it to become active:

Running Firewall

Whilst this securely locks down all other ports, naturally traffic on port 443 is open and in particular the traefik dashboard is open to the wider internet. Whilst its possible to provide local access control, a more effective means is to use a third party CDN such as Cloudflare to provide a Web Application Firewall (WAF) and DDoS protection. In particular the use of Cloudflare Zero Trust:

Cloudflare Zero Trust

Conclusion

This guide showed how to use podman to manage containers and in particular the podman-compose tool to orchestrate the using a a declarative file format. We used traefik as a reverse proxy to route traffic to the correct container and secure it with HTTPS. We then used systemd to manage the traefik container and other containers to ensure they started automatically after a reboot of the host and attempted to recover due to a crash or abnormality. Finally, we secured access to the server using the Hetzner firewall service.

Attribution

Images based on:

Back to top

References

[1]
Docker Inc., “What is a Container? Docker,” Use containers to Build, Share and Run your applications. Available: https://www.docker.com/resources/what-container/. [Accessed: Mar. 10, 2025]
[2]
Amazon Web Services Inc, “Firecracker.” Available: https://firecracker-microvm.github.io/. [Accessed: Mar. 22, 2025]
[3]
Open Infrastructure Foundation, “Kata Containers - Open Source Container Runtime Software.” Available: https://katacontainers.io/. [Accessed: Mar. 22, 2025]
[4]
“Podman.” Available: https://podman.io/. [Accessed: Mar. 22, 2025]
[5]
The Kubernetes Authors, “Pods,” Kubernetes. Available: https://kubernetes.io/docs/concepts/workloads/pods/. [Accessed: Mar. 22, 2025]
[6]
The Kubernetes Authors, “Production-Grade Container Orchestration,” Kubernetes. Available: https://kubernetes.io/. [Accessed: Mar. 22, 2025]
[7]
Traefik Labs, “Run APIs Easily. Anywhere. Traefik Labs,” Run APIs Easily. Anywhere. Traefik Labs. Available: https://traefik.io/. [Accessed: Mar. 22, 2025]
[8]
Internet Security Research Group, “Let’s Encrypt.” Available: https://letsencrypt.org/. [Accessed: Mar. 22, 2025]
[9]
C. Hudson, “Using Traefik with Podman,” Chris Hudson. Nov. 2023. Available: https://blog.cthudson.com/2023-11-02-running-traefik-with-podman/. [Accessed: Mar. 10, 2025]
[10]
Podman Contributors, “Podman/docs/tutorials/socket_activation.md at main \(\cdot\) containers/podman,” GitHub. Available: https://github.com/containers/podman/blob/main/docs/tutorials/socket_activation.md. [Accessed: Mar. 15, 2025]
[11]
Cloudflare, “Cloudflare DNS Authoritative and Secondary DNS.” Available: https://www.cloudflare.com/application-services/products/dns/. [Accessed: Mar. 16, 2025]
[12]
Akamai Technologies, DNS security Edge DNS Shield NS53,” Akamai. Available: https://www.akamai.com/products/edge-dns. [Accessed: Mar. 16, 2025]
[13]
Google LLC, “Dig (DNS lookup).” Available: https://toolbox.googleapps.com/apps/dig/. [Accessed: Mar. 16, 2025]
[14]
Red Hat Ince, “Chapter 4. Running Containers as systemd Services with Podman Red Hat Product Documentation.” Available: https://docs.redhat.com/en/documentation/red_hat_enterprise_linux_atomic_host/7/html/managing_containers/running_containers_as_systemd_services_with_podman#running_containers_as_systemd_services_with_podman. [Accessed: Mar. 16, 2025]
[15]
Dan Walsh, “Make systemd better for Podman with Quadlet,” Make systemd better for Podman with Quadlet. Mar. 2023. Available: https://www.redhat.com/en/blog/quadlet-podman. [Accessed: Mar. 16, 2025]
[16]
Docker Inc., “Packet filtering and firewalls,” Docker Documentation. 14:10:18 +0000 UTC. Available: https://docs.docker.com/engine/network/packet-filtering-firewalls/. [Accessed: Mar. 16, 2025]
[17]
American Registry for Internet Numbers, Ltd., IPv4 Private Address Space and Filtering.” Available: https://www.arin.net/reference/research/statistics/address_filters/. [Accessed: Mar. 16, 2025]

Citation

BibTeX citation:
@online{2025,
  author = {, miah0x41},
  title = {Managing {Containers} and {Providing} {Secure} {Access} to
    {You} {Own} {*ChatGPT*} {Interface}},
  date = {2025-03-22},
  url = {https://blog.curiodata.pro/posts/13-podman-traefik/},
  langid = {en}
}
For attribution, please cite this work as:
miah0x41., “Managing Containers and Providing Secure Access to You Own *ChatGPT* Interface,” Mar. 22, 2025. Available: https://blog.curiodata.pro/posts/13-podman-traefik/