

Maybe you have to check Volume and Port settings, so that it fit your needs.
I always prefix my containers with “con-”, so that it is easier to finding them with systemctl --user.
SELECT
‘#bicycle 🚴♂️’
,‘#databases’
,‘#sql’
,‘#selfhosting’
,‘#Linux 🐧’
,‘Team vi’
,‘#mdRzA’
,‘Generation X’
FROM life
WHERE 0 = 0
;


Maybe you have to check Volume and Port settings, so that it fit your needs.
I always prefix my containers with “con-”, so that it is easier to finding them with systemctl --user.


[Install]
\# Start by default on boot without explicit enabling
\# To avoid automatic start Install section has to be
\# disabled
WantedBy=default.target multi-user.target
[Service]
\# Restart service in case of failures
Restart=on-failure
TimeoutStartSec=20
TimeoutStopSec=20
Type=notify


[Container]
AutoUpdate=registry
ContainerName=con-portainer
HostName=con-portainer
Image=docker.io/portainer/portainer-ce:lts
Notify=conmon
PublishPort=8000:8000
PublishPort=9443:9443
Pull=missing
Volume=vol-portainer:/data
Volume=%t/podman/podman.sock:%t/podman/podman.sock


[Unit]
Description=Container running Portainer container management platform
Wants=podman-user-wait-network-online.service
After=podman-user-wait-network-online.service
After=local-fs.target
Requires=podman.socket


@Excaliburr 3. Are we talking here about rootless podman? If yes, containers are running on the host with the uid of current user, in your example with UID 1000.
Processes IN started containers are often running with UID=0, but this belongs to definition of used container and is only IN container.
PostgreSQL in Debian container is running with UID=999.
To avoid problems with created files in host file system, I’m using UserNS=keep-id:uid=999,gid=999, which maps files to the UID on host system.


@Nighed Sorry, but I currently don’t use Opencloud and I don’t have insights in the code.
But maybe the code itself has an answer for your question.
https://github.com/opencloud-eu


@mjr I think, you are writing about Owncloud.
Opencloud is newly written with Go, so it can’t be a fork of PHP driven Owncloud or Nextcloud.


Probably https://opencloud.eu/ could be an alternative.


@theorangeninja I would suggest again, that you try to access the content of the podman volume as host user, which is running the podman container.
I think, that it would looks like this and that you can only access it using podman unshare:
drwxr-xr-x 1 166446 166446 66 28. Jul 20:43 \_data


@theorangeninja Did you have tried a ls -al on the used volume?
The podman volume path can be found here:
`podman info --format ‘{{.Store.VolumePath}}’``
When you use $HOME/linkding as volume mount and the linkding container process is running with <> UID 0, then the created files are belonging to another UID than your UID.
Maybe this tutorial explains it better:
https://www.tutorialworks.com/podman-rootless-volumes/


@theorangeninja Rootless podman container and owner of created files - always a mystery.
Maybe, the part belonging to “Using volumes” could help:
https://github.com/containers/podman/blob/main/docs/tutorials/rootless/_tutorial.md
If the container process is running with another UID than 0 (root), created files on the host belongs to another UID, calculated based on settings from /etc/suduid.
You should have a look into --userns for mapping of UIDs between container and host:
https://docs.podman.io/en/latest/markdown/podman-run.1.html
For PostgreSQL I’m using keep-id:uid=999,gid=999.
@Cenzorrll For comparison of LVM with BTRFS there are several article available.
https://www.baeldung.com/linux/btrfs-lvm
https://fedoramagazine.org/choose-between-btrfs-and-lvm-ext4/
From personal experience, I have an encrypted software RAID1 with mdadm and BTRFS on top.
Is not LVM, but same direction.
Before implementing this, I made some tests.
Related to encryption, when RAID1 was implemented with BTRFS, the CPU load had been doubled, because every BTRFS disk has an encryption process.
With software RAID1, only one encryption process is there.


@irmadlad You are welcome.
The Arch Wiki also has a lot information about Power Management.
And I would say, most of them are independent if Arch Linux is used or not.


@irmadlad That have also been my intentions, when I created the udev rules.
They are most generic and I use them on several systems for reducing some small power consumption.
Example: enabling of PCI power management
ACTION=="add|change", \\
SUBSYSTEM=="pci", \\
ATTR{power/control}="auto"
The things, which you listed in your first post are from my view good topics, for getting maximum results from minimum effort.
I started at
https://wiki.archlinux.org/title/powertop
and went further from there.


@irmadlad Instead of using --auto-tune, I used the output from powertop --html and created some udev rules for activating of power management functions of relevant devices during startup.
With --auto-tune some of my USB HID devices like mice are getting not usable because of activated power management.


@androidul I would say, selfhosting is doing the best out of available possibilities.
For me it is just an 11 years old PC, which was much to good to put to waste.
My intention with the example from @jwildeboer was more about the usage of Mini-PCs than about their rack mounting.
But it also shows, what could be possible with more ressources.


I personally use my previous desktop PC with an i7-4790T CPU and 32GB Ram for selfhosting.
@jwildeboer shows his homelab in his blog using some Mini-PCs.
https://jan.wildeboer.net/2025/05/Cute-Homelab/
I would suggest, when you don’t need HDDs for storage reasons, to go with a refurbished Mini-PC with as much RAM as possible.


@early_riser @jwildeboer has a blog post about using step-ca for something like this.
https://jan.wildeboer.net/2025/07/letsencrypt-homelab-stepca/


@damnthefilibuster There was just a post in my timeline about some applications for Docker Container Monitoring.
Maybe there are other alternatives, which fits better your needs:
@Excaliburr Yes, you are right.
Do you have already a single container running with rootless podman?
Your given Arr-Stack seems to me relative complex when you are a beginner with podman.
Probably you could get some experience, when you start with just a single container.
In following posts are my personal quadlet settings for running Portainer, which could be helpful for getting insights of your running containers.
https://docs.portainer.io/start/install-ce/server/podman/linux