Johannes Schnatterer's Avatar

Johannes Schnatterer

@schnatterer.info

Software engineer, author, speaker. Field CTO of Cloudogu. My particular interests are #k8s, #GitOps, #PlatformEngineering, #o11y, #IaC, #DevOps technical leadership and of course #FLOSS/ #FOSS/ #OSS. I like owning my data and devices.

27
Followers
14
Following
54
Posts
22.11.2024
Joined
Posts Following

Latest posts by Johannes Schnatterer @schnatterer.info

Vibe engineering | Hacker News

I think we all recognize that AI changes the way we produce code.
To me it seems it wides the gap what a single dev can reach in terms of output.
The HN discussions shows mixed feelings about this:
news.ycombinator.com/item?id=4550...

What are your thoughts?

09.10.2025 10:00 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Using Coding Agents in combination with software engineering best practices: Unit testing, concept-first, version control, code review, manual testing, etc. for higher output.

09.10.2025 10:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Vibe engineering | Hacker News

TIL the term #VibeEngineering" as opposite of #VibeCoding, proposed by @simonwillison.net

While the term does not feel intuitive to me, the idea does:

09.10.2025 10:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

⚠️ Recommendations:
At least run: npm/yarn/pnpm audit

npm config set ignore-scripts true --global

What else?

Does anyone know of any specific tooling to check if impacted?

18.09.2025 16:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised | Hacker News

Same attacker as nx?
HackerNews: news.ycombinator.com/item?id=4526...

18.09.2025 16:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

πŸ—“οΈ 17 Sep: attack #Shai-Hulud / #CrowdStrike / #tinycolor
Self-replicating worm 😱 started by briefly infecting tinycolor and packages by vendor CrowdStrike. Exposes code and secrets via GitHub and tries to propagate to other packages via npm tokens. Now impacts nearly 500 packages.

18.09.2025 16:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised | Hacker News

πŸ—“οΈ 8 Sep: #chalk, #debug-js and other packages by maintainer #qix (junon) compromised. They handled this very transparently πŸ‘οΈ

HackerNews: news.ycombinator.com/item?id=4516...
CVE-2025-59144: github.com/advisories/G...

18.09.2025 16:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Image of sandworm Shai-Hulud of the Dune saga. Namesake of the supply chain campaign.

Image of sandworm Shai-Hulud of the Dune saga. Namesake of the supply chain campaign.

TLDR recent #npm supply chain attacks

πŸ—“οΈ 26 Aug: #nx packages compromised stealing SSH keys, npm tokens, and .gitconfig files and weaponized AI CLI tools 😱 upload to repo named #S1ngularity

HackerNews: news.ycombinator.com/item?id=4503...
GHSA: github.com/nrwl/nx/secu...

18.09.2025 16:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Yep, I've been pwned. 2FA reset email, looked very legitimate.

Only NPM affected. I've sent an email off to @npmjs.bsky.social to see if I can get access again.

Sorry everyone, I should have paid more attention. Not like me; have had a stressful week. Will work to get this cleaned up.

08.09.2025 15:15 πŸ‘ 187 πŸ” 59 πŸ’¬ 15 πŸ“Œ 22
LinkedIn Login, Sign in | LinkedIn Login to LinkedIn to keep in touch with people you know, share ideas, and build your career.

Here is the link for opting out

www.linkedin.com/mypreference...

18.09.2025 13:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
LinkedIn settings showing settings where this setting is enabled:

Data for Generative AI Improvement

    Can LinkedIn use your personal data and content you create on LinkedIn to train generative AI models that create content?

    Use my data for training content creation AI models

LinkedIn settings showing settings where this setting is enabled: Data for Generative AI Improvement Can LinkedIn use your personal data and content you create on LinkedIn to train generative AI models that create content? Use my data for training content creation AI models

Shouldn't this be opt in? 🧐😱

Now is the time to opt out.

#linkedin #ai #gdpr

18.09.2025 13:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The switch was really easy.

The only customization I did was to enable the constant reminder of my cloud account and node.js version.

Having the time displayed as part of the prompt also turns out useful when scrolling back up later.

github.com/schnatterer/...

16.09.2025 08:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Terminal window showing zsh with tmux and starship and a prompt that shows the time.
Command "sleep 3" returns "took 3s"

Terminal window showing zsh with tmux and starship and a prompt that shows the time. Command "sleep 3" returns "took 3s"

Anyone still using #powerlevel10k #zsh theme?
It has been on "life support" > 1 year.

I had been using it for almost 5 years because of instant prompt.
Now switched to #starship, which I already had an eye on back then.

Is there a reason not to use starship?
What common (zsh) themes are there?

16.09.2025 07:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

#docker or #podman?

A polarised discussion πŸ‘‡
news.ycombinator.com/item?id=4513...

Does not motivate me to give podman another go.
I like being efficient and not struggle with things I wouldn't have to with docker 😐

Can anyone share podman success stories?

05.09.2025 18:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Project API Token Exposes Repository Credentials ### Summary Argo CD API tokens with project-level permissions are able to retrieve sensitive repository credentials (usernames, passwords) through the project details API endpoint, even when the t...

Just patched Argo CD CVE-2025-55190, scoring 9.9 😱

github.com/argoproj/arg...

nvd.nist.gov/vuln/detail/...

I am impressed that the argo project fixed this in so many versions πŸ™
2.13.9, 2.14.16, 3.0.14 and 3.1.2.

#argocd #cve #CVE202555190

05.09.2025 09:17 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Anyway, here is my workaround (to be executed on the host) 😱

sudo apparmor_parser -R /etc/apparmor.d/usr.sbin.slapd

Anyone ever had similar problems and have a better solution?

03.09.2025 12:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Presumably, this is a limitation of k3d running in a container itself, leading to kubelet lacking privilege to modify AppArmor profiles on host.

03.09.2025 12:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Eventually found out that my host system has an AppArmor profile for slapd.
However, I was unable to ignore it via k8s' annotation or securityContext setting for unconfined AppArmor profile.

03.09.2025 12:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

My LDAP pod failed to start with permission denied errors when the startup script used slapadd. These would not go away, even as root.

03.09.2025 12:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Featured graphic: k3d LDAP deployment challenges

Featured graphic: k3d LDAP deployment challenges

As a longtime fan of local #k8s clusters for fast feedback (especially #k3d ),I've just faced my first real challenge: deploying #LDAP πŸ˜…
(caused by apparmor and nested containerization)

03.09.2025 12:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Anyway, here is my workaround (to be executed on the host) 😱

sudo apparmor_parser -R /etc/apparmor.d/usr.sbin.slapd

Anyone ever had similar problems and have a better solution?

03.09.2025 12:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Presumably, this is a limitation of k3d running containerized itself, leading to kubelet lacking privilege to modify AppArmor profiles on host.

03.09.2025 12:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

My LDAP pod failed to start with permission denied errors when the startup script used slapadd.

Eventually found out that my host system has an AppArmor profile for slapd.
However, I was unable to ignore it via k8s' annotation or securityContext setting for unconfined AppArmor profile.

03.09.2025 12:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Terminal showing command "helm images get prometheus-community/kube-prometheus-stack" and a list of images as output

Terminal showing command "helm images get prometheus-community/kube-prometheus-stack" and a list of images as output

TIL: #helm image plugin shows all images for a chart, even respecting dependencies 🧐

github.com/nikhilsbhat/...

18.08.2025 17:33 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Argo CD 3.1 brings OCI support Entdecken Sie das deutsche GitOps Buch. Lernen Sie Best Practices fΓΌr Continuous Deployment, Kubernetes und sichere GitOps Workflows kennen.

#ArgoCD 3.1 brings OCI support for generic #OCI artifacts πŸ₯³

I had a first look πŸ‘‡οΈ

gitops-book.dev/blog/2025-08...

14.08.2025 14:23 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

XKCD 2347 comes to mind, but I don't feel like laughing.

13.08.2025 20:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Health of External Secrets project Β· Issue #5084 Β· external-secrets/external-secrets Update 2: OMG thank you all for signing up. We weren't expecting such a positive response from the community <3 Update We've decided to stop releases until more long-term maintainers join our team....

An important building block of many cloud-native architectures just had to stop maintenance:
#ExternalSecretsOperator #ESO.

github.com/external-sec...

The unfortunate fate of so many open source projects: We all use them, but we don't support them. Maintainers burn out.

13.08.2025 20:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Cloudogu Platform More flexibility for your software tools.

Facing challenges with air-gapped envs or multi-tenant architectures?
I'd love to hear from you! Schedule here:
πŸ—“οΈ platform.cloudogu.com/person/johan...

15.05.2025 09:48 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Our goal is to provide a simple UX to platform admins:
Add one file to git, a new tenant gets rolled out.
Change one version number in git, all tenants get upgraded.

#GitOps at it's best!

3/x

15.05.2025 09:48 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The next big thing we are working on is the option to role out dedicated instances per tenant, that are managed centrally.

Kind of like an IDP as a Service (Is #IDPaaS a thing? πŸ˜…)

2/x

15.05.2025 09:48 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0