<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: karmarepellent</title><link>https://news.ycombinator.com/user?id=karmarepellent</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 16:12:37 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=karmarepellent" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by karmarepellent in "Dear GitHub: no YAML anchors, please"]]></title><description><![CDATA[
<p>This is why I've become a fan of StrictYAML [0]. Of course it is not supported by many projects, but at least you are given the option to dispense with all the unnecessary features and their associated pitfalls in the context of your own projects.<p>Most notably it only offers three base types (scalar string, array, object) and moves the work of parsing values to stronger types (such as int8 or boolean) to your codebase where you tend to wrap values parsed from YAML into other types anyway.<p>Less surprises and headaches, but very niche, unfortunately.<p>[0] <a href="https://hitchdev.com/strictyaml/" rel="nofollow">https://hitchdev.com/strictyaml/</a></p>
]]></description><pubDate>Mon, 22 Sep 2025 17:06:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45336370</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=45336370</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45336370</guid></item><item><title><![CDATA[New comment by karmarepellent in "Passkeys and Modern Authentication"]]></title><description><![CDATA[
<p>The sarcasm is duly noted. But I simply answered the question. I don't have any strong opinion regarding passkeys.</p>
]]></description><pubDate>Tue, 02 Sep 2025 17:41:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=45106466</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=45106466</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45106466</guid></item><item><title><![CDATA[New comment by karmarepellent in "Passkeys and Modern Authentication"]]></title><description><![CDATA[
<p>A service that lets you sign up by uploading a SSH public key could just as well let you upload multiple public keys in your profile to be able to connect from other devices.</p>
]]></description><pubDate>Tue, 02 Sep 2025 17:32:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=45106320</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=45106320</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45106320</guid></item><item><title><![CDATA[New comment by karmarepellent in "Passkeys and Modern Authentication"]]></title><description><![CDATA[
<p>This is incorrect. SSH certificates work just like x509 certificates in that regard. Also, with PubkeyAuthentication, there exist all kinds of ways to collect host keys before connecting to them for the first time and thus avoiding the trust-on-first-use problem. Especially in private networks where you control all the nodes.</p>
]]></description><pubDate>Tue, 02 Sep 2025 17:26:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=45106217</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=45106217</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45106217</guid></item><item><title><![CDATA[New comment by karmarepellent in "Passkeys and Modern Authentication"]]></title><description><![CDATA[
<p>> Signing in is cryptographically signing a commitment to the current ephemeral tunnel.<p>I can see how SSH could be used for authentication on the web. And I have no doubt that it would be sound out-of-the-box. But I am not sure what you mean by your last sentence. Do you mean that authentication targets are gated and only reachable by establishing a tunnel via some kind of forwarding?<p>Aside from the wonderful possibilities that are offered by using port forwarding of some kind, you could also simply use OpenSSH's ForceCommand to let users authenticate via SSH and then return a short-lived token that can then be used to log into an application (or even a SSO service).<p>I guess no one uses SSH for authentication in this way because it is non-standard and kind of shuts out non-technical people.</p>
]]></description><pubDate>Tue, 02 Sep 2025 17:24:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45106183</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=45106183</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45106183</guid></item><item><title><![CDATA[Fai.me – build your own custom ISO]]></title><description><![CDATA[
<p>Article URL: <a href="https://fai-project.org/FAIme/">https://fai-project.org/FAIme/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44097488">https://news.ycombinator.com/item?id=44097488</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 26 May 2025 14:00:40 +0000</pubDate><link>https://fai-project.org/FAIme/</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=44097488</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44097488</guid></item><item><title><![CDATA[New comment by karmarepellent in "Automated Installation of Proxmox VE"]]></title><description><![CDATA[
<p>I'm curious to know if people see this as a viable alternative to a PXE installation, especially when it comes to the deployment of large-ish (possibly air-gapped) clusters.</p>
]]></description><pubDate>Thu, 22 May 2025 13:46:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=44062015</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=44062015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44062015</guid></item><item><title><![CDATA[Automated Installation of Proxmox VE]]></title><description><![CDATA[
<p>Article URL: <a href="https://pve.proxmox.com/wiki/Automated_Installation">https://pve.proxmox.com/wiki/Automated_Installation</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44061983">https://news.ycombinator.com/item?id=44061983</a></p>
<p>Points: 2</p>
<p># Comments: 2</p>
]]></description><pubDate>Thu, 22 May 2025 13:42:56 +0000</pubDate><link>https://pve.proxmox.com/wiki/Automated_Installation</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=44061983</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44061983</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>Actually I think the trick is to change ones own perspective on these things. Regardless of how many redundancies and how many 9's of availability your system theoretically achieves, there is always stuff that can go wrong for a variety of reasons. If things go wrong, I am faster at fixing a not-so-complex system than the more complex system that should, in theory, be more robust.<p>Also I have yet to experience that an outage of any kind had any negative consequences for me personally. As long as you stand by the decisions you made in the past and show a path forward, people (even the higher-ups) are going to respect that.<p>Anticipating every possible issue that might or might not occur during the lifetime of an application just leads to over-engineering.<p>I think rationalizing it a little bit may also help with the paranoia.</p>
]]></description><pubDate>Wed, 27 Nov 2024 12:58:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=42255698</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42255698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42255698</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Didn't Need Kubernetes, and You Probably Don't Either"]]></title><description><![CDATA[
<p>Its a matter of evaluating what kind of infrastructure your application needs to run on. There are certainly mission critical systems where even a sliver of downtime causes real damage, like lost revenue. If you come to the conclusion that this application and everything it involves better run on k8s for availability reasons, you should probably focus on that and code your application in a k8s-friendly manner.<p>But there are tons of applications that run on over-engineered cloud environments that may or may not involve k8s and probably cost more to operate than they must. I use some tools every day where a daily 15 min downtime would not affect my or my work in the slightest. I am not saying this would be desirable per se. Its just that a lot of people (myself included) are happy to spend an hour of their work day talking to colleagues and drinking coffee, but a 15 min downtime of some tool is seen as an absolute catastrophe.</p>
]]></description><pubDate>Wed, 27 Nov 2024 12:43:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=42255606</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42255606</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42255606</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>I think it depends on the definition of "bricking the cluster". When you start to upgrade your control plane, your control plane pods restart one after one, and not only those on the specific control plane node. So at this point your control plane might not respond anymore if you happen to run into a bug or some other issue. You might call it "bricking the cluster", since it is not possible to interact with the control plane for some time. Personally I would not call it "bricked", since your production workloads on worker nodes continue to function.<p>Edit: And even when you "brick" it and cannot roll back, there is still a way to bring your control plane back by using an etcd backup, right?</p>
]]></description><pubDate>Wed, 27 Nov 2024 10:35:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254869</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254869</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254869</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>Do you mind sharing what these operations were? I can think of a few things that may very well brick your control plane. But at the very least existing workloads continue to function in this case as far as I know. Same with e.g. misconfigured network policies. Those might cause downtimes, but at least you can roll them back easily. This was some time ago though. There may be more footguns now. Curious to know how you bricked your cluster, if you don't mind.<p>I agree that k8s offers many features that most users probably don't need and may not even know of. I found that I liked k8s best when we used only a few, stable features (only daemonsets and deployments for workloads, no statefulsets) and simple helm charts. Although we could have probably ditched helm altogether.</p>
]]></description><pubDate>Wed, 27 Nov 2024 10:30:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254842</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254842</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>In theory: absolutely. This is just anecdata and you are welcome to challenge me on it, but I have never had a problem upgrading Kubernetes itself. As long as you trail one version behind the latest to ensure critical bugs are fixed before you risk to run into them yourself, I think you are good.<p>Edit: To expand on it a little bit. I think there is always a real, theoretical risk that must be taken into account when you design your infrastructure. But when experience tells you that accounting for this potential risk may not be worth it in practice, you might get away with discarding it and keeping your infra lean. (Yes, I am starting to sweat just writing this).</p>
]]></description><pubDate>Wed, 27 Nov 2024 08:59:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254285</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254285</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254285</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Didn't Need Kubernetes, and You Probably Don't Either"]]></title><description><![CDATA[
<p>Agreed. The best thing we did back when we ran k8s clusters, was moving a few stateful services to dedicated VMs and keep the clusters for stateless services (the bulk) only. Running k8s for stateless services was an absolute bliss.<p>At that time stateful services were somewhat harder to operate on k8s because statefulness (and all that it encapsulates) was kinda full of bugs. That may certainly have changed over the last few years. Maybe we just did it wrong. In any case if you focused on the core parts of k8s that were mature back then, k8s was (and is) a good thing.</p>
]]></description><pubDate>Wed, 27 Nov 2024 08:48:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254226</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254226</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254226</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>I think the value proposition holds when you are just getting started with your company and you happen to employ people that know their way around the hyperscaler cloud ecosystems.<p>But I agree that moving your own infra or outsourcing operations when you have managed to do it on your own for a while is most likely misguided. Speaking from experience it introduces costs that cannot possibly be calculdated before the fact and thus always end up more complicated and costlier than the suits imagined.<p>In the past, when similar decicions were made, I always thought to myself: You could have just hired one more person bringing their own, fresh perspective on what we are doing in order to improve our ops game.</p>
]]></description><pubDate>Wed, 27 Nov 2024 08:40:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254184</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254184</guid></item><item><title><![CDATA[New comment by karmarepellent in "I Stopped Using Kubernetes. Our DevOps Team Is Happier Than Ever"]]></title><description><![CDATA[
<p>We ran only two (very small) clusters for some time in the past and even then it introduced some unnecessary overhead on the ops side and some headaches on the dev side. Maybe they were just growing pains, but if I have to run Kubernetes again I will definitely opt for a single large cluster.<p>After all Kubernetes provides all the primitives you need to enforce separation. You wouldn't create separate VMWare production and test clusters either unless you have a good reason.</p>
]]></description><pubDate>Wed, 27 Nov 2024 08:27:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=42254111</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42254111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42254111</guid></item><item><title><![CDATA[New comment by karmarepellent in "Go-Safeweb"]]></title><description><![CDATA[
<p>I have use cases for both approaches (letting a reverse proxy handle TLS, letting the application listen on an external socket and handling TLS in the application).<p>I find is is easier to configure an application with a reverse proxy in front when different paths require e.g. different cache-control response headers. At the end of the day I do not want to replicate all the logic that nginx (and others) already provide when it integrates well with the application at the back.<p>Other commenters suggest that both ways (with or without additional reverse proxy) add "tons of complexity". I don't see why. Using a reverse proxy is what we have done for a while now. Installation and configuration (with a reasonable amount of hardening) is not complex and there exist a lot of resources to make it easier. And leaving the reverse proxy out and handling TLS in the application itself should not be "complex" either. Just parse a certificate and private key and supply them to whatever web framework you happen to use.</p>
]]></description><pubDate>Thu, 14 Nov 2024 08:06:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=42134049</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42134049</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42134049</guid></item><item><title><![CDATA[New comment by karmarepellent in "Web Locks API"]]></title><description><![CDATA[
<p>Makes me wonder what part of the pattern you think is "too clever"? I think it is fairly easy to reason about when the lock is restricted to the encompassing block and automatically dropped when you leave the block.</p>
]]></description><pubDate>Mon, 11 Nov 2024 08:04:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=42105300</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42105300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42105300</guid></item><item><title><![CDATA[New comment by karmarepellent in "Sustainable Web Interest Group Is Formed"]]></title><description><![CDATA[
<p>I agree. Sometimes the best you can do to cope with the sprawling ecosystems around programming languages and having to deal with convoluted codebases and inefficient programs, is sit down at home and building something simple (if you can spare the time and energy). That is what I do every now and then and it is incredibly satisfying to be able to explore how therapeutic programming can be when you are not boxed in.<p>I think this is not how companies work though, because they do not operate based on your views alone. And getting all people to agree on some of the topics you mentioned (e.g. importing dependencies vs. rolling your own implementations)  is an incredibly complex task.</p>
]]></description><pubDate>Fri, 08 Nov 2024 11:15:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=42085964</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42085964</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42085964</guid></item><item><title><![CDATA[New comment by karmarepellent in "There's Almost No Gitlab"]]></title><description><![CDATA[
<p>I can confirm that upkeep of Gitlab is rather easy and does not take much time. Just the occasional update every few weeks. For its size it is also quite robust and the integrations it offers work well.<p>The only thing I can really complain about are the constant UI changes that do not actually improve anything. I fell they are just changes for change's sake to keep some frontend devs busy.</p>
]]></description><pubDate>Fri, 08 Nov 2024 07:05:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=42084853</link><dc:creator>karmarepellent</dc:creator><comments>https://news.ycombinator.com/item?id=42084853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42084853</guid></item></channel></rss>