Installing MicroK8s 1.14 for Local Development

In a recent development, MicroK8s replaced its dockerd installation with containerd. Many pre-existing sources mention “microk8s.docker”, but this command is no longer available. I will walk you through the full initial installation and basic usage on Ubuntu 18.04. Practically speaking, this means you now need to install Docker on your Ubuntu machine. In previous versions, […]

Read more
The Importance of Goal Alignment in Agile and DevOps

I work and interact with multiple software development teams. Some are just beginning their agile and DevOps journeys and others are well on their way, but they have many of the same questions or concerns: How do we get all team member roles on the same page? How do we communicate and collaborate more effectively […]

Read more
Running Cucumber with Maven
Cucumber

A little while ago (ok, maybe in the distant past), I started writing about Cucumber. My very first post detailed how to set up Cucumber-JVM, and we’ve come a long way from then. I thought it was worth revisiting, as there are simpler ways to get setup, and better tools out there to use. So […]

Read more
The Pros and Cons of a Serverless DevOps Solution

The dream of any product owner is fully customizable production software without the expense of paying for the hardware it rests upon. While the cloud and infrastructure as a service (IaaS) partially deliver on this promise, a completely serverless infrastructure would be much closer to this dream. From a product owner’s perspective, the possibility of […]

Read more
Building a Node.js REST Microservice: Part One
portrait of a red panda

Introduction This is the first in a planned series of tutorials walking through the process of creating, deploying, and consuming a Node.js REST microservice. In this post, I will demonstrate the initial setup and creation of the microservice and its routes. By leveraging just a few Node.js modules, you will quickly have a functional REST […]

Read more
Integrating Threat Modeling into Agile Development

Adopting agile in your program comes with inherent benefits around transparency and delivery, but it also often requires changes to other business practices to align with a more iterative way of developing software. Threat modeling helps you determine where to focus your security testing efforts when building your app, so it’s a useful practice. But one […]

Read more
How to Configure Postman to use OWASP ZAP as a Proxy

OWASP ZAP (Open Web Application Security Project Zed Attack Proxy) is a powerful security scanning tool for those new to security testing as well as professional penetration testers. ZAP can be used for many different security testing tasks, such as actively simulating attacks, in order to expose vulnerabilities, or passively scanning requests as a proxy. […]

Read more
Failure is Feedback
Feedback

“Failure is Feedback and Feedback is the breakfast of Champions” – fortune cookie Most everyone would agree that feedback is an essential ingredient to successful delivery. Feedback helps you to improve, whether you are a cashier, a coach, a teacher, or part of a software development team. So why is it so hard to accept […]

Read more
Why Does Everyone Pick on Agile?

It seems like every other day, someone in the software development community feels the necessity to declare that agile is dead and they have something new and better. Sometimes it’s one of the founders of agile who now think the Agile Manifesto is dated and needs to be overhauled. Other times it’s ageless software veterans […]

Read more
X