Pivotal Engineering Journal

Recent content on Pivotal Engineering Journal

  • Faking OAuth2 Single Sign-on in Spring, 3 Ways

    Faking OAuth2 Single Sign-on in Spring, 3 Ways

    When writing a Java Spring web application that uses an OAuth2 single sign-on (SSO) service for authentication, testing can be difficult, especially if the SSO service is provided by a third...

    Read More
  • Flow Your Tests Like Your Code

    Flow Your Tests Like Your Code

    My co-worker Belinda Liu turned to me and said, “I don’t like these tests at all; they’re hard to follow, and I’m not sure what they’re testing.” I looked at the tests that I had spent much of...

    Read More
  • How To Enable IPv6 on Your Cloud Foundry's HAProxy

    How To Enable IPv6 on Your Cloud Foundry's HAProxy

    0. Abstract HAProxy is an optional load balancer included in the canonical open source Cloud Foundry deployment. Its intended use is on IaaSes (Infrastructures as a Service) that do not offer...

    Read More
  • Scaling the Firehose API and Consumers

    Scaling the Firehose API and Consumers

    Scaling the Loggregator API So you’ve used this article to correctly scale Dopplers in your Loggregator system. Even so, you notice that you’re still experiencing log loss. It could be that your...

    Read More
  • Scaling Doppler VMs in Cloud Foundry

    Scaling Doppler VMs in Cloud Foundry

    Why care about Dopplers You might be wondering what a Doppler is (and why you care about it). Doppler VMs are a core component of log and metrics transport; one that you probably won’t care about...

    Read More
  • ESM Pairing Study Data

    ESM Pairing Study Data

    Studying the experience of Pair Programmers This is the raw data (after anonymization, and after the removal of freeform fields, out of an abundance of caution, so as not to leak any intellectual...

    Read More
  • ESM Study Data

    ESM Study Data

    Studying the experience of XP Teams This is the raw data (after anonymization, and after the removal of freeform fields, out of an abundance of caution, so as not to leak any intellectual...

    Read More
  • Ensure Windows apps are using the `windows` stack

    Ensure Windows apps are using the `windows` stack

    Pivotal Application Service for Windows introduced the -s windows stack name in PASW 2.4, reducing the operator and developer need to concern themselves with specific Windows Server versions. From...

    Read More
  • A High-performing Mid-range NAS Server, Part 3: 10 GbE

    A High-performing Mid-range NAS Server, Part 3: 10 GbE

    Abstract “How much faster will my VM’s disks be if I upgrade my ZFS-based (Z File System) NAS to 10 GbE?” The disks will be faster, in some cases, much faster. Our experience is that sequential...

    Read More
  • Testing Spring filters without pain

    Testing Spring filters without pain

    The Spring framework has grown and changed at a massive pace over the last years. It has evolved from XML configured beans to annotation based beans, from synchronous to a non-blocking and...

    Read More
  • Eureka, Zuul, and Cloud Configuration - Pivotal Cloud Foundry

    Eureka, Zuul, and Cloud Configuration - Pivotal Cloud Foundry

    Overview In a previous post I explained how you could create several components to build a Netflix stack for local development. Now, I want to explain how Pivotal Cloud Foundry makes this much...

    Read More
  • Eureka, Zuul, and Cloud Configuration - Local Development

    Eureka, Zuul, and Cloud Configuration - Local Development

    Overview A couple of recent projects I have been on have started our engagement with the Netflix stack described here, and because I wanted to have a way to quickly prototype, I set up this demo. ...

    Read More
  • Custom Resource Validation with Admission Webhooks

    Introduction One way to extend the Kubernetes platform is by building custom controllers that operate on custom resources. We can leverage custom resources to enhance the cluster with features for...

    Read More
  • Kubelet Metrics The Correct Way!

    Introduction The kubelet exposes many useful metrics that can be used for a variety of purposes. These metrics are already being scrapped by components like the Metric Server. The metrics from the...

    Read More
  • Transferring Time-based One-time Passwords to a New Smartphone

    Transferring Time-based One-time Passwords to a New Smartphone

    Abstract Smartphone authenticator apps such as Google Authenticator and Authy implement software tokens that are “two-step verification services using the Time-based One-time Password Algorithm...

    Read More
  • Managing Stateful Apps with the Operator Pattern; Orchestration Considerations

    Managing Stateful Apps with the Operator Pattern; Orchestration Considerations

    (This blog is the fourth installment of a four-part series) The Operator Pattern The Operator Pattern stipulates a process that is registered with the Kubernetes system layer, listening to...

    Read More
  • Storing Stateful Data that Outlives a Container or a Cluster; Optimizing for Local Volumes

    Storing Stateful Data that Outlives a Container or a Cluster; Optimizing for Local Volumes

    (This blog is the third installment of a four-part series) Kubernetes can automatically provision “remote persistent” volumes with random names Several types of storage volumes have built-in...

    Read More
  • Provisioning Stateful Kubernetes Containers that Work Hard and Stay Alive

    Provisioning Stateful Kubernetes Containers that Work Hard and Stay Alive

    (This blog is the second installment of a four-part series) By default, all containers are free from limits but subject to eviction By default, Kubernetes places very few limits on a container. A...

    Read More
  • Stateful Apps in Kubernetes

    Stateful Apps in Kubernetes

    Kubernetes is available across all public clouds nowadays, including Pivotal’s own PKS, which runs in the cloud and can also be run “on prem”, on the premises of an enterprise. Kubernetes promises...

    Read More
  • Troubleshooting Obscure OpenSSH Failures

    Troubleshooting Obscure OpenSSH Failures

    Abstract By using tcpdump to troubleshoot an elusive error, we uncovered a man-in-the-middle (MITM) ssh proxy installed by our information security (InfoSec) team to harden/protect a set of...

    Read More
  • loading