Screenshot 2024-03-31 at 6.59.54 PM
Screenshot 2024-03-31 at 6.59.54 PM
Screenshot 2024-03-31 at 6.59.54 PM
• During that time, the company's monthly recurring revenue has more than
doubled along with the number of subscribers to the Carerix service.
Currently, Carerix software serves more than 650 customers and 10,000
users on a day to day basis.
• The solution integrates data between on-premise and cloud systems, often
into a data lake or data warehouse.HVR is uniquely designed for moving
data within cloud environments as it has a flexible, distributed
architecture that simplifies cloud adoption.
• What's special about the company's solution is its unique ability integrate
data to and from traditional storage and management systems such as
Oracle, SQLServer, etc. into their cloud systems such as AWS, Apache
Kafka!, Microsoft Azure.
• With Qualtrics XM, enterprises can predict which changes will resonate
most with all of their stakeholders
• Auth0 provides 24/7 customer support and makes sure its platform is
resilient to failures and the users never experience any downtime. The
company's applications have built-in rate limiting and automated
blocking features to mitigate authentication attacks.
• In February of this year, more than 100 flights in and out of London’s
Heathrow airport were cancelled, delayed, or otherwise disrupted after
technical issues compromised the departure boards and check-in systems.
• And some of them are direr than others. In 2015, the CareFusion Alaris
Pump, which is designed to automatically deliver fluids and medicine to
hospital patients, had a software error that caused the pump to delay
infusion.
• Thankfully the issue was caught very early on, but the consequences
could have been dire – potentially leading to accidental overdosing.But
that’s not all.
• A couple of years ago, a software glitch in an F-35 Joint Strike Fighter jet
was identified to have a bug.
• The bug actually caused planes to incorrectly detect and lock in on the
wrong targets when flying in formation.As the company explained, each
of the planes flying in formation must detect a target from varying angles.
• But the software was unable to differentiate between one target and
multiple targets. In essence, the F-35s were seeing double. (And that’s not
something you want when flying in formation at high speeds and high
altitudes.)
• It ultimately led to a divorce and got Uber slapped with a $45 million
lawsuit.
• When you store your money in a bank, you expect to be able to access it
whenever and wherever you want. But, alas, technology doesn’t always
afford this freedom.
• And while you’ve probably experienced a minor glitch in online banking
in the past, I bet you’ve never had to go through one like this.
• In April 2018, millions of TSB Bank customers were locked out of their
accounts after a “simple” upgrade to the software led to a massive
banking outage.
• The system upgrade was planned, but apparently not well enough.
Immediately after TSB turned on the new system, customers began
experiencing issues logging in. Others were shown details of other
people’s accounts.
• In many hospitals and facilities, doctors were unable to see patient files.
This meant they couldn’t access X-ray results or bloodwork.
The way we make decisions is important for organization's because the wrong
decisions can have a significant impact on people’s lives and the reputation of
organizations. So, when we make decisions based on good principles, and live
by good values, we can improve the lives of others and the experiences they
have at work.
Write at least one full paragraph for each stage of the SDLC including what it
consists of and how you would apply that stage to the Case Study as described below.
Apply the Systems Development Life Cycle to the case described below. Choose any
model of the Systems Development Life Cycle and analyze the tasks you would need
to accomplish at each stage of the Systems Development Life Cycle for that model.
You may use any of the SDLC models I gave you in the Lessons area in the Week 1
or Week 2 Lessons, or any other model of your own choice. However, be sure to
state which model you are using and provide a URL to the resource(s) you consulted
on that model so that I can compare your analysis of the case study against the
specific Systems Development Life Cycle model that you chose for your analysis.
You will have to identify the appropriate questions to ask yourself and to answer for
each stage of your Systems Development Life Cycle, similar to what I have done for
the Systems Initiation phase above. Part of this assignment is for you to understand
and explain to me what needs to be accomplished in each phase and how that would
specifically look for the Case Study below.
You must use your own general knowledge about organizations to make reasonable
assumptions appropriate to the case study, since you will not be given every possible
detail of the case
Be as detailed as possible in your analysis. For example, if you are discussing how
you would conduct a feasibility study, give a couple examples of specific questions
you would ask3. Your paper should contain at least 2-3 pages and up to 1-2 pages of
diagrams as indicated below.
Your paper should contain at least 2-3 pages of writing and you are encouraged to
also provide up to another 1-2 pages of diagrams
Case Study
You are leading a team of software developers at a university. The university’s
President has approached you about developing a new information system for
tracking student course registrations.
The system will need to contain information about students, faculty, and courses.
Students should be able to use the system to browse course descriptions and the
schedule of classes for each semester, add classes to their schedule, and drop classes
from their schedule.
Step 2 – After selecting the type of Operating System in which you want to install Jira, look
for the Download option and click on it. You can change the operating system type by
clicking on the dropdown.
Step 3 – Once Jira is downloaded, click on the .exe file. After this, you will see that the Run
confirmation pop-up is displayed, click on RUN to proceed. You can refer to the screenshot below.
Step 4 – Notice that the JIRA installation wizard would be displayed. If so, click on Next
Step 5 – Choose the desired installation option and then click on Next again.
The installation summary would be displayed with the Destination Directory, Home Directory, RMI
Port, HTTP Port etc. The screenshots for the same are attached below for your reference.
Step 6 – Click on Install. JIRA will start installing. It would take a few minutes for the installation to
finish.
Step 7 – Please make sure that the “Start JIRA Software 8.0.2 now” checkbox is checked in order to
start Jira automatically. After that click on Next, if not, it can be accessed using the Windows Start
Menu shortcut.
To Create a project
• In the top-left corner, click the Jira home icon
• In the top-right corner, select Create project.
To Pick a template
The Jira template library houses dozens of templates across a variety of different
categories, and is designed to get your team started quickly and successfully. You can
choose a template from all the Jira products you own (Jira Software, Jira Service
Management, and Jira Work Management). Today, Jira Software offers three
templates
• Sprint Planning
• Daily Scrum
• Sprint Review
• Sprint Retrospective
Sprint planning: is an event in scrum that kicks off the sprint. The purpose of
sprint planning is to define what can be delivered in the sprint and how that work
will be achieved.
Sprint planning is done in collaboration with the whole scrum team.
• Sprint Planning is used to determine what the team will accomplish in the upcoming
Sprint. The event itself has two parts.
Daily Scrum : sometimes referred to as the Daily Standup, has a time-box for 15 minutes
or less, and is specifically for the benefit of the development team.
• The goal of this event is for the team to get in sync on a daily basis, allowing for
better collaboration and transparency.
• The Daily Scrum should be held at the same time each day and should not include
anyone outside of the Scrum Team.
Sprint Review:is when the team presents their work from the Sprint to the project's
stakeholders.
• It should cover not only the work they accomplished, but also open discussions
around the work they were not able to complete.
A Sprint Review includes the following events:
• Attendees include the Scrum Team and key stakeholders if invited by the
Product Owner;
• The Product Owner discusses the ‘done’ and ‘what has not been done’ items
• The Development team elaborates the ‘done’ work, and justifies the
Increment,
• The Product Owner discusses the Product Backlog. He or she projects likely
Sprint Retrospective: is the primary event in which the Scrum Team can inspect
and adapt their approaches based on their experiences from the previous sprints.
The sprint retrospective is usually held as the last activity of the sprint. It is a
good idea to repeat the sprint retrospective on the same day time and place.
• When you’re performing a sprint retrospective you want to capture any
good ideas that come up which can then be applied to future sprints
• Clearly identify and describe product backlog items in order to build a shared understanding of the problem and
solution with the product development team
• Make decisions regarding the priority of product backlog items in order to deliver maximum outcome with minimum
output
• Ensure transparency into the upcoming work of the product development team.
Scrum Master – The Scrum Master is most akin to a project manager. They are guardians of
process, givers of feedback, and mentors to junior team members.
• They oversee day-to-day functions, maintain the Scrum board, check in with team
members, and make sure tasks are being completed on target
• The methodology is highly collaborative and requires efficient processes, and the
results of the process depend upon the expertise of the Scrum Master.
• Agile methodologies may have started in tech companies, but Scrum Master jobs can
be found in all kinds of industries and for all kinds of companies around the glob
Team Member– Team members are the makers: front- and back-end engineers,
copywriters, designers, videographers, you name it.
• Team members have varied roles and skills but all are responsible for getting stuff
done on time and in excellent quality.
• Every organization requires its employees to work together as a team to achieve its
goals. It is possible to have different individuals working together in a group.
• But they must be team-oriented because effective teamwork depends on the
character traits of a good team member.
1. Having an identity.
2. Being committed.
3. Being flexible..
4. You are humble.
5. An effective communicator.
6. A consistent performer.
7. Being objective.
WEEK 4
1. case study to understand the importance of risk management and
mitigation of risk
Tornado IPT Case Study
• It is responsible for the provision of logistical support and capability development for
the RAF Tornado F3 (Air Defence Variant) and the GR4 (Ground Reconnaissance)
fleet until 2025,
• The requirement to drive down defence costs whilst maintaining outputs to the end
customer has led the IPT instigating a transformation program which has resulted in
the development of a series of availability-based contracting solutions with industry.
2. The Challenge
• The management of Safety-related risk has always been paramount within the
Tornado IPT and it was recognized that a similar rigours needed to be introduced to
manage the risks and issues potentially impacting on all areas of IPT business.
• In partnership with MOD’s Risk Process Owner (Through Life Procurement
Management Support Group) a formalized project risk management process was
developed for the Tornado IPT.
• Key to the successful implementation of this program would be the selection and
deployment of a powerful risk management and analysis tool.
3. The Solution
• After a comprehensive evaluation and assessment phase, Tornado IPT selected
Predict! Risk Controller as best meeting its requirement.
• The intuitive nature of operation and integration with Predict! Risk Analyzer were key
points identified.
• Feedback sought from other DE&S IPT’s who already operated the tool were also
positive which reinforced the selection processes.
• Risk Decisions have worked closely with Tornado IPT to configure Predict! And
develop custom templates for management reporting.
• They also provided a comprehensive training program to ensure that users were able
to get up to speed quickly and realize the benefits from Predict! Risk Controller and
Risk Analyzer.
4. The Benefits
• Risk Management is now co-ordinate across the IPT with regular monthly business
and project reviews being conducted.
• The decision-making process is now risk-based, with clearly defined escalation
processes in place, ensuring risk is managed at the level where it can be influenced.
The Challenge:
• !"#$%!"&'"%('%)"&$(#*%&%$"+"),-."#/%/"&.%/0&/%(#1)2$"'%3,+('%
!"#$%!"&'"%&'%&%-4,5"1/%&#$%1,#'/421/(,#%.&#&*"4%6,4%/0"%
4"'($"#/(&)%$"+"),-."#/%&#$%(#64&'/421/24"%6,4%70&'"%8#"%,6%/0"%
9/4&/6,4$%:(/;%-4,5"1/<%
• =0('%(#+,)+"'%/0"%1,#'/421/(,#%,6%2-%/,%>???%4"'($"#/(&)%$@"))(#*'%
&#$%4")&/"$%&11,..,$&/(,#%/0&/%&4"%$2"%6,4%1,.-)"/(,#%(#%)&/"%
A?BB<%
• C'%/0"%-4"6"44"$%$"+"),-."#/%-&4/#"4%6,4%D,#"'%AEF%,6%/0"%
9/4&/6,4$%:(/;%4"*"#"4&/(,#%'10"."G%/0"%1,.-&#;%#""$"$%/,%
(.-)"."#/%/0"%)&/"'/%4('H%.&#&*"."#/%/"10#,),*("'%&#$%.,$")%,6%
-4,-,'"$%$"+"),-."#/'%-4,1"''"'%/,%0")-%"#'24"%/0"%'211"''62)%
$")(+"4;%,6%/0('%H";%-4,5"1/%,#%I2$*"/%&#$%@(/0(#%/(*0/%/(."'1&)"'<
The Solution:
• !"#$#%&%'(%)$"*(%+$"$+,-.+./#$011$2+.'%##$34,'4$,5'&/)%)$"$
)%(",&%)$"5"&6#,#$.*$"&&$2.(%5(,"&$#.&/(,.5#7$
• 8,#9$:%',#,.5#$3"#$.5%$.*$(4%$.5&6$#/22&,%+#$";&%$(.$)%<.5#(+"(%$"$
(+"'9$+%'.+)$.*$#/''%##*/&$,<2&%<%5("(,.5#$"5)$)%&,=%+6$.*$4,-4$
&%=%&#$.*$#/22.+($(.$.+-"5,>"(,.5#$.*$"$#,<,&"+$#'"&%$3.+9,5-$.5$
&"+-%$'.<2&%?$2+.@%'(#7$$
• A+,.+$(.$,5#("&&"(,.5$.5$B%5)$B%"#%C#$#%+=%+#$;"#%)$,5$D(&"5("E$FGDE$
8,#9$:%',#,.5#$'.5)/'(%)$"$master class$(.$,5(+.)/'%$(4%$'.5'%2($.*$
+,#9$<"5"-%<%5($"($(4%$4,-4%#($&%=%&$"5)$"$#%+,%#$.*$3.+9#4.2#$
3,(4$),**%+%5($#("9%4.&)%+$-+./2#$(.$)%(%+<,5%$'.5*,-/+"(,.5$
+%H/,+%<%5(#7$
• $14%$'.<2"56$4"#$"&#.$2+.=,)%)$")),(,.5"&$'.5#/&("5'6$#/22.+($(.$
"##,#($3,(4$#("9%4.&)%+$<"22,5-$"5)$#%((,5-$"$*+"<%3.+9$(.$
%5";&%$+,#9$<"5"-%<%5($(.$;%$+.&&%)$./($"5)$%<;%))%)$"#$"$'.+%$
2+.'%##$"5)$2+.'%)/+%7$
$
• B%5)$B%"#%$4"#$)%2&.6%)$Predict!E$(4%$&"(%#($%5(%+2+,#%$=%+#,.5$.*$
8,#9$:%',#,.5#C$2.3%+*/&$#/,(%$.*$+,#9$<"5"-%<%5($"5)$"5"&6#,#$
#.*(3"+%$34,'4$,5'&/)%#$Predict! Risk Controller$"5)$Predict! Risk
Analyzer7$
• 0($"&#.$,5(%5)#$(.$,<2&%<%5($A+%),'(I$8,#9$J.5(+.&&%+$B,(%E$"$/5,H/%$
#.&/(,.5$(4"($/#%#$*"<,&,"+$#2+%")#4%%(#$(.$%5";&%$,5*+%H/%5($"5)$
+%<.(%$/#%+#$(.$2+.=,)%$+%-/&"+$/2)"(%#$.5$+,#9#7$
• 14,#$<.)/&%$3,&&$"&#.$;%$"$9%6$'4"5-%$<"5"-%<%5($(..&$(.$"##,#($
,5$(4%$%<;%)),5-$.*$+,#9$<"5"-%<%5($"'+.##$(4%$.+-"5,>"(,.5$"5)$
3,&&$;%$)%2&.6%)$%"+&6$,5$KLLM7$
!
WEEK 5
1. Conduct warmup activities to Ignite Design Thinking
>Warm-ups can be described as exercises one normally runs right before the main
proceedings to help participants relax and ease people into a group activity or
learning situation. Warm-ups go very well with design thinking because they
support many of its attributes, such as being curious and having an open mindset as
well as being mindful of and collaborating with other people.
• Let the participants understand that you don’t just want to do a ‘warm-
up’ with them now. Communicate the goal and reflect on it afterwards if
necessary. Especially when using an ‘educative’ warm-up, e.g.
‘Marshmallow Challenge’ before prototyping, you should debrief it —
active reflection increases the likelihood of understanding and learning.
• For the conduct of the warm-up, give clear instructions and know when a
short demo might be necessary for your audience to better understand the
activity.
• Lastly, I would like to add that you as a facilitator should love and
understand the warm-up you’re choosing and get excited when using it.
Only then will the spark be transmitted to the participants.
>Below, you find some examples of what for and when you can use a warm-up:
• Energize
WEEK 6
1. Organize role play for requirement activities
What is role play?
Role-play or role-paying is the changing of one’s behavior to assume a role, either
unconsciously to fill a social role, or consciously to act out an adapted.
• Be very clear about what you want people to get out of the role playing experience.
• Clear thinking and role play preparation result in clear outcomes.
• Are you assessing skills or are you developing them? If you are assessing people, they
need to know the competency.
• People also need to trust that the role play will have the same level of challenge for
them and their peers.
• Are you giving everyone the same level of challenge, or are you flexing according to
the level of skill
• Allow the other participants to observe the role play and give their comments
afterwards.
• Explain clearly what you want them to look out for.
• It is important though that the (non-professional role player) person or persons
involved in the role play go first.
• Play allows children to use their creativity, developing their imagination, dexterity, and
physical, cognitive, and emotional strength.
• Illiterate
• Semi-Literate
• Literate
• Advanced Literate
WEEK 7
1. Create detailed user stories for the above identified problem
When a vehicle bearing an RFID tag passes through the toll plaza, the reader at
the plaza identifies the unique ID of the tag and transmits the information to the
central clearing house. The toll is instantly debited from the ID account and the
same is transferred to the toll operator concerned through the bank at the end of
the shift or day.
"The system works just like the cards carried by the users of the Delhi Metro,"
Union Minister for Road Transport and Highways, C.P.Joshi told Business
Today.
"This is the first pilot project we are implementing, and we hope to bring
the entire national highway network under the ETC mode in the next two
years," Joshi said.
The new system, once unveiled across India, will significantly reduce the
congestion on expressways and travel time, he added.
A road user needs to register with the agency manning the plaza by giving
details such as his name, address, vehicle type, registration etc, when requesting
the RFID tag. A central database will store the information along with the user's
tag code.
Those registered for the ETC system can also get online statements of toll
payment details.
WEEK 8
1.Create sitemap and wireframe for above created user stories
Create Sitemap wireframe for above created user stories. (Tools such as sketch, Adobe XD,
Figma, etc. can be used.
A developer should follow these five steps to publish GitHub Actions artifacts for download:
2. Specify the path to the folder containing your GitHub Action artifacts
5. Run the GitHub Actions workflow and find the published artifacts on the workflow’s
build page
6. The easiest way to demonstrate how GitHub’s artifact upload action works is to add a
step to a simple workflow that creates a temporary directory. Then, use the touch and
echo commands to create a few simple files. Once a developer completes this action, the
files will publish as artifacts.
Published artifacts in GitHub
If a developer isn’t familiar with the echo and output switch, the following command will
create a file on the local filesystem named alpha.html with the text ‘alpha’ contained within
it:
• When this build runs, the status page of the workflow will include a link to download
a file named assets-for-download.
• zip, which will contain the three files named alpha.html, bravo.html and charlie.html.
• This proves that the script works and makes the GitHub Action artifacts available for
download.
Learn version control and configuration management with GIT:
Step 1:On your computer, you need to install Git first. The process will depend on your
operating system: please follow the instructions below by clicking the relevant button.
What is a repository?
You can think of a repository (aka a repo) as a “main folder”, everything associated with a
specific project should be kept in a repo for that project. Repos can have folders within them,
or just be separate files.
2. Create your own repository and project folder structure
Step 3:Let’s create a new private repository. You can call it whatever you like if the name is
available.
Step 4:Click on Initialise repo with a README.md file. It’s common practice for each
repository to have a README.md file,
Step 5:We will also create a .gitignore file. This file lets Git know what kind of files should
not be included in the repository.
Once you are ready, click on Create repository.
Here is how the repository should look:
You can directly edit your README.md file on Github by clicking on the file and then
selecting Edit this file.
Configuration management with GIT:
Step 6: Examining differences between your current version and the previous upstream
version
• The previous "upstream" version on the ardana branch.
Your current version on the site branch.
He new "upstream" version on the ardana branch.
Step 7: Using stage markers to view clean versions of files (without conflict markers)
Step 10: Resolving the conflict - re-applying your changes to new upstream version
WEEK 10
1. Install and configure Jenkins
Step 1: Setup wizard
On opening the Windows Installer, an Installation Setup Wizard appears, Click Next on the
Setup Wizard to start your installation.
If you get Invalid Logon Error pop-up while trying to test your credentials, follow the
steps explained here to resolve it.
Step 4: Port selection
Specify the port on which Jenkins will be running, Test Port button to validate
whether the specified port if free on your machine or not. Consequently, if the port is
free, it will show a green tick mark as shown below, then click on Next.
Step 5: Select Java home directory
The installation process checks for Java on your machine and prefills the dialog with
the Java home directory. If the needed Java version is not installed on your machine,
you will be prompted to install it.
Once your Java home directory has been selected, click on Next to continue.
Step 6: Custom setup
Select other services that need to be installed with Jenkins and click on Next.
Step 7: Install Jenkins
Click on the Install button to start the installation of Jenkins.
Additionally, clicking on the Install button will show the progress bar of installation, as
shown below:
Step 8: Finish Jenkins installation
Once the installation completes, click on Finish to complete the installation.
Jenkins will be installed as a Windows Service. You can validate this by browsing
the services section, as shown below:
See the upgrade steps when you upgrade to a new release.
Post-installation setup wizard
After downloading, installing and running Jenkins, the post-installation setup wizard begins.
This setup wizard takes you through a few quick "one-off" steps to unlock Jenkins, customize
it with plugins and create the first administrator user through which you can continue
accessing Jenkins.
Unlocking Jenkins
When you first access a new Jenkins instance, you are asked to unlock it using an
automatically-generated password.
Step 1
Browse to http://localhost:8080 (or whichever port you configured for Jenkins when
installing it) and wait until the Unlock Jenkins page appears.
Step 2
The initial Administrator password should be found under the Jenkins installation
path (set at Step 2 in Jenkins Installation).
However, If a custom path for Jenkins installation was selected, then you should check that
location for initialAdminPassword file.
Step 3
Open the highlighted file and copy the content of the initialAdminPassword file.
Step 4
On the Unlock Jenkins page, paste this password into the Administrator
password field and click Continue.
Notes:
● You can also access Jenkins logs in the jenkins.err.log file in your Jenkins
directory specified during the installation.
● The Jenkins log file is another location (in the Jenkins home directory) where
the initial password can also be
obtained.
This password must be entered in the setup wizard on new Jenkins
installations before you can access Jenkins’s main UI. This password also
serves as the default administrator account’s password (with username
"admin") if you happen to skip the subsequent user-creation step in the setup
wizard.
Customizing Jenkins with plugins
After unlocking Jenkins, the Customize Jenkins page appears. Here you can install any
number of useful plugins as part of your initial setup.
● Install suggested plugins - to install the recommended set of plugins, which are
based on most common use cases.
● Select plugins to install - to choose which set of plugins to initially install. When you
first access the plugin selection page, the suggested plugins are selected by default.
If you are not sure what plugins you need, choose Install suggested plugins. You can
install (or remove) additional Jenkins plugins at a later point in time via the Manage
Jenkins > Manage Plugins page in Jenkins.
The setup wizard shows the progression of Jenkins being configured and your chosen set of
Jenkins plugins being installed. This process may take a few minutes.
Finally, after customizing Jenkins with plugins, Jenkins asks you to create your first
administrator user.
1. When the Create First Admin User page appears, specify the details for your
administrator user in the respective fields and click Save and Finish.
2. When the Jenkins is ready page appears, click Start using Jenkins.
Notes:
o This page may indicate Jenkins is almost ready! instead and if so,
click Restart.
o If the page does not automatically refresh after a minute, use your web
browser to refresh the page manually.
3. If required, log in to Jenkins with the credentials of the user you just created and you
are ready to start using Jenkins!
Troubleshooting Windows installation
When installing a service to run under a domain user account, the account must have the right
to logon as a service. This logon permission applies strictly to the local computer and must be
granted in the Local Security Policy.
Perform the following steps below to edit the Local Security Policy of the computer you want
to define the ‘logon as a service’ permission:
Create a container image for Hello world project And Setup build for container image
using Jenkins (Hello world application)
To create a Jenkins freestyle job, log on to your Jenkins dashboard by visiting your Jenkins
installation path. Usually, it will be hosted on localhost at http://localhost:8080 If you have
installed Jenkins in another path, use the appropriate URL to access your dashboard as shown
in the below Jenkins job creation example.
Under Source Code Management, Enter your repository URL. We have a test repository
located at https://github.com/kriru/firstJava.git
It is also possible for you to use a local repository.
If your GitHub repository is private, Jenkins will first validate your login credentials with
GitHub and only then pull the source code from your GitHub repository.
Now that you have provided all the details, it’s time to build the code. Tweak the settings
under the build section to build the code at the time you want. You can even schedule the
build to happen periodically, at set times.
Under build,
2. Click on “Execute Windows batch command” and add the commands you want to
execute during the build process.
Here, I have added the java commands to compile the java code.
java HelloWorld
1. Click Apply
2. Save the project.
Now, in the main screen, Click the Build Now button on the left-hand side to build the source
code.
After clicking on Build now, you can see the status of the build you run under Build
History.
Step 10) See the console output
Click on the build number and then Click on console output to see the status of the build
you run. It should show you a success message, provided you have followed the setup
properly as shown in the below Jenkins create new job example.
In sum, we have executed a HelloWorld program hosted on GitHub. Jenkin pulls the code
from the remote repository and builds continuously at a frequency you define.
WEEK 12
2.Use SonarQube to capture code quality metrics
What is SonarQube ?
SonarQube is an open-source platform developed by SonarSource for continuous
inspection of code quality. Sonar does static code analysis, which provides a detailed
report of bugs, code smells, vulnerabilities, code duplications.
Features:
• Can perform automatic reviews with static code analysis for many problems
that affect code quality.
• Helps maintain quality and reliability of code projects over its life-span using
advanced quality test metrics and graphs.
• Integrates seamlessly with other tools like Jenkins, Atlassian, MSBuild, etc,
which helps productive workflow.
• Supports most popular programming languages like Java, Python, JavaScript,
etc (along with framework support).
In addition to providing information about current and completed sessions in the Systems
Manager console, Session Manager provides you with the ability to audit session activity in
your AWS account using AWS CloudTrail.
CloudTrail captures session API calls through the Systems Manager console, the AWS
Command Line Interface (AWS CLI), and the Systems Manager SDK. You can view the
information on the CloudTrail console or store it in a specified Amazon Simple Storage
Service (Amazon S3) bucket. One Amazon S3 bucket is used for all CloudTrail logs for your
account. For more information, see Logging AWS Systems Manager API calls with AWS
CloudTrail.
With EventBridge, you can set up rules to detect when changes happen to AWS resources.
You can create a rule to detect when a user in your organization starts or ends a session, and
then, for example, receive a notification through Amazon SNS about the event.
EventBridge support for Session Manager relies on records of API operations that were
recorded by CloudTrail. (You can use CloudTrail integration with EventBridge to respond to
most AWS Systems Manager events.) Actions that take place within a session, such as
an exit command, that don't make an API call aren't detected by EventBridge.
The following steps outline how to initiate notifications through Amazon Simple Notification
Service (Amazon SNS) when a Session Manager API event occurs, such as StartSession.
1. Create an Amazon SNS topic to use for sending notifications when the Session Manager
event occurs that you want to track.
For more information, see Create a Topic in the Amazon Simple Notification Service
Developer Guide.
2. Create an EventBridge rule to invoke the Amazon SNS target for the type of Session
Manager event you want to track.
For information about how to create the rule, see Creating an EventBridge Rule That Triggers
on an Event from an AWS Resource in the Amazon EventBridge User Guide.
As you follow the steps to create the rule, make the following selections:
• For Service Name, choose Systems Manager.
• For Event Type, choose AWS API Call through CloudTrail.
• Choose Specific operation(s), and then enter the Session Manager command or commands
(one at a time) you want to receive notifications for. You can
choose StartSession, ResumeSession, and TerminateSession. (EventBridge doesn't
support Get*, List*, and Describe* commands.)
• For Targets, choose SNS topic. For Topic, choose the name of the Amazon SNS topic you created in Step 1.