Systems | Development | Analytics | API | Testing

Microservices

Most Prolonged Interaction With the Microservices Conversion

Back in the 2000s, code lived in one execution thread. Database queries, user interactions, and data pipelines were all managed by the same processes. The problem? Everything was interconnected and interdependent. Fixing one thing might break another. Releases were all or nothing. We call this monolith hell. Your ticket out? Microservices.

Monolith to Microservices: Key Takeaways for the Switch

Back in the 2000s, code lived in one execution thread. Database queries, user interactions, and data pipelines were all managed by the same processes. The problem? Everything was interconnected and interdependent. Fixing one thing might break another. Releases were all or nothing. We call this monolith hell. Your ticket out? Microservices.

Resolving Database Conflicts with Centralized APIs in Microservices

Back in the 2000s, code lived in one execution thread. Database queries, user interactions, and data pipelines were all managed by the same processes. The problem? Everything was interconnected and interdependent. Fixing one thing might break another. Releases were all or nothing. We call this monolith hell. Your ticket out? Microservices.

Mastering Microservices and Breaking Up the Monolith

Back in the 2000s, code lived in one execution thread. Database queries, user interactions, and data pipelines were all managed by the same processes. The problem? Everything was interconnected and interdependent. Fixing one thing might break another. Releases were all or nothing. We call this monolith hell. Your ticket out? Microservices.

Microapps vs. Microservices: the Similarities and Differences

From the end user’s perspective, the microapps and microservices often seem to provide the same functionality. However, development teams need to think about microapps vs. microservices when building products. Before you commit time to microapps or microservices architecture, take some time to consider how these options will affect user experience (UX), user interface (UI), and security of your websites, web apps, and mobile apps.

Secure Internal Microservice Authentication: A Comprehensive Guide

Internal microservice authentication is a critical component of software development. It ensures that only authorized users and services can access sensitive information and perform actions within a system. With the rise of microservices architecture and the increasing complexity of modern software ecosystems, implementing effective authentication mechanisms for internal microservices has become more important than ever.

Testing Microservices and Distributed Systems with JMeter

This blog post is about testing microservices and distributed systems with JMeter. It will focus on the principles of performance testing applications that are architected this way. We will not look at which JMeter samplers to use in order to generate a load against microservices or how to configure these samplers. This post will consider best practise and consideration in designing your performance testing when faced with these applications.

What is the Listen to Yourself Pattern? | Designing Event-Driven Microservices

The Listen to Yourself pattern is implemented by having a microservice emit an event to a platform such as Apache Kafka, and then consuming its own events to perform internal updates. It can be used as a solution to the dual-write problem since it separates Kafka and database writes into different processes. However, it also provides added benefits because it allows microservices to respond quickly to requests by deferring processing to a later time.

What is an API Gateway? A Complete Guide

An API’s main purpose is to allow multiple applications to communicate with one another. However, APIs can easily be made more secure and efficient through API gateways which provide a unified entry point across internal APIs. This unified entry point allows for greater control over user access and helps elevate API security measures like rate limiting while also applying security policies like OAuth or JWT. Plus, API gateways are extremely beneficial for securing microservices.

What is the Event Sourcing Pattern? | Designing Event-Driven Microservices

Event Sourcing is a pattern of storing an object's state as a series of events. Each time the object is updated a new event is written to an append-only log. When the object is loaded from the database, the events are replayed in order, reapplying the necessary changes. The benefit of this approach is that it stores a full history of the object. This can be valuable for debugging, auditing, building new models, and a variety of other situations. It is also a technique that can be used to solve the dual-write problem when working with event-driven architectures.