Enforcing rate limits on microservices is a common requirement in the API economy. In this article, we are going to build a custom rate limiting solution.
Safely manage your company's secrets by learning how to access Vault via Node.js applications, retrieve secrets, and interface with Vault via Web UI and CLI.
Great productivity-boosting tools for Apache Kafka developers, a feature-rich HTTP Kafka client, a command line processor, a Kafka Streams topology visualizer, and more.
Tools like Splunk, ELK, and Sumo Logic have made it faster to search logs but all these tools suffer operational noise which is the silent killer of IT and businesses.
Logging is an important pillar of observability in microservices architecture. Structured logging can be leveraged to enable many business-critical functionalities.
Redis is a great platform for caching. Unfortunately, free options for integrating it into Hibernate as L2 cache are lacking. Let's see if we can fix that.
Spring Cloud Config is the basic part of every distributed and Cloud-based architecture. Actually, it provides client-side and server-side configuration for that systems.
Bags are data structures that permit holding duplicates in any order. This is similar to a physical bag, where you could also put any elements and take them out randomly.
We discuss how to easily configure an SSL/TLS connection in Java to secure your application better. This setup can also easily be used for Scala and Kotlin.