One of the main component of micro service architecture is service discovery (SD). So far in this blog I mentioned two tools for service discovery, which are Eureka and Consul. But if you may notice, whenever I used spring-cloud framework, I always choose Eureka. On the other hand, I pick consul when I talked about Golang.
a story about helping another scrum team to find their own way to deal with their internal issue
Overview Leader (L): “Hey Anna, can you please check on Team XXX burndown chart for the last three sprints, please?” Me (M): “Sure. What’s the issue?” L: “Well it looks weird for me, they never fully complete […]
Overview In this article, I will revisit a little bit my old article, but still valid, regarding monitoring your services. As you can see in my previous article, I wrote about monitoring service in Go […]
Overview The rise of micro-services brings another level of software architecture, which is a event driven architecture. One of the tools out there to support this mechanism is Apache Kafka. Today’s article will speak about […]
Overview In my previous post, I wrote an article about configuring data source by using Hikari CP. However, there are times that we need more than one database connection in an application. Later in this […]
Overview In Java world, when it comes to database connectivity, there are two main approaches to deal with. First one is direct JDBC connection by using DriverManager. The other one is by using data source. […]
Overview In this short blog post, I will explain how to import certificate into Java Keystore. This steps is useful whenever you need to access HTTPS from JVM. Export the certificate from your browser as […]
Introduction Let’s picture this scenario: You are planning to go fishing by boat. You have prepared everything for weeks. You have checked the boat to make sure it’s secure and save, prepared your fishing equipment, prepared […]
Token-based authentication, relies on Token for determine whether the request is authorized or not. And JWT is one of token-based authentication.