Data privacy and security became critical nowadays. Thus, we need to isolate database credentials and make it transparent to our applications/services.
Isolate any target host’s credentials (hostname, user, password) from Ansible Playbook. And let the playbook retrieve those information from secret management tools (Hashicorp Vault) during targets provisioning.
Overview In this article, I will provide a simple example to secure REST example by using Oauth2. I will not explain what Oauth2 protocol is all about in detail. In short, to implement this authorization […]
One of the main component of micro service architecture is service discovery (SD). So far in this blog I mentioned two tools for service discovery, which are Eureka and Consul. But if you may notice, whenever I used spring-cloud framework, I always choose Eureka. On the other hand, I pick consul when I talked about Golang.
Overview In this article, I will revisit a little bit my old article, but still valid, regarding monitoring your services. As you can see in my previous article, I wrote about monitoring service in Go […]
Overview The rise of micro-services brings another level of software architecture, which is a event driven architecture. One of the tools out there to support this mechanism is Apache Kafka. Today’s article will speak about […]
Overview In Java world, when it comes to database connectivity, there are two main approaches to deal with. First one is direct JDBC connection by using DriverManager. The other one is by using data source. […]
Overview In this short blog post, I will explain how to import certificate into Java Keystore. This steps is useful whenever you need to access HTTPS from JVM. Export the certificate from your browser as […]
Token-based authentication, relies on Token for determine whether the request is authorized or not. And JWT is one of token-based authentication.