Best of Microservices — April 2024
- 1
- 2
- 3
- 4
- 5
Community Picks·2y
Microservices Crash Course & Moleculer JS Intro
This post provides a crash course on microservices and an introduction to Moleculer JS. It explains the difference between monolithic architecture and microservices, as well as the advantages and disadvantages of using microservices. The post also includes examples of creating microservices using Node.js and the Moleculer framework.
- 6
Community Picks·2y
10 Common Microservices Anti-Patterns
This post discusses common microservices anti-patterns and offers practical solutions to avoid them. It covers topics such as monolith in microservices, chatty microservices, distributed monolith, over-microservices, violating single responsibility, spaghetti architecture, distributed data inconsistency, tight coupling, lack of observability, and ignoring human costs.
- 7
Cerbos·2y
Revolutionize your authorization with Cerbos: A comprehensive video demo
Cerbos is a solution for managing complex authorization schemes, streamlining authorization logic, and securing applications. The video demo showcases how Cerbos Hub handles authorization and offers valuable insights into modern authorization practices.
- 8
Community Picks·2y
How to Identify Dependencies in Your Codebase During Microservices Migration
Migration from a monolithic architecture to microservices presents challenges in identifying and managing dependencies within the codebase. Observability can help shine a light on code dependencies and provide insights for safer and more iterative refactoring. Digma, an IntelliJ plugin, can be used to collect and analyze tracing data to identify areas with high levels of runtime dependencies and reveal performance baselines.
- 9
Hacker News·2y
Distributed Authorization
Distributed Authorization is a new approach to authorization that allows for centralized logic without centralizing all of the authorization data. It works by distributing the evaluation of authorization questions between the server and the client, using local data. This approach offers benefits such as explicit authorization logic, shared authorization data, and optimized list filtering.