Low-risk Monolith to Microservice Evolution

Issue #75 | Sep 29, 2017

Articles

Low-risk Monolith to Microservice Evolution Part I

Christian Posta explains how to explain monolith-application decomposition and what a transition to microservices might look like.

Securing Microservices: The API gateway, authentication and authorization

Article about security in microservices architecture.

Designing and versioning APIs

Offers best practices for managing the interfaces of microservices in your application.

Deep Dive to Hystrix Resiliency Maintenance

Deep dive into Hystrix architecture.

Microservices, bounded context, cohesion

What do they have in common?

Securing your microservice architecture

In this blog series author covers these questions and guides you in applying the security layer to your cloud-native blueprint.

Scaling Event Sourcing for Netflix Downloads, Episode 2

Overview of the general event sourcing pattern and how Netflix team applied it to some of these key use cases.

Literature on Event Sourcing, Event Stores and CQRS

A collection of literature for reading on Event Sourcing/Event Stores and CQRS.

How to guarantee username uniqueness with CQRS/ES?

Author discusses various approaches to find out the solution to this problem.

Comparing Akka Streams, Actors, and Plain Futures

Using Scala futures, using Akka actors, or going for Akka streams?

Communication Between Microservices

ow to Avoid Common Problems?

Projects

Jaeger, a Distributed Tracing System

micro sidecar

Examples of microservices

Videos

How We've Scaled Dropbox

Fast & Efficient Microservices with HTTP/2 and gRPC

Reactive stream processing with Akka Streams