Elastic Compute Cloud (EC2) EC2 is a web service which provides re-sizable computing resources that could scale out or scale down very easily based on the varying work load. At a very basic level it's nothing but a virtual machine running as a guest on the host machine with the help of a hypervisor. Typically it … Continue reading AWS – EC2, EBS and ELB
Category: Cloud Computing
AWS – Identity and Access Management
Identity and Access Management (IAM) is widely used in most of the enterprises to authenticate and authorize the users to grant access to applications and systems that supports various functions within the organization. It is one of the basic components when it comes to enterprise security and defense in-depth principles that organizations adopt to protect … Continue reading AWS – Identity and Access Management
Service Discovery – Spring Cloud Eureka
In microservices architecture, we tend to create lot of services which are loosely coupled from each other. Inherently this distributed system design has more inter-service communication and hence each service running in cloud should be able to locate other dependent services easily. Service discovery in the past has been done using service locators or configured … Continue reading Service Discovery – Spring Cloud Eureka
Spring Cloud Configuration
In my previous post on Cloud Native Applications, we discussed the benefits of 12 factor application and the characteristics that makes the application cloud ready. Once of the characteristics we discussed was to store the configuration outside the build artifact. Now let's see how we can leverage Spring Cloud Configuration server to store and inject the configuration that … Continue reading Spring Cloud Configuration
Cloud Native Applications
My previous post on Microservices discussed the benefits of decomposing monolithic applications into smaller services which could be deployed independently. We also discussed that microservices is an architectural style which promotes the applications to have a clear separation of concern a.k.a. bounded contexts and use the most appropriate technology stack. Once we embark on the microservices journey, we … Continue reading Cloud Native Applications