Unless you’ve been developing software in a cave, you’ve probably heard people sing the praises of microservices. They’re agile, simple, and an overall improvement on the monolith and service-oriented architecture days. But of course, with all the benefits of microservices comes a new set of challenges.
In this article, we’ll look at some microservices best practices. Plus, we’ll suggest a few proven ways to help you design, orchestrate, and secure your microservices architecture. By understanding these practices, you’ll have a head start on a successful project.
Building a stellar application that users will love consists of many different decisions, from UI design and color palettes to functionality and feature sets. Writing code that works is a creative process, but it’s only one part of the entire development process. Your app also needs to be secure — not just for the sake of your users, but also for the integrity of your business. Typical security measures when designing your software architecture include:
A common architectural design pattern these days is to break up an application monolith into smaller microservices. Each microservice is then responsible for a specific aspect or feature of your app. For example, one microservice might be responsible for serving external API requests, while another might handle data fetching for your frontend.
Designing a robust and fail-safe infrastructure in this way can be challenging. Monitoring the operations of all these microservices together can be even harder.
It’s best not to simply rely on your application logs for an understanding of your systems’ successes and errors. Setting up proper monitoring will…
Earlier this year, a post came out on the Salesforce Developers Blog, entitled “How to Build Progressive Web Apps with Offline Support using Lightning Web Components.” During the post’s discussion about using Lightning Web Components (LWC) to build progressive web apps, it mentioned push notifications. My interest was piqued. How simple would it be to use LWC to build an app for push notifications? It turns out — really simple.
While a PWA can be used in a web browser like any standard web application, the PWA’s power comes from users being able to “install” the PWA to their desktop…
Web applications are optimized for throughput and latency to service a high number of HTTP requests as quickly as possible. For improved performance, web applications defer the CPU intensive, IO intensive, time-intensive, and scheduled processing workloads to background jobs that run independently of the user interface. These background jobs must function without intervention from the user interface and should not block a synchronous user and system interaction. Offloading slow and compute or memory-intensive activity to background jobs improves web applications’ performance and throughput.
For example, consider an eCommerce web application that captures a customer’s orders and triggers the background jobs…
In one sense, these frameworks worked well. They introduced new UI patterns and dynamic websites at a time when desktop and mobile browsers…
Salesforce Modern App Development — Part 1
As someone who became a Salesforce developer “by accident” 10 years ago and parlayed that into a career and business, I’m fully aware of the dividends that investing in continuous learning and brushing up on the latest in my industry can yield. …
As a full-stack developer who often takes on DevOps and infrastructure responsibilities, the following happens all too frequently.
Problem: I need to set up a backend server for my app!
Solution: Google it!
Google result #1:
Hmm, let’s try that again…
Okay, maybe it’s just this article. Let’s try a different one.
Google result #2:
Kubernetes has become the name of the game when it comes to container orchestration. It allows teams to deploy and scale applications to meet changes in demand while providing a great developer experience.
The key to handling modern, dynamic, and scalable workloads in Kubernetes is a networking stack that can deliver API management, a service mesh, and an ingress controller. Kong Ingress Controller allows users to manage the routing rules that control external user access to the service in a Kubernetes cluster from the same platform.
This article will look at how you can use Kong for full-stack application deployments…