Book Image

Cloud Native Applications with Ballerina

By : Dhanushka Madushan
Book Image

Cloud Native Applications with Ballerina

By: Dhanushka Madushan

Overview of this book

The Ballerina programming language was created by WSO2 for the modern needs of developers where cloud native development techniques have become ubiquitous. Ballerina simplifies how programmers develop and deploy cloud native distributed apps and microservices. Cloud Native Applications with Ballerina will guide you through Ballerina essentials, including variables, types, functions, flow control, security, and more. You'll explore networking as an in-built feature in Ballerina, which makes it a first-class language for distributed computing. With this app development book, you'll learn about different networking protocols as well as different architectural patterns that you can use to implement services on the cloud. As you advance, you'll explore multiple design patterns used in microservice architecture and use serverless in Amazon Web Services (AWS) and Microsoft Azure platforms. You will also get to grips with Docker, Kubernetes, and serverless platforms to simplify maintenance and the deployment process. Later, you'll focus on the Ballerina testing framework along with deployment tools and monitoring tools to build fully automated observable cloud applications. By the end of this book, you will have learned how to apply the Ballerina language for building scalable, resilient, secured, and easy-to-maintain cloud native Ballerina projects and applications.
Table of Contents (15 chapters)
1
Section 1: The Basics
4
Section 2: Building Microservices with Ballerina
8
Section 3: Moving on with Cloud Native

Answers

  1. These are the areas and best practices that we need to keep in mind while developing and monitoring a cloud application:

    a) Monitor trends and alerts on the cloud system. Create an alert system that notifies the infrastructure/operations team of any high consumption of resources.

    b) Use a single platform to monitor all of the deployments. Even though your application is deployed on multiple cloud vendor platforms, use a monitoring tool that lets you create a single monitoring platform that can be used to monitor the overall system.

    c) Make sure to cover all essential components within the application with monitoring tools.

  2. When you are using monitoring applications, you might accidentally expose some sensitive data such as emails, passwords, and key files. Make sure to mask this sensitive data before sending it to monitoring applications. Also, use dynamic secrets that change periodically to avoid exposing API keys and any other sensitive data.