Book Image

Scala Microservices

By : Selvam Palanimalai, Jatin Puri
Book Image

Scala Microservices

By: Selvam Palanimalai, Jatin Puri

Overview of this book

<p>In this book we will learn what it takes to build great applications using Microservices, the pitfalls associated with such a design and the techniques to avoid them. </p><p>We learn to build highly performant applications using Play Framework. You will understand the importance of writing code that is asynchronous and nonblocking and how Play leverages this paradigm for higher throughput. The book introduces Reactive Manifesto and uses Lagom Framework to implement the suggested paradigms. Lagom teaches us to: build applications that are scalable and resilient to failures, and solves problems faced with microservices like service gateway, service discovery, communication and so on. Message Passing is used as a means to achieve resilience and CQRS with Event Sourcing helps us in modelling data for highly interactive applications. </p><p>The book also shares effective development processes for large teams by using good version control workflow, continuous integration and deployment strategies. We introduce Docker containers and Kubernetes orchestrator. Finally, we look at end to end deployment of a set of scala microservices in kubernetes with load balancing, service discovery and rolling deployments. </p><p></p>
Table of Contents (12 chapters)

K8s security

It's important to secure your kubernetes installation using cryptographic encryption. Especially by letting the application developer pick and choose the technology stack to define container images, cluster ends up with a diverse set of containers running. The chances of vulnerabilities showing up is high.

There are many security features in kubernetes and in public cloud to secure your business data. There are two broad levels of protection that can be configured.

Based on your team's knowledge and expertise, you should decide which level to invest more in. It is important to note that the simplest security features, sometimes have the maximum impact. It is important to understand the security implications of each level, before working on it.

Network level

...