Book Image

Microservice Patterns and Best Practices

By : Vinicius Feitosa Pacheco
Book Image

Microservice Patterns and Best Practices

By: Vinicius Feitosa Pacheco

Overview of this book

Microservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through different design patterns at different stages of the microservice application development along with their best practices. Microservice Patterns and Best Practices starts with the learning of microservices key concepts and showing how to make the right choices while designing microservices. You will then move onto internal microservices application patterns, such as caching strategy, asynchronism, CQRS and event sourcing, circuit breaker, and bulkheads. As you progress, you'll learn the design patterns of microservices. The book will guide you on where to use the perfect design pattern at the application development stage and how to break monolithic application into microservices. You will also be taken through the best practices and patterns involved while testing, securing, and deploying your microservice application. At the end of the book, you will easily be able to create interoperable microservices, which are testable and prepared for optimum performance.
Table of Contents (20 chapters)
Title Page
Dedication
Packt Upsell
Contributors
Preface
Index

Chapter 13. Monitoring Security and Deployment

So far, we have our application logic built. Throughout this process, we applied DDD, internal design patterns, and design patterns of communication between microservices. We looked at the concepts of scalability, anti-patterns, and good development practices.

Now, it's time to learn how to keep our application in production. We will cover a wide range of topics, such as:

  • Monitoring services
  • Understanding metric numbers
  • Authentication and authorization services
  • Single Sign-On
  • Security data
  • The human factor
  • Identifying attacks
  • The API gateway
  • Continuous integration/delivery
  • The deployment pipeline
  • Multiple service instances per host
  • Service instance per host
  • Service instance per VM
  • Service instance per container

No doubt it will be a great chapter with many new aspects to understand.