"The success of a production depends on the attention paid to detail."
- David O. Selznick
Microservices must be deployed in isolation and monitored for usage. Monitoring the current workload and processing time also helps to take a decision on when to scale them up or scale them down. Another important aspect of microservices-based architecture is security. One way to secure microservices is to allow each one of them to have their own authentication and authorization module. This approach soon becomes a problem, as each microservice is deployed in isolation, and it becomes incredibly hard to agree on common standards to authorize a user. Also, in this case, the ownership of users and their roles gets distributed across the services. This chapter addresses such issues and provides solutions to secure, monitor, and scale microservices-based applications. In this chapter, you will learn the following things:
- How to enable authentication...