Book Image

Microservices with Clojure

By : Anuj Kumar
Book Image

Microservices with Clojure

By: Anuj Kumar

Overview of this book

The microservice architecture is sweeping the world as the de facto pattern with which to design and build scalable, easy-tomaintain web applications. This book will teach you common patterns and practices, and will show you how to apply these using the Clojure programming language. This book will teach you the fundamental concepts of architectural design and RESTful communication, and show you patterns that provide manageable code that is supportable in development and at scale in production. We will provide you with examples of how to put these concepts and patterns into practice with Clojure. This book will explain and illustrate, with practical examples, how teams of all sizes can start solving problems with microservices. You will learn the importance of writing code that is asynchronous and non-blocking and how Pedestal helps us do this. Later, the book explains how to build Reactive microservices in Clojure that adhere to the principles underlying the Reactive Manifesto. We finish off by showing you various ways to monitor, test, and secure your microservices. By the end, you will be fully capable of setting up, modifying, and deploying a microservice with Clojure and Pedestal.
Table of Contents (18 chapters)
Title Page
Dedication
Packt Upsell
Contributors
Preface
Index

Chapter 11. Deploying and Monitoring Secured Microservices

"The success of a production depends on the attention paid to detail."

- David O. Selznick

Microservices must be deployed in isolation and monitored for usage. Monitoring the current workload and processing time also helps to take a decision on when to scale them up or scale them down. Another important aspect of microservices-based architecture is security. One way to secure microservices is to allow each one of them to have their own authentication and authorization module. This approach soon becomes a problem, as each microservice is deployed in isolation, and it becomes incredibly hard to agree on common standards to authorize a user. Also, in this case, the ownership of users and their roles gets distributed across the services. This chapter addresses such issues and provides solutions to secure, monitor, and scale microservices-based applications. In this chapter, you will learn the following things:

  • How to enable authentication...