Introduction Tests can arguably be more important than the code itself. You always get asked about your test coverage, what tests do you use, how did you implement them… People even discuss the famous Pyramid of Tests and try to implement as much as they can in their codebase. Architecture Tests are like the hidden
Introduction If you’re an enthusiast like myself, you will get excited when Microsoft release some sort of updates on the language, new libraries or any documentation on what is the new fancy way of doing ‘This’. Microsoft target those releases to respond and enhance our development experience, thus each feature is the answer to a
Kubernetes is an open-source container management system used in large-scale enterprises in several dynamic industries to perform a mission-critical task or an orchestration task. Some of its capabilities include the following: It manages the containers inside the cluster. It deploys applications to which it provides tools. It scales the applications as per requirement. It manages the
Introduction Cloud native applications, with their distributed architectures that comprise many third-party libraries and services, are an attractive target for hackers. The fact that 82% of all vulnerabilities are found in application code is not lost on attackers, who seek to use this vector to compromise the networks on which the application is deployed. Securing
In this article, we are going to discuss Microservices Distributed Transaction Management when performing CRUD operations. As you know that we learned practices and patterns about Microservices Data Design patterns and add them into our design toolbox. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to manage distributed transaction in Microservices Architectures with applying Microservices Data Design patterns and principles. Microservices Distributed Transactions