It’s pretty common to log incoming requests or message bodies via Log component. Usually, logging incoming data is harmless. However, sometime you may accidentally include secure/sensitive information. What to do in this case ?
Suppose, you have a task to implement dynamic routes configuration with Apache Camel. Or more concretely, you want to create Camel routes without having to add new route definitions just by changing configuration.
I recently encountered similar task, and as it turned out — there is a simple way to get things done . So, in this post I will share the solution.
In the post I will give practical comparison of using different Java classes for implementing the same toy problem: finding sum of integers in given range.
Different people mean different things, when they talk about
observability. To stay practical and concrete, by observability I mean
monitoring, tracing and logging. In this post I will give recipe of adding monitoring to your Spring Boot service with Prometheus and Grafana.
TL;DR If you prefer reading code vs reading posts — just follow this link.
Kafka Provision Spring Boot Starter enables distributed Kafka topics provisioning and centralized topic configs management.
Database Transaction represents a unit of work, that is atomic, consistent, isolated and durable (a.k.a.
Back-pressure is an important feedback mechanism that allows systems to gracefully respond to load rather than collapse under it. The back-pressure may cascade all the way up to the user, at which point responsiveness may degrade, but this mechanism will ensure that the system is resilient under load.
An important aspect of
reactive approach to concurrent programming is non-blocking processing. This post compares blocking vs non-blocking processing in general terms to highlight
reactive idea in a nutshell.
How to clone all github repositories for specific organization?