Migrating away from legacy monoliths can feel like navigating a labyrinth, but strategic patterns like Strangler Fig, Branch by Abstraction, and Parallel Run simplify the journey. Hereโs a quick dive into how they work, when to use them, and how to decide when to switch completely to the new implementation. 1. Strangler Fig Applications What…
Using AI Agents to Create Self-Healing Clouds
Self-healing clouds are environments where operational issues are detected and resolved automatically, with minimal or zero human intervention. Modern cloud applicationsโoften composed of microservices, containers, and serverless functionsโgenerate enormous volumes of logs and telemetry data. This data reflects health, performance, and interactions across multiple services. AI-powered agents can continuously consume this data to spot anomalies,…
Token Bucket Algorithm for Message Fairness
๐๐ฌ๐ข๐ง๐ ๐๐จ๐ค๐๐ง ๐๐ฎ๐๐ค๐๐ญ ๐๐ฅ๐ ๐จ๐ซ๐ข๐ญ๐ก๐ฆ ๐ญ๐จ ๐๐จ๐ฅ๐ฏ๐ ๐๐๐ฌ๐ฌ๐๐ ๐ ๐๐ญ๐๐ซ๐ฏ๐๐ญ๐ข๐จ๐ง ๐ข๐ง ๐๐ฎ๐ฅ๐ญ๐ข-๐๐๐ง๐๐ง๐ญ ๐๐ฒ๐ฌ๐ญ๐๐ฆ๐ฌ In the world of multi-tenant cloud solutions, ensuring fair resource allocation can be challenging. One common issue is message starvation, where high-volume tenants monopolize processing resources, leaving others waiting. Here’s how this can be tackled using the Token Bucket algorithm: The Token Bucket Approach…
Operational Transformation algorithm for collaborative editing(e.g. Google Docs)
Ever wondered how tools like Google Docs allow multiple people to edit a document simultaneously, without chaos? The answer lies in Operational Transformation (OT), an algorithm designed to handle conflicts and ensure consistency in collaborative editing. What is OT? Operational Transformation is the backbone of real-time collaboration systems. It ensures that all users see a…
Key Indicators of Poorly Defined Microservice Boundaries
Designing a microservices architecture requires thoughtful consideration and careful planning. Incorrectly defining the boundaries between services can lead to significant complications, from development headaches to scaling nightmares. Recognizing the signs of poorly defined service boundaries early can save your team time, money, and frustration. Here are the critical indicators that suggest your microservices might be…
Breaking down pod deployment in Kubernetes
Kubernetes is a powerful container orchestration platform that automates the deployment, scaling, and management of containerized applications. In this blog post, we’ll walk through the step-by-step process of deploying a pod in Kubernetes, diving into the interactions between the various components. Process Overview: 1. Pod Creation Request: The journey begins with a user or controller…
Service Templates in Microservices
Introduction In the ecosystem of microservices, establishing a common foundation(template) for all services not only promotes uniformity but also significantly enhances development efficiency and system maintainability. Spring Boot, known for its “convention over configuration” approach, provides an ideal platform for implementing such a foundation through a template configuration. This blog will explore how to create…
Tackling Technical Debt
Introduction Version control is a valuable tool that can be used to identify areas that need attention to tackle technical debt effectively. By using version control to analyze file frequency and code changes, developers can prioritize their efforts and address the most critical areas first. Analyzing File Frequency and Code Changes Using version control, developers…
Clean Architecture – Notes
There are lot of details in the book – clean architecture. The points below just capture what impacted me the most. Hope the points below would nudge you to go through the book yourself. The higher the number of dependencies on a class/module, the more legacy it becomes. Keep your business logic protected from details…
Kubernetes security practices – Securing K8s cluster
Let us try to capture some of the steps that can be taken to secure a kubernetes cluster. Image Scanning