Author: Ayushi Hasija

Reactive Java: Handling Errors in Reactive Streams

Reading Time: 4 minutes  If errors and failures are passed to the right component, which can handle them as notifications, the application can become more fault-tolerant or resilient. So if we build our system to be event-driven, we can more easily achieve scalability and failure tolerance, and a scalable, decoupled, and error-proof application is fast and responsive to users.” Nickolay Tsvetinov Reactive in layman’s language says how quickly the client Continue Reading

Performance Benchmarking Akka Actors vs Java Threads

Reading Time: 3 minutes Think of a scenario where you are standing in front of a long queue of your cafeteria to order your favorite food. Some people might get so frustrated that they leave the queue without even ordering. Thinking of these types of situations cafeteria management decided to introduce a token system. You can simply sit and chit-chat with your friends while waiting for your token number. Continue Reading

Application Logs: Pitfalls and Insights

Reading Time: 3 minutes Introduction In this blog article,we aim to give reader a sense of what is the need of monitoring application logs and a methodology of how we can monitor them using an example. Lets say you have a use case where you would like to monitor important aspects of your application for e.g. temperature” as a measure” or “facet” for multiple devices emitting data for complete Continue Reading

Build your own Kafka Producer

Reading Time: 2 minutes “It’s Not Whether You Get Knocked Down, It’s Whether You Get Up.” – Inspirational Quote By Vince Lombardi Kafka Producer API allows applications to send streams of data to topics in the Kafka cluster. Looking for a way to implement Custom Kafka Producer in your project. This blog post gives you an end to end solution to implement this functionality using KAFKA API. Introduction There Continue Reading

aws

Deep Dive: AWS AssumeRole using STS API

Reading Time: 4 minutes Introduction In this blog post we shall be discussing on AWS:AssumeRole approach for obtaining temporary security credentials using STS(Security Token Service) end to end setup.  Temporary Security Credentials (consisting of access key id, secret access key and a security token) enables you to have an access to AWS Environment for a specified duration. It solves use cases like cross account access and single sign-on to Continue Reading

Scala Extractors

SBT Plugins Reloaded

Reading Time: 3 minutes Are you quite sure that all those bells and whistles, all those wonderful facilities of your so called powerful programming languages, belong to the solution set rather than the problem set? Edsger Dijkstra Plugins provides customization to an existing implementations of your code. Some of the main reasons to include plugins in your code include :- To support adding new features To reduce size of Continue Reading

aws

AWS STS:AssumeRole vs Federation

Reading Time: 2 minutes Introduction AssumeRole and Federation are two widely used approaches provided by AWS to facilitate authorization of cloud resources via Identity Management System (IDMS). In this post, we will describe the Federation and AssumeRole approaches and their integration. We will also see how they are different, and finally, conclude which one serves better. FEDERATED USERS Federated Users(external identities) are users you manage outside of AWS for Continue Reading