Hazelcast Metrics via Prometheus

A step-by-step guide on how to collect Hazelcast metrics via Prometheus. The tutorial is aimed at those who are running a customized Hazelcast microservice, rather than the full-blown zip-file/dockers. The guide covers all the necessary steps, from adding the Prometheus dependency to Java code configuration, updating application YAML and Dockerfile, to updating the ServiceMonitor. The article also offers helpful hints and sources for further reading.

12.09.2024

Robert Danczak

Part 3: Enabling annotation-based scraping

After showing how to get an OpenTelemetry Collector to support Prometheus CRDs as scrape targets, we discover how to integrate another well-known approach to mark workloads as scrape targets. Now, we focus on annotation-based scraping - what is it, when would we want to use it and how can we integrate it in our OpenTelemetry stack? In this article, we provide answers to all these questions, and more.

02.08.2024

Mikel Jason Münnekhoff, Sherief Ahmed

Part 1: The Basics

Automate your Flutter app deployment with this step-by-step guide using Fastlane and GitHub Actions. The article provides the necessary code snippets, for setting up the Fastlane files and environment, defining lanes for deployment to the App Store and Play Store, and automating the process using GitHub Actions. Overall, this article is an essential guide to streamlining the app deployment process, and it’s perfect for Flutter developers looking to automate their workflow.

19.07.2024

Dario Digregorio

Part 7: Token Cloning

Building on the previous post, we discuss an architectural pattern for token handling called ’therapeutic token cloning’, which is particularly effective in environments that use multiple identity and access management products. The pattern involves duplicating, correcting, and then re-signing access tokens to make them functional and more secure. This article details the steps involved in the token cloning process, as well as the pros and cons of this approach.

03.07.2024

Alexander Suchier

Part 6: Token Validation

This time we discuss token validation in the context of the Kong Gateway, covering topics such as OpenID Connect, OAuth 2.0, and Zero-Trust Architecture. The article explains the different types of tokens, the benefits of offline validation, and the various Kong plugins that support token validation. The article notes that architectural trade-offs may be required regarding revocation and fine-grained authorization validation, and concludes that Kong Gateway offers ample options for token validation, including the ability to write custom plugins.

06.06.2024

Alexander Suchier