Monitoring Security and Deployment

So far, we have our application logic built. Throughout this process, we applied DDD, internal design patterns, and design patterns of communication between microservices. We looked at the concepts of scalability, anti-patterns, and good development practices.

Now, it's time to learn how to keep our application in production. We will cover a wide range of topics, such as:

  • Monitoring services
  • Understanding metric numbers
  • Authentication and authorization services
  • Single Sign-On
  • Security data
  • The human factor
  • Identifying attacks
  • The API gateway
  • Continuous integration/delivery
  • The deployment pipeline
  • Multiple service instances per host
  • Service instance per host
  • Service instance per VM
  • Service instance per container ...

Get Microservice Patterns and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.