Article
In this article, we'll introduce you to routing your applications via Netflix's Zuul and Spring Cloud Gateway. In a typical microservice architecture we have many small applications running on different hosts and ports. The problem in this type of architecture is how clients (Web Applications in browsers, Mobile apps, Third-party...
Dhananjay Singh
In this article, we'll get introduced to client-side service discovery and load balancing via Spring Cloud Netflix Eureka. In a typical microservice architecture we have many small applications deployed separately and they often need to communicate with each other. Specifically, when we say client service, we mean a service that...
In this article, we'll be diving into Configuring Spring Boot Properties. Spring allows developers to configure a vast amount of properties for their projects. Spring Boot, besides allowing developers to start off with a project from scratch a lot more easily and time friendly than Spring, also makes it a...
Spring Data is an umbrella project which contains many submodules, each specific to a particular database. In this article, we'll be covering Spring Data MongoDB by building an application that stores and retrieves data from MongoDB, a document based NO-SQL database. If you'd like to read more about Spring Data,...
The first action a customer takes after visiting a website is creating an account, usually to place an order, book an appointment, pay for a service, etc. When creating an account it is important to persist the correct email address in the system and verify the user's ownership. A common...
Guest Contributor
These days, password policies are very common and exist on most platforms online. While certain users don't really like them, there's a reason why they exist – making passwords safer. You've most certainly had experience with applications forcing certain rules for your password like the minimum or maximum number of characters...
Password Encoding is the process in which a password is converted from a literal text format into a humanly unreadable sequence of characters. If done correctly, it is very difficult to revert back to the original password and so it helps secure user credentials and prevent unauthorized access to a...
David Landup
In this article, we will look into few approaches of exception handling in Spring REST applications. This tutorial assumes that you have a basic knowledge of Spring and can create simple REST APIs using it. If you'd like to read more about exceptions and custom exceptions in Java, we've covered...
Spring Data JPA is a part of the Spring Data family. Let's talk about what Spring Data JPA is and some of the features we're going to cover in this article. First off, this framework builds upon the popular and powerful Spring framework and is considered one of the core...
Vuk Skobalj
© 2013-2024 Stack Abuse. All rights reserved.