InCoding OdysseybyShivam SrivastavaKafka with Spring Boot: Deep Dive with Interview QuestionsA Comprehensive GuideFeb 86Feb 86
InLevel Up CodingbyAraf Karsh HamidJava 23, SpringBoot 3.4.1: Kubernetes — Part 10Deploying a containerized Spring Boot application with multiple profiles (development, staging, production) in a Kubernetes cluster.Jan 303Jan 303
Eric AnicetSpring Security 6 — Multiple SecurityFilterChain instancesIn this story, we’ll learn how to implement multiple security filter chains in a Spring Boot application using Spring Security.Jan 13Jan 13
Rabinarayan PatraEnhance Java with @ExtensionMethod in Lombok: Clean and Concise Utility MethodsLearn how to use the @ExtensionMethod annotation in Lombok to add utility methods to existing classes. Simplify your code with examples andSep 24, 20246Sep 24, 20246
Melih TaşçıDistributed Lock in Spring Boot by RedissonLet’s say you’re waiting for the sale season to buy a product you need. You receive an email stating that there is a discount on the…Sep 9, 20241Sep 9, 20241
Afdul RohmatImplementation of JWT in Spring Boot 3 using Spring SecurityMaster Spring Security with step-by-step guide to building a secure API using JWT authentication and role-based access control.Jan 9Jan 9
Joud W. AwadRedis Pub/Sub In-DepthA Deep Dive into Redis’s Pub/Sub under the hood and Its Impact on Distributed SystemsJul 26, 20245Jul 26, 20245
InILLUMINATIONbyAraf Karsh HamidJava 23, SpringBoot 3.3.4: AI-Driven Test GenerationThorough automation in application testing is crucial for guaranteeing the dependability and optimal performance of cloud-native…Dec 23, 20246Dec 23, 20246
Lakshitha FernandoJWT, Spring Security 6 and Spring Boot 3 with Simple Project.In this article we will learn about JWT based authentication and authorization with login feature.May 9, 20246May 9, 20246
InLevel Up CodingbyRohit SBackend for Frontend (BFF) ArchitectureIn modern software development, the shift towards microservices, cloud-native architectures, and an ever-growing range of client devices…Sep 24, 202420Sep 24, 202420
Kishan KumarDesigning and Implementing an API Rate Limiter in JavaIn this article, we’ll go over the basics of what an API rate limiter is. We’ll answer fundamental questions such as why we need a rate…Jul 13, 2024Jul 13, 2024
Halil UralIncredible performance increase in Spring Boot 3 applications with CDSBoost Your Spring Boot Application Startup Times with Class Data Sharing (CDS) and Spring AOT — A Step-by-Step Guide to Seamless…Oct 13, 20245Oct 13, 20245
InITNEXTbySaeed ZarinfamPart 3: Writing Integration Test using Spring AI and TestcontainersUsing Testcontainers and ServiceConnections to have a self-contained application and testsOct 14, 20241Oct 14, 20241
InITNEXTbyBenjamin CaneWhy is gRPC so much faster than a JSON-based REST API?Two primary reasons are HTTP/2 and Protobuf.Oct 7, 202430Oct 7, 202430
SidHow Distributed Systems Avoid Race Conditions using Pessimistic LockingUnderstanding Pessimistic Locks, Leases, and Fence Tokens in Distributed SystemsSep 7, 20249Sep 7, 20249
InStackademicbyOliver FosterWhy do many people not recommend using JWT?My article is open to everyone; non-member readers can click this link to read the full text.Sep 16, 202476Sep 16, 202476
Manjula PiyumalMastering Kafka: Advanced Concepts Every Senior Software Engineer Should KnowPhoto by Pietro Jeng on UnsplashAug 24, 20249Aug 24, 20249
InJavarevisitedbyYashodha HettiarachchiDistributed Request Tracing — Spring Boot 3, Micrometer Tracing with OpenTelemetryThe Spring Observability Team has added observability support for Spring Framework 6 and Spring Boot 3. It includes numerous…Jun 9, 2024Jun 9, 2024
InLevel Up CodingbyZeeshan AdilInvalidate/Blacklist the JWT using Redis: Logout Mechanism in Spring SecurityI’ve put together a step-by-step guide on how to implement JWT in your application using Spring 3 and Spring Security 6.Aug 18, 2024Aug 18, 2024