MONOLITHIC VS MICRO-SERVICES: CHOOSING THE RIGHT ARCHITECTURE

The Great Debate When building software systems, one of the most critical architectural decisions you’ll face is choosing between monolithic and microservices architectures. Both approaches have passionate advocates, and for good reason—each shines in different contexts. Let’s cut through the…

How to enable basic authentication to weblogic applications.

Below are the contents of the policy file. If you are using versioning for your application your policy file will look like below. The changes are highlighted in blue for the versioned deployments. connect(“weblogic”,”weblogic123″,”t3://localhost:7001″) cd(‘/SecurityConfiguration/base_domain/Realms/myrealm/Authorizers/XACMLAuthorizer’) cmo.deletePolicy(‘urn:bea:xacml:2.0:entitlement:resource:type@E@Fapp@G@M@Oapplication@Esample#v1′,’1.0’) exit() In this example…

Jboss Migration from EAP 7 to EAP8

Migrating from RedHat JBoss7 to RedHat JBoss8 involves several steps. Here’s a general outline: 1. Review Documentation: Start by reading the migration guide provided by RedHat for JBoss7 to JBoss8. 2. Backup Current Environment: Make sure to backup your existing…

Identify high cpu utilising threads

Identifying threads that are consuming a high amount of CPU from a thread dump can be a bit tricky because thread dumps alone do not show CPU usage directly. They give a snapshot of what each thread is doing at…