Planning the service communication and the cluster setup is one of the important items we should do when developing on Service Fabric (SF). In this article I have tried my best to stick to the minimalist options in setting up the cluster whilst sufficient details by eliminating the common doubts. The motive behind this research … Continue reading Service Communication and Cluster Setup in Service Fabric
Azure Cosmos Db has an impressive feature called 'Change feed'. It enables capturing the changes in the data (inserts and updates) and provides an unified API to access those captured change events. The change event data feed can be used as an event source in the applications. You can read about the overview of this feature … Continue reading Deep dive into Azure Cosmos Db Change Feed
I came across the term 'Overambitious API Gateways' from Thought Works tech radar. The point is, whether is it good or bad to have business logic in the API Gateways? Since the term Gateway is not a functional requirement and serves the purpose of a reverse proxy; it is quite obvious that including business logic … Continue reading Thick API Gateways
Scheduled jobs are common in software systems, most of them perform some kind of a network or data related activity, outside the main execution context and triggered based on a timer event. There are several options available in Azure to implement scheduled jobs. Serverless options Azure Scheduler Azure Batch Custom code in VMs Before digging … Continue reading Schedule Jobs in Azure
Cloud has the proven promise of great opportunities for organizations & ISVs. Modern cloud platforms have low entry barriers and huge array service offerings beyond traditional enterprise application requirements. Cloud and the services provide intact environment to SaaS application providers with cutting edge innovation, agility and computational and storage scale for the global reach.
We keep the credentials and other secrets of the application in the source files. These secrets are visible to developers and being pushed to the source control. In order to avoid this, we can keep the secrets in centralized key management systems - but the credentials of the centralized key management system should be kept in the source files, resulting that at least one credential being placed in the source files. Let's see how to overcome this using Azure Managed Service Identity
Introduction First let me begin with 'What is meant by Shadow IT ?'. In a broader view shadow IT is, any sort of IT usage without the direct governance of IT department of your organization. Sometimes this remains as a violation of the company policies, but the proliferation of the cloud SaaS applications and BYOD … Continue reading Shadow IT – Tradeoff between frictionless user experience and being responsible with AAD V2
Part 1 of this series : Getting started with Azure Stream Analytics. In this post we will combine the reference data from Azure Storage and process the query and write the output events to the Service Bus. These events will be picked by the Azure Logic Apps and the responsible person to maintain the pipe … Continue reading Complex Event Processing (CEP) with Azure Stream Analytics : JOIN with Reference Data