Both Kafka and Docker are pretty complex technologies, and it can be difficult to determine where to get started once you’re sure that they’re the right fit for the problem you’re solving. To keep things simple for this tutorial, we’ll create one producer, one consumer, and one Kafka instance.
Kubernetes is not a secure platform. It lacks native tooling to handle most security-related tasks. This article list security principles to secure a cluster.
Overprovisioned Kubernetes workloads are a growing concern for developer teams, particularly as budget efficiency becomes more important. This article walks through an open source way to avoid overprovisioning Kubernetes workloads with a single click.
Microservice applications can run in many ways, with different tradeoffs and cost structures. Let’s go over the 5 main ways we can deploy microservices.
Apache APISIX provides service discovery clients. Write your own by following the steps in this tutorial to implement a node registry based on a YAML file.