In this tutorial, we are demonstrating a step by step guide on how to implement OAuth in MuleSoft API provided by MuleSoft itself as an OAuth Implementation Provider.
Use cases and architectures for Event Streaming, Apache Kafka, Distributed Ledger (DLT) and Blockchain. Comparison: Kafka-native vs Hyperledger vs Ethereum.
if you need session replication, Wildfly instances need to be clustered. To solve this, you can use the Kubernetes discovery protocol for JGroups: KUBE_PING.
AWS Elastic Container Registry can now be setup to automatically scan images on push and provide feedback on vulnerabilities that need to be addressed.