Breaking News: Grepper is joining You.com. Read the official announcement!
Check it out

In a system landscape of microservices, it is in many cases desirable to expose some of the microservices to the outside of the system landscape and hide the remaining microservices from external access. The exposed microservices must be protected against

Pragya Keshap answered on February 17, 2023 Popularity 1/10 Helpfulness 1/10

Contents


More Related Answers

  • microservices communication types
  • When Not to Use Microservices Architectures ?
  • What are the characteristics of Microservices?
  • Write main features of Microservices
  • What are the fundamental characteristics of a microservices design?
  • Which of the following technologies are commonly used to implement microservices?
  • reasons not to use microservices
  • when not to use microservices architecture Anti-patterns of microservices
  • Microservices Decomposition Path
  • What are some of the main characteristics of microservices mentioned by Martin Fowler ?
  • What are the different points to consider for security in Microservices?
  • What is Idempotency of a Microservice operation?
  • How do you ensure that Microservices are scalable and resilient?
  • How to handle security and access control in a Microservices architecture?
  • Start up the microservice landscape with the following command:

  • In a system landscape of microservices, it is in many cases desirable to expose some of the microservices to the outside of the system landscape and hide the remaining microservices from external access. The exposed microservices must be protected against

    0

    Add a new component, an edge server, to the system landscape that all incoming requests will go through:

    Figure 1.10: The edge server design pattern

    Implementation notes: An edge server typically behaves like a reverse proxy and can be integrated with a discovery service to provide dynamic load-balancing capabilities.

    Solution requirements

    Some solution requirements are as follows:

    Hide internal services that should not be exposed outside their context; that is, only route requests to microservices that are configured to allow external requests

    Expose external services and protect them from malicious requests; that is, use standard protocols and best practices such as OAuth, OIDC, JWT tokens, and API keys to ensure that the clients are trustworthy

    Popularity 1/10 Helpfulness 1/10 Language typescript
    Source: Grepper
    Link to this answer
    Share Copy Link
    Contributed on Feb 17 2023
    Pragya Keshap
    0 Answers  Avg Quality 2/10


    X

    Continue with Google

    By continuing, I agree that I have read and agree to Greppers's Terms of Service and Privacy Policy.
    X
    Grepper Account Login Required

    Oops, You will need to install Grepper and log-in to perform this action.