Martin HodgesMy experience adding a MongoDB No-SQL database to my Kubernetes clusterIf you have read my article on how to decide between SQL and No-SQL databases, you may be wondering if you can add a No-SQL MongoDB…Jun 10
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1942Mar 1942
Rajesh vijayakumarManaging Dependencies in Java and Spring: Traditional Flow vs. IoCManaging dependencies efficiently is essential for creating scalable and maintainable software applications. There are two key approaches…9h ago9h ago
InITNEXTbyAbhinav SonkarSecuring Modular Monolith with OAuth2 and Spring SecurityWhere does Authentication and Authorization related code fit in a Modular Monolith? Let’s take a look with Spring Security and OAuth2.May 24May 24
Martin HodgesMy experience adding a MongoDB No-SQL database to my Kubernetes clusterIf you have read my article on how to decide between SQL and No-SQL databases, you may be wondering if you can add a No-SQL MongoDB…Jun 10
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1942
Rajesh vijayakumarManaging Dependencies in Java and Spring: Traditional Flow vs. IoCManaging dependencies efficiently is essential for creating scalable and maintainable software applications. There are two key approaches…9h ago
InITNEXTbyAbhinav SonkarSecuring Modular Monolith with OAuth2 and Spring SecurityWhere does Authentication and Authorization related code fit in a Modular Monolith? Let’s take a look with Spring Security and OAuth2.May 24
InITNEXTbySaeed ZarinfamDeep dive into the Structured Logging in Spring Boot 3.4Benefits of Structured LoggingDec 22
Karanbir SinghSpring Boot 3.4.x Oauth2 Client using RestClient, no reactive dependencyPrior to Spring boot 3.4.x(backed by Spring security 6.4.x) the spring framework worked quite well with Oauth2 Clients but that was not…1d ago
InITNEXTbySaeed ZarinfamTrue Test Coverage with TracingImproving test coverage by understanding the system’s behaviorMay 12