reactive microsystems
play

Reactive Microsystems The Evolution of Microservices at Scale - PowerPoint PPT Presentation

Reactive Microsystems The Evolution of Microservices at Scale Jonas Bonr @jboner Microservices Are Hyped So You Want To strangle The Almighty Monolith And Move Towards Microservices? Do Not Settle For Microliths Microlith Single


  1. vs Commands Events 1. Intentless 1. All about intent

  2. vs Commands Events 1. Intentless 1. All about intent 2. Directed 2. Anonymous

  3. vs Commands Events 1. Intentless 1. All about intent 2. Directed 2. Anonymous 3. S ingle addressable 3. Just happens - for destination others (0-N) to observe

  4. vs Commands Events 1. Intentless 1. All about intent 2. Directed 2. Anonymous 3. S ingle addressable 3. Just happens - for destination others (0-N) to observe 4. Models personal 4. Models broadcast communication (speakers corner)

  5. vs Commands Events 1. Intentless 1. All about intent 2. Directed 2. Anonymous 3. S ingle addressable 3. Just happens - for destination others (0-N) to observe 4. Models personal 4. Models broadcast communication (speakers corner) 5. Distributed focus 5. Local focus

  6. vs Commands Events 1. Intentless 1. All about intent 2. Directed 2. Anonymous 3. S ingle addressable 3. Just happens - for destination others (0-N) to observe 4. Models personal 4. Models broadcast communication (speakers corner) 5. Distributed focus 5. Local focus 6. Command & Control 6. Autonomy

  7. Let the Events Define the Bounded Context

  8. Are we done now? Perhaps. We have come a long way. But events can also be used for: ➡ Persistence ➡ Managing time

  9. Event Based Persistence

  10. “Update-in-place strikes systems designers as a cardinal sin: it violates traditional accounting practices that have been observed for hundreds of years.” - jim Gray The Transaction Concept, Jim Gray (1981)

  11. Event Logging The Bedrock

  12. “The truth is the log. The database is a cache of a subset of the log.” - Pat Helland Immutability Changes Everything, Pat Helland (2015)

  13. The Log A Database Of the Past Not Just the Present

  14. Event Sourcing A Cure For the Cardinal Sin

  15. Event Sourced Services

  16. Event Sourced Services Happy Path

  17. Event Sourced Services 1) Receive and verify Command Happy Path (“ApprovePayment”)

  18. Event Sourced Services 1) Receive and verify Command 2) Create new Event Happy Path (“ApprovePayment”) (“PaymentApproved”)

  19. Event Sourced Services 1) Receive and verify Command 2) Create new Event 3) Append Event Happy Path (“ApprovePayment”) (“PaymentApproved”) to Event Log

  20. Event Sourced Services 1) Receive and verify Command 2) Create new Event 3) Append Event 4) Update internal Happy Path (“ApprovePayment”) (“PaymentApproved”) to Event Log component state

  21. Event Sourced Services 1) Receive and verify Command 2) Create new Event 3) Append Event 4) Update internal 5) Run side-effects Happy Path (“ApprovePayment”) (“PaymentApproved”) to Event Log component state (approve the payment)

  22. Event Sourced Services 1) Receive and verify Command 2) Create new Event 3) Append Event 4) Update internal 5) Run side-effects Happy Path (“ApprovePayment”) (“PaymentApproved”) to Event Log component state (approve the payment) SAD Path - recovering from failure

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend