Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Hands-On Cloud Development with WildFly
  • Toc
  • feedback
Hands-On Cloud Development with WildFly

Hands-On Cloud Development with WildFly

By : Tomasz Adamski
4.5 (2)
close
Hands-On Cloud Development with WildFly

Hands-On Cloud Development with WildFly

4.5 (2)
By: Tomasz Adamski

Overview of this book

The book starts by introducing you to WildFly Swarm—a tool that allows you to create runnable microservices from Java EE components. You’ll learn the basics of Swarm operation—creating microservices containing only the parts of enterprise runtime needed in a specific case. Later, you’ll learn how to configure and test those services. In order to deploy our services in the cloud, we’ll use OpenShift. You’ll get to know basic information on its architecture, features, and relationship to Docker and Kubernetes. Later, you’ll learn how to deploy and configure your services to run in the OpenShift cloud. In the last part of the book, you’ll see how to make your application production-ready. You’ll find out how to configure continuous integration for your services using Jenkins, make your application resistant to network failures using Hystrix, and how to secure them using Keycloak. By the end of the book, you’ll have a functional example application and will have practical knowledge of Java EE cloud development that can be used as a reference in your other projects.
Table of Contents (14 chapters)
close

SSL configuration

As we mentioned at the beginning of this chapter, when we describe bearer tokens, when you use this kind of authentication in a production environment, you have to use encrypted connections. In this section, we will describe how WildFly Swarm and OpenShift support the use of secure connections.

We will separate this section into two different cases, depending on whether we consider our cloud environment to be secured or not.

Secured cloud

In a scenario where the cloud environment that you are using is secure, you will need to configure an encrypted connection between external clients and routers:

In such a case, we have to configure an Edge router. An Edge router has its own certificate and is able to establish...

bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete