System Design | Implementation Rule Book | CheatSheet

By Prithvi Atal, Engineer, Driving High-Performance Solutions

Saturday, May 21, 2022

Database DevOps Toools

›
 For versioning and organizing your database changes there are vwaios devops tools available in market.  The most known ones are  Liquibase ...
Thursday, May 12, 2022

Open-source Library Rule Book

›
Opens-source Library : When to use What ? Chatbot - Apache Tensor Avoid DB Load: ehcache, Elastic Search Intelligence, running queries from ...
Friday, April 22, 2022

Securing Life With Refresh token

›
OAuth 2.0 uses Access Tokens and Refresh Tokens to secure access to applications and resources. Here is the flow: Obtaining OAuth 2.0 access...
Thursday, March 17, 2022

Troubleshooting Elastic Search Cluster

›
Problem: ES Update fails due to Index becomes readOnly Root cause: Elasticsearch automatically sets "read_only_allow_delete": ...
Monday, February 21, 2022

Code that speaks up

›
 Writing code which talks is something the developer would love to have it. In this blog, we will talk about some of the mechanism which mak...
Monday, February 7, 2022

Reliable Message Delivery with RabbitMQ

›
 In RabbitMQ, data safety is being handled by the below two mechanism:  I. Consumer Acknowledgements II.  Publisher confirms Consumer Acknow...
Friday, February 4, 2022

Docker cookbook

›
  docker --version   docker pull <image_name>   docker images  docker run -it -d <image_name>   docker ps  docker ps -a  docker ...
Thursday, February 3, 2022

›
 Runnable JDK 1.0  new Thread( () -> System.out.println("Runnable") ).start() Callbale Java 5 Callable callable = Executors.cal...
Monday, January 24, 2022

Locking : Best Practices

›
  Read Lock: Read lock allows multiple thread to acquire lock in read method when all the synchronizing threads are using only the read lock...
Friday, January 21, 2022

Storage Solutions EBS vs EFS vs S3

›
 AmazonEBS :   High-availability block-level storage volumes for Amazon Elastic Compute Cloud (EC2) instances.  - It is paired with an EC2 i...
Thursday, January 20, 2022

How to make Cross Domain Access

›
You can not allow xhr call to cross domain. Otherwise it would be very risky to allow third party script in your domain code. Here we will g...
Wednesday, January 19, 2022

Designing a Resilient Architecture

›
 Designing a resilient architecture can comprise of following paradigm: I. Does your application has retrial mechanism? II. Is there any mec...

MnagedBean using JMX API

›
 JMX specification supports the following types of Bean: Standard MBeans Dynamic MBeans Open MBeans Model MBeans MXBeans  Managing Resource ...

Controlling Spring Behaviour

›
While developing Spring based application there are instances where we would like to get a control of the spring beans. It comes very handy ...
Saturday, January 15, 2022

The Life with Plugins

›
 In today's world when the boilerplate code is readily available, write  minimum code and connect pluggable functionalities are the way ...
Friday, November 19, 2021

Moving Persistence layer to ES

›
If you are looking for faster reads and writes in the background Elastic search framework suits it best. You don't need to add any cachi...

Designing Caching Layers to speed up Page Load Time

›
  Go Through HAR report and identify the backend services consuming maximum time. Now  identify the bottlenecks and  explore how the respons...
Wednesday, November 17, 2021

Regex Cheat Sheet

›
1.  Matching a set of words :  Hello Brick, Brik data ,Brck -->. Bri?c?k.   More: ^   Start                             $ End            ...
Monday, November 8, 2021

HOW To design a Generic Architecture

›
 In Software it is very essential to craft a solution which caters to the all possible requirements. Thus it would be generic enough to be a...
Wednesday, October 27, 2021

Annotation Driven Design

›
    Annotations are useful to tell: -Constraints or usage of an element: e.g. @Deprecated, @Override, or @NotNull - The "nature" o...
Monday, September 27, 2021

How equipped your application is with Alerting

›
 There are various ways , the application can notify a set of recipients based on the error catrgories.  Spring email: configure logback xml...
Thursday, September 23, 2021

Retryable Programming

›
 Spring retry is one of the implementation in Retryable Programming. Code snippet: Foo foo = template.execute(new RetryCallback<Foo>()...
Wednesday, September 22, 2021

Application Memory Optimisation

›
 An application must be set with enough memory to be able to function as per the SLA. It should not be under or over utilised. Things to be ...
Thursday, September 2, 2021

Shell Scripting Essentials

›
Redirect stderror to output $ cat foo.txt > output.txt 2>&1  // 2 stderror, &1 std output cat nopx.txt > outputx.txt 2>...
Sunday, August 29, 2021

Tomcat Cookbook

›
 #How to find process id of a running program on a given port sudo lsof   -i:8080 sudo lsof   -i:443
1 comment:
Sunday, August 8, 2021

SSH Essentilas

›
Secure shell:  Connect Remote server using SSH protocol -check existing key :ls -al ~/.ssh // It shows existing public and private key pair...
Wednesday, December 16, 2020

Reading the GC Events

›
Real: wall clock time – time from start to finish of the call. User: the amount of CPU time spent in user-mode code (outside the kernel) w...

Elastic Search Cluster Management

›
Steps to do rolling restart of ES cluster: sudo su root docker ps -a docker stop/start <I_ID> docker exec -it <IMG_Id> /bin/bash...
Wednesday, December 9, 2020

Streams Cookbook

›
1.  Stream to Map Map<Integer, String> result3 = list.stream().collect( Collectors.toMap(x -> x.getId(), x -> x....
Friday, July 10, 2020

Java Design : Naming Standards

›
Creational Structural Behavioural Abstract Factory Assember Accumumator ...
‹
›
Home
View web version

About Me

Prithvi Atal
View my complete profile
Powered by Blogger.