In the realm of software development and system monitoring, three crucial components play a pivotal role in ensuring the smooth operation and maintenance of applications: logging, tracing, and metrics. Each of these elements serves a unique purpose and provides distinct insights into the system’s behavior and performance. Understanding their differences and applications is essential for building robust and efficient monitoring and diagnostic systems.
F.Marchioni
Testing JPA with TestContainers
Testcontainers is an open-source Java library that simplifies integration testing by providing lightweight, disposable containers for database systems, message brokers, and other third-party services. In this article we will learn how to combine Testcontainer with a JPA/Hibernate Test case.
Using RAG with Langchain4j and Ollama3
Retrieval-Augmented Generation (RAG) is a framework that enhances the capabilities of generative language models by incorporating relevant information retrieved from a large corpus of documents. This combination helps improve the accuracy and relevance of the generated responses. In this article we will learn how to use RAG with Langchain4j.
How to remove the H2 Database in WildFly
WildFly application server ships with a default in-Memory Database, the H2 DB. In this short article we will learn how to remove the H2 Database from WildFly / JBoss configuration correctly.
How to Start, Stop and Restart JBoss or WildFly
This guide contains some tips to teach you how to start, stop, restart WildFly application server. By the end of this tutorial, you will be able to effectively manage the lifecycle of your Wildfly server as needed. First of all, WildFly can be run in two modes: Standalone mode and Domain mode. Booting WildFly in … Read more
Configuring WildFly as Reverse Proxy
In this tutorial we will learn how to configure WildFly or JBoss to reverse proxy requests to another application server. We will first discuss the basics of reverse proxying and then we will show the commands to achieve the correct configuration. Reverse Proxy vs. Forward Proxy Before diving into Undertow’s reverse proxy capabilities, it’s essential … Read more
HTTP Client for Keycloak using OpenID Connect
In modern web applications, authentication and authorization are critical components. Keycloak is a powerful open-source identity and access management solution for modern applications and services. This article will guide you through creating a Java HTTP client to test OpenID Connect token authentication with Keycloak, and we will also demonstrate the equivalent steps using curl. Prerequisites … Read more
How to Map Your DTO Objects with MapStruct
In this tutorial, we will learn how to map your Data Transfer Objects (DTO) using the MapStruct framework and integrate it into a Jakarta EE application. Understanding DTO Objects DTO Objects are used to decouple the database model from the view that is transferred to the client. They are intended to be immutable objects, used … Read more
How to configure CORS in Quarkus applications
Here’s a step-by-step tutorial on how to configure Cross-Origin Resource Sharing (CORS) in Quarkus applications with just a few configuration tweaks.
How do I get the physical Connection with JBoss or WildFly ?
This article will teach how you can fetch the underlying Connection from either the java.sql.Connection
object or the EntityManager
( for Hibernate and JPA Applications).