Because set-based consistency validation is a hot topic, we discuss it a lot within AxonIQ. In one of these discussions, my colleague Frédéric Gendebien proposed applying the actor model to solve this problem. Here is how it helps validate the uniqueness of a specific value against a set.
Support for the `jakarta` namespace in Axon Framework 4.6
By Milen Dyankov
Oct 07, 2022
A significant change in the Java Enterprise space was made a few years back. The javax package was replaced with the jakarta one. As some Axon features use the JPA and JTA specifications, we needed to addopt the change. Here is how we did it in Axon Framework 4.6
Be up to date with releases and don't miss important announcements
By Milen Dyankov
Jun 07, 2022
Even if you are a frequent Discuss visitor, you may not know about some of its practical use cases. Did you know you can use the platform to track product releases and configure it to notify you when new versions are published?
Sometimes the most challenging part of any project is getting started. Tasks such as creating the structure for various project artefacts, creating a build file, determining maven coordinates, and picking the right dependency versions can be boring and repetitive. But tragically, Axon Framework isn’t available in the Spring Initializr. So, at AxonIQ, we felt it was high time that we corrected this glaring oversight by providing our very own AxonIQ Initializr just for you, our loyal Axonians!
In my previous blog, I spent just a little bit of text on the challenges of using a single StatefulSet scaled to the number of nodes we want in the cluster. Also, I completely skipped the subject of using Helm to manage the deployment. Both subjects do merit more attention, so let’s do just that.
CQRS/ES are patterns and to be more specific they are Application Design patterns and their implementation spans across 3 main Architectural areas: structural and continuity, operational and extensibility, and cross-cutting and usability. To help pinpoint the exact implementation areas, let us look at two terms commonly used in Enterprise Architecture - Capabilities and Capability Maps.
Protect sensitive data in an Event-Sourced Application
By Yvonne Ceelie
Feb 24, 2021
In message-driven systems, messages flow in a lot of directions.The right to data erasure is a requirement that is common in security laws. At first glance, the right to erasure seems to be contradictory to event sourcing. A solution to overcome this problem is crypto shredding. AxonIQ’s Data Protection Module takes a declarative approach to encrypting sensitive data.