Axon Framework logo with the

Open-source framework for event-driven microservices and domain-driven design

Set Based Consistency Validation Revisited

By Yvonne Ceelie

    3 min

|

    Oct 18, 2022

Because set-based consistency validation is a hot topic, we discuss it a lot within AxonIQ. In one of these discussions, my colleague Frédéric Gendebien proposed applying the actor model to solve this problem. Here is how it helps validate the uniqueness of a specific value against a set. 

Support for the `jakarta` namespace in Axon Framework 4.6

By Milen Dyankov

    6 min

|

    Oct 07, 2022

A significant change in the Java Enterprise space was made a few years back. The javax package was replaced with the jakarta one. As some Axon features use the JPA and JTA specifications, we needed to addopt the change. Here is how we did it in Axon Framework 4.6

Axon Framework 4.6.0: Replay context propagation

By Mitchell Herrijgers

    10 min

|

    Sep 16, 2022

With Axon Framework 4.6.0 it's now possible to use a reset context in your event handlers during a replay. This blog will revisit how replays work, and you will learn about this new feature.

Be up to date with releases and don't miss important announcements

By Milen Dyankov

    5 min

|

    Jun 07, 2022

Even if you are a frequent Discuss visitor, you may not know about some of its practical use cases. Did you know you can use the platform to track product releases and configure it to notify you when new versions are published?  

Introducing the Axon Framework IntelliJ plugin

By Mitchell Herrijgers

    5 min

|

    Mar 11, 2022

AxonIQ is introducing an IntelliJ plugin to make developing applications with Axon Framework and Axon Server even easier!

AxonFramework and PostgreSQL without TOAST

By Yvonne Ceelie

    2 min

|

    Mar 01, 2022

When using AxonFramework together with PostgreSQL, you will find out that PostgreSQL uses something that is called TOAST (The Oversized Attribute Storage Technique).

It means that PostgreSQL uses a fixed page size of 8 KB and does not allow for tuples to use multiple pages; Postgres will compress the data. You can find more info about TOAST in the PostgreSQL wiki.  

Introducing The AxonIQ Initializr

By Ben Runchey

    4 min

|

    Aug 16, 2021

Sometimes the most challenging part of any project is getting started. Tasks such as creating the structure for various project artefacts, creating a build file, determining maven coordinates, and picking the right dependency versions can be boring and repetitive. But tragically, Axon Framework isn’t available in the Spring Initializr. So, at AxonIQ, we felt it was high time that we corrected this glaring oversight by providing our very own AxonIQ Initializr just for you, our loyal Axonians!

Revisiting Axon Server in Containers

By Bert Laverman

    16 min

|

    May 20, 2021

In my previous blog, I spent just a little bit of text on the challenges of using a single StatefulSet scaled to the number of nodes we want in the cluster. Also, I completely skipped the subject of using Helm to manage the deployment. Both subjects do merit more attention, so let’s do just that.

Distilling the CQRS/ES Capability

By Vijay Nair

    4 min

|

    Apr 20, 2021

CQRS/ES are patterns and to be more specific they are Application Design patterns and their implementation spans across 3 main Architectural areas: structural and continuity, operational and extensibility, and cross-cutting and usability. To help pinpoint the exact implementation areas, let us look at two terms commonly used in Enterprise Architecture - Capabilities and Capability Maps.

Protect sensitive data in an Event-Sourced Application

By Yvonne Ceelie

    6 min

|

    Feb 24, 2021

In message-driven systems, messages flow in a lot of directions.The right to data erasure is a requirement that is common in security laws. At first glance, the right to erasure seems to be contradictory to event sourcing. A solution to overcome this problem is crypto shredding. AxonIQ’s Data Protection Module takes a declarative approach to encrypting sensitive data. 

— 10 Items per Page
Showing 1 - 10 of 22 results.