Slide 31
Slide 31 text
cy D
dency G
ependency J
Dependency M
Dependency B
Dependency E
Dependency H
Dependency K
Dependency N
Dependency C
Dependency F
Dependency I
Dependency L
Dependency O
User Request
User Request
User Request
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Network Request - TCP/HTTP, latency, 4xx, 5xx, etc
Deserialization - JSON/XML/Thrift/Protobuf/etc
Logic - argument validation, caches, metrics, logging,
multivariate testing, routing, etc
Serialization - URL and/or body generation
Logic - validation, decoration, object model, caching,
metrics, logging, etc
It is not just the network that can fail and needs isolation but the full request/response loop including business logic
and serialization/deserialization.
Protecting against a network failure only to return a response that causes application logic to fail elsewhere in the
application only moves the problem.