O'Reilly logo

Hands-On Enterprise Java Microservices with Eclipse MicroProfile by Scott Stark, Antoine Sabot-Durand, Pavol Loffay, Jeff Mesnil, Heiko W. Rupp, Cesar Saavedra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

  1. We have seen many examples throughout the book and this chapter that MP-Config settings affect both application and MP features.
  2. As long as the path you supplied exists, you should be able to see a successful heath check with information about that path.
  3. It shows information about the KeyCloak server. If KeyCloak is stopped, it shows an error.
  4. It will not be found because the metric is generated lazily on first request.
  5. TBD.
  6. For unsecured methods the behavior should be similar. For secured methods, the Swagger-UI invocations fail.
  7. You will see error responses.
  8. That is the encoded MP-JWT. You can use that in a curl command as the Authorization: Bearer ... header value where you would replace the ... with the string found in the  ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required