6

A Best Friend for the Frontend

In Chapter 4, Trusting Facts and Eventual Consistency, we covered the Event Sourcing pattern and learned how it creates an outbound bulkhead that protects upstream services from downstream outages. In Chapter 5, Turning the Cloud into the Database, we covered the Command Query Responsibility Segregation (CQRS) pattern and learned how it creates an inbound bulkhead that protects downstream services from upstream outages. Together, these bulkheads fortify the boundaries of autonomous services and help control the blast radius when things go wrong.

Now we turn our attention to the boundary service patterns that work at the system’s periphery. These autonomous services cater to the kinds of changes driven by external ...

Get Software Architecture Patterns for Serverless Systems - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.