Category: Best Practices and Tutorials

How (and Why) to Use Couchbase as an XML Database

How (and Why) to Use Couchbase as an XML Database

Couchbase and XML – no problem! I’ve heard it said dozens of times: “Hey, Couchbase is great but I use XML.” I recognize that countering with, “Couchbase can be your XML database” is pretty bold, especially for a JSON-oriented document...

4 Patterns for Microservices Architecture in Couchbase

4 Patterns for Microservices Architecture in Couchbase

Microservices have emerged as a common architecture pattern over the last decade. In this approach, small, autonomous and loosely coupled services work together over a distributed network. Each microservice is typically delimited to a specific function and business boundary, runs...

Using the Java SDK for Couchbase: The Basics of Get & Upsert

Using the Java SDK for Couchbase: The Basics of Get & Upsert

Using Java with Couchbase doesn’t have to be hard, even for a new developer. In this quickstart tutorial, we’re going to walk through the basics of creating and fetching JSON documents in Couchbase using the Java SDK. With minimalist code...

July 20, 2021
How to Use Couchbase as a Machine Learning Model Store [Part 2 of 2]

How to Use Couchbase as a Machine Learning Model Store [Part 2 of 2]

When it comes to machine learning, a lot is said and written about training your ML models. But of equal importance is where you store those models once you’re ready to serve up real-time predictions. Last week, we looked at...

OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]

OIDC Authorization Code Flow for Client Authentication in Couchbase Sync Gateway [Part 3 of 3]

Couchbase Sync Gateway supports OpenID Connect or OIDC-based client authentication. In this context, clients may be Couchbase Lite clients that synchronize data with Sync Gateway over the Internet using the websockets-based replication protocol or they could be web frontend or...

How to Build a Couchbase Autonomous Operator Proof of Concept

How to Build a Couchbase Autonomous Operator Proof of Concept

Whenever I hear about a customer’s first experience with the Couchbase Autonomous Operator (CAO) for Kubernetes, their first question tends to be “How much?” The answer is that it’s already included in their Enterprise Edition subscription. Joyous to hear this,...

An Introduction to Couchbase Cloud: Migration Made Easy

An Introduction to Couchbase Cloud: Migration Made Easy

It’s not a straightforward question to answer: How do I move my on-premises, virtualised or public cloud solution over to a shiny new fully managed cloud infrastructure – with as little disruption as possible? Migration concerns are high on the...

OIDC Implicit Flow for Client Authentication in Couchbase Sync Gateway [Part 2 of 3]

OIDC Implicit Flow for Client Authentication in Couchbase Sync Gateway [Part 2 of 3]

OpenID Connect (OIDC) is a popular client authentication mechanism supported by Couchbase Sync Gateway. In this context, clients may be Couchbase Lite clients that synchronize data with Sync Gateway over the Internet using the websockets-based replication protocol or they could...

J is for June, July & Java Developers

J is for June, July & Java Developers

As Java developers begin planning their June and July vacations, we felt it would be appropriate to celebrate our own commitment to a four-letter word that starts with J: Java. At Couchbase, this June and July are dedicated to Java...

Using Fluent Bit for Log Forwarding & Processing with Couchbase Server

Using Fluent Bit for Log Forwarding & Processing with Couchbase Server

With the recent release of Couchbase Autonomous Operator (CAO) 2.2, we have recently provided log processing and forwarding for the Kubernetes deployments using the OSS Fluent Bit tooling. This is also OSS and available on GitHub or as a container....

OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]

OAuth 2.0 & OIDC Fundamentals for Authentication & Authorization [Part 1 of 3]

Developers and architects simply can’t build modern applications without running into issues of authorization and authentication. OAuth 2.0 is an industry standard for “delegated authorization” which is the ability to provide an application or client access to data or features offered...