Non-conformance type: static

This is a non-conformance of which there was no code evidence collected for this link, but calls were detected between the two services at runtime.

Involved services

Potential Interpretations For the Non-Conformance

Implicit Call via Third-Party Services

Communication flow has been detected between the two services but the responsible line of code is not detected in the source code. It could be that the call is implicitly triggered by a third-party service that is used in the implementation (e.g. via an annotation that is used by a framework or that code is injected during run-time).

Unintentional Endpoint Exposure

The communication flow detected between the two services could be caused by an endpoint that is exposed unintentionally by the developer. It could be the case that code has been refactored and the endpoint was not removed during refactoring, or that the endpoint was used for testing purposes and was not removed afterwards.

Code Located Outside of Default Source Location

The line of code that is responsible for triggering the flow of communication between the two services is not located in the default source-code folder of the project. It could be the case that the line of code was unintentionaly introduced in a different folder (e.g. resources folder).

The following information could help with the understanding of the detected non-conformance:

Dynamic model learned for the communication behavior between user and registry:

DFA 0 State 0 1 State 1 0->1 8761.0__>eureka>peerreplication>batch>__200.0__post__user__registry 4487 I I I->0 1->1 8761.0__>eureka>peerreplication>batch>__200.0__post__user__registry 40338

Frequently occurring endpoint calls extracted from the dynamic model learned for the communication behavior between user and registry:

Endpoint: /eureka/peerreplication/batch/

  • Port: 8761.0
  • Call status code: 200.0
  • Call direction: from user to registry
  • Call frequency: 44825