PalC engineers build applications that feel native to the platform - OpenAPI-first APIs, Kubernetes health probe design, Prometheus metrics, and multi-tenant control plane patterns used in production deployments.
REST API - OpenAPI-first Design
OpenAPI 3.x specification-driven API development
API schema defined first in OpenAPI - server stubs and client SDKs generated automatically, ensuring API and implementation stay in sync across versions.
# OpenAPI 3.x - tenant provisioning endpoint
paths:
/api/v1/tenants:
post:
summary: Create tenant
security: [{ bearerAuth: [] }]
responses:
"201":
description: Tenant createdSpecOpenAPI 3.xCode-genGo · Python · TSAuthBearer / OIDCVersioningURI path / v1/v2
Kubernetes - Platform-native Service Design
Health probes, graceful shutdown, and resource limits
Kubernetes-aware deployment manifests - liveness and readiness probes, SIGTERM-handled graceful shutdown, and topology spread constraints for resilient placement.
# Kubernetes deployment - platform-native design
containers:
- name: tenant-api
image: registry/tenant-api:v1.4.2
resources:
requests: {cpu: 100m, memory: 128Mi}
limits: {cpu: 500m, memory: 512Mi}
livenessProbe:
httpGet: {path: /healthz, port: 8080}ProbesLiveness + ReadinessShutdownGraceful SIGTERMResourcesRequests + LimitsUpgradeRollingUpdate
Observability - Prometheus Metrics
Custom application metrics with Prometheus client
Application-level Prometheus metrics exposed at /metrics - API request latency histograms, business operation counters, and queue depth gauges for NOC-ready dashboards.
# Prometheus instrumentation - Go service
var (
apiLatency = prometheus.NewHistogramVec(
prometheus.HistogramOpts{Name: "api_request_latency_seconds"},
[]string{"method","status"},
)
)ProtocolPrometheus / OTelTracingJaeger / TempoLoggingStructured JSONDashboardGrafana
Multi-tenant Control Plane - RBAC Design
Role and resource scoping for multi-tenant APIs
RBAC model integrated into the application's control plane - roles scoped per tenant, resource-level permission checks, and audit logging on every privileged operation.
# RBAC middleware - tenant-scoped permission check
func RequirePermission(resource, action string) Middleware {
return func(next Handler) Handler {
return func(ctx Context) error {
if !can(ctx.User, resource, action) { return ErrForbidden }
return next(ctx)
}
}
}ScopePer-tenant RBACAuditEvery access loggedIdentityOIDC / JWT claimsPolicyResource-level