Event sourcing: better understanding of events

Event sourcing is a popular architectural pattern often used for e-commerce, banking and social media applications. Here, all events that led to the current state of the data are stored - and not the data itself. This is useful, for example, to view histories and better understand how a particular state behaviour came about.

Event sourcing can be used to

  • Obtain data from the past
  • create meaningful reports
  • develop a basis for future questions
eventsourcing illustrationAn illustration of eventsourcing illustration

All steps transparently in view: Event sourcing offers many advantages

With event sourcing, updates and deletions are never made directly to the data. Instead, an event store is used in which only events are added and thus all state changes (and thus each step) are stored as a series of events. Other benefits include:

restore iconAn illustration of restore icon


Because event sourcing stores all events, they can be used to restore data. To do this, specific points in time in the past can be selected.

traceability iconAn illustration of traceability icon

Higher traceability

In order to understand and keep track of which events have impacted an application at a certain point in time, all events can be traced in the history.

flexibility iconAn illustration of flexibility icon

Flexible customisation

Queries can be designed efficiently by adapting the read model to the type of query. Additional read models can be added easily.

protocols iconAn illustration of protocols icon

Comprehensive protocols

Saving events automatically creates a change log. This can be used to create data analyses or to write meaningful reports.

flexible changes iconAn illustration of flexible changes icon

More flexibility

Because events are stored in a single location, they can be easily modified, reinterpreted and visualised to meet user requirements.

scalability iconAn illustration of scalability icon

Better scalability

The more data and events are stored, the easier it must be to scale. Architectural patterns such as event sourcing are optimally designed for such changes.

Our services in the field of event sourcing

Depending on how extensive the requirements of an IT landscape turn out to be, Event Sourcing can be combined with other approaches such as Domain-driven Design (DDD). While Event Sourcing allows insights into the sequence of events, DDD focuses on modelling the business domain to create a coherent basis. This creates a flexible and scalable system.

consulting iconAn illustration of consulting icon

IT consulting

We analyse existing IT infrastructures and advise on the selection of suitable technologies so that our customers receive optimal IT solutions.

architecture iconAn illustration of architecture icon

Architecture design

When concepts such as event sourcing and domain-driven design are used in combination, we provide support in planning optimal architectures.

implementation iconAn illustration of implementation icon


As experienced software architects with deep expertise in event sourcing, we ensure smooth and timely implementation.

Frequently asked questions

How does event sourcing fit into an existing IT architecture?

Event sourcing is a specific design pattern that works well for certain use cases, but not all. Therefore, one should ensure that event sourcing meets the requirements and can be easily integrated into the IT architecture.

How are events stored?

When using event sourcing, events are usually stored for a long time. Therefore, it is important that there is an effective way to store the events and that the appropriate technologies are available. With Acosom’s IT consulting, companies can find valuable advice and support in this regard.

How are events processed?

When it comes to processing events, it is important to have an effective procedure in place. This ensures that events are processed fast enough to meet the requirements of the system.

How are events and data protected?

Events often contain confidential or sensitive data, so it is important that they are stored and protected securely and from unauthorised access. Individual access rights and system settings are important steps that companies can implement.