Mule 4 – Designing for Operations

Leave a comment

Tracking and Log Filtering To enable log messages to be tracked and analyzed more effectively log management tools such as Splunk enable indexing of key value pairs through formatting of plain text in a specific format.  This gives operations more power to filter messages based on specific criteria.  The base logger is a simple way of constructing those […]

0

OAuth 2.0: Authorization through a Custom Policy

Leave a comment

Runtime policies enable what is called “cross cutting concerns” to be injected onto an API without embedding code at the application level.  Cross cutting concerns affect the entire application and should be centralized in one location if possible.  They typically represent operations such as authentication, authorization, caching, exception management, logging and instrumentation. Runtime policies are […]

0

Logging: How to Mask Sensitive Data

Leave a comment

​You can leverage the Log4j Framework by Apache to make changes to the message logger during application execution.  In the case where you are dealing with sensitive data in your application, it is difficult to mask at the code level because so many of the libraries log data that you do not have control over […]

0

Mule Functional Testing: How to Mock HTTP Endpoints

Leave a comment

Functional Testing This article takes the Mock HTTP Endpoints library from sham.software and shows you how you can apply it to the Mule FunctionalTestCase. sham.software You can find the library to Mock HTTP Endpoints here:https://github.com/shamsoftware/sham-http Maven Dependency Shared Resources To enable the tests to mock an outbound endpoint you must configure the host as localhost. If your endpoint […]

0