Command | Description |
---|---|
uname -a |
Shows the current kernel and OS information |
sudo |
Executes the command as root (Administrator) |
Specs
- Simple PUT request with a JSON payload with 2 strings
- 1 Flow
- HTTPS with p12 Keystore using a RSA public certificate 2048 bits key
- Running on MacBook Pro (16-inch, 2019), 2,4 GHz 8-Core Intel Core i9, 64 GB 2667 MHz DDR4
- Java 8 openjdk version 1.8.0_312
- Using ab apache benchmark, more details at https://httpd.apache.org/docs/2.4/programs/ab.html
- data: ```{
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"keys" : ["type", "source", "openFlightsAirportId"] | |
} |
This unofficial gist contains a list of commands typically ran for Kubernetes and Runtime Fabric MuleSoft.
- Install Java using any of the methods available for your OS, e.g. download the binaries and place them in a local folder (recommended to use a simple path with no spaces), OR, follow any installation method for your OS.
- https://adoptium.net/en-GB/temurin/archive/?version=8
- Must Configure the JAVA_HOME environment variable in your OS,
docker pull mulesoft/flex-gateway:latest
Repository for docker image: https://hub.docker.com/r/mulesoft/flex-gateway/tags
docker run -d --rm -v $(pwd):/usr/local/share/mulesoft/flex-gateway/conf.d -p 8081:8081 mulesoft/flex-gateway
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Make it hard for hackers to make a profit off of attacking you by | |
increasing their costs and decreasing their returns. | |
2. Cybersecurity is a constant effort, so keep up-to-date with patches, | |
strategies, and tools to stay ahead of attackers. | |
3. Your users won't use security measures if they get in the way of | |
their work, so make sure your solutions are both secure and easy to | |
use. | |
4. Hackers will use any means possible to get into your system, so you | |
need to make all entry points as difficult and unappealing as | |
possible. |
This gist will guide you to troubleshoot and configure properly the Dataweave plugin in Visual Studio Code.
Updated on 9th March 2023, plugin version v1.2.15
This dataweave plugin/extension depends on Java & Maven.
It's recommended to use Java 11 & Maven 3.8.4 - 3.8.8
- Overview of the document
- Purpose and scope of the architecture description
- Definitions, acronyms, and abbreviations used in the document
- Identification of stakeholders
- Concerns of the stakeholders
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Notas Clase Anypoint Platform Fundamentals | |
Codigo Mimeo Salesforce: USE00PQYCMDS | |
http://ilt.mule-training.com/american-ws/flights | |
Client ID: 2b6e1d0a4bda4fb6a986766395f721ac | |
Client Secret: 5727697f45b1491986d748F2A180C95C |