Skip to content

Instantly share code, notes, and snippets.

View pedes's full-sized avatar
:octocat:
I may be slow to respond.

Andres Cespedes Morales pedes

:octocat:
I may be slow to respond.
View GitHub Profile
@pedes
pedes / Linux-Commands-Cheatsheet.md
Last active February 17, 2023 12:15
Most common and useful Linux commands
Command Description
uname -a Shows the current kernel and OS information
sudo Executes the command as root (Administrator)

Performance Benchmark test for Mule App over HTTPS

Specs

  • Simple PUT request with a JSON payload with 2 strings
  • 1 Flow
  • HTTPS with p12 Keystore using a RSA public certificate 2048 bits key
  • Running on MacBook Pro (16-inch, 2019), 2,4 GHz 8-Core Intel Core i9, 64 GB 2667 MHz DDR4
  • Java 8 openjdk version 1.8.0_312
  • Using ab apache benchmark, more details at https://httpd.apache.org/docs/2.4/programs/ab.html
  • data: ```{
{
"keys" : ["type", "source", "openFlightsAirportId"]
}

Kubernetes Commands Cheat Sheet (Runtime Fabric MuleSoft version)

This unofficial gist contains a list of commands typically ran for Kubernetes and Runtime Fabric MuleSoft.

Tools | Prerequisites

1. Install & Configure Java 8

  • Install Java using any of the methods available for your OS, e.g. download the binaries and place them in a local folder (recommended to use a simple path with no spaces), OR, follow any installation method for your OS.
  • https://adoptium.net/en-GB/temurin/archive/?version=8
  • Must Configure the JAVA_HOME environment variable in your OS,

Cheatsheet for MuleSoft Flex Gateway

Install & Run the Container

docker pull mulesoft/flex-gateway:latest

Repository for docker image: https://hub.docker.com/r/mulesoft/flex-gateway/tags

docker run -d --rm -v $(pwd):/usr/local/share/mulesoft/flex-gateway/conf.d -p 8081:8081 mulesoft/flex-gateway

1. Make it hard for hackers to make a profit off of attacking you by
increasing their costs and decreasing their returns.
2. Cybersecurity is a constant effort, so keep up-to-date with patches,
strategies, and tools to stay ahead of attackers.
3. Your users won't use security measures if they get in the way of
their work, so make sure your solutions are both secure and easy to
use.
4. Hackers will use any means possible to get into your system, so you
need to make all entry points as difficult and unappealing as
possible.

ADR [number]: [Title]

Context

[Provide context for the decision, including any constraints or requirements that influenced the decision.]

Decision

[State the decision that was made, including any options that were considered and rejected.]

Absolute Install & Configuration Guide for Dataweave in VS Code

This gist will guide you to troubleshoot and configure properly the Dataweave plugin in Visual Studio Code.

Updated on 9th March 2023, plugin version v1.2.15

Pre-Requisites

This dataweave plugin/extension depends on Java & Maven.

It's recommended to use Java 11 & Maven 3.8.4 - 3.8.8

Software Architecture Documentation Template

1. Introduction

  • Overview of the document
  • Purpose and scope of the architecture description
  • Definitions, acronyms, and abbreviations used in the document

2. Architectural Stakeholders and Concerns

  • Identification of stakeholders
  • Concerns of the stakeholders
Notas Clase Anypoint Platform Fundamentals
Codigo Mimeo Salesforce: USE00PQYCMDS
http://ilt.mule-training.com/american-ws/flights
Client ID: 2b6e1d0a4bda4fb6a986766395f721ac
Client Secret: 5727697f45b1491986d748F2A180C95C