SlideShare a Scribd company logo
Lets Hit any request from postman
You will get a response as “Input Request Processed Successfully !!”
Now DELETE “byte-array-to-string-transformer” so that the Payload TYPE changes from String to stream.
Changes should look like below diagram.
Save the changes and Test with the same request.
Send the same request and you will observe that Payload Type Filter will Reject the Message because the
Payload TYPE is not String anymore.
You will get response as: “Payload Filter Rejected the message !!”
Filters in Mule Part-5 Payload Filter

More Related Content

More from Akil Shadab

Append string transformer - Mule
Append string transformer - MuleAppend string transformer - Mule
Append string transformer - Mule
Akil Shadab
 
Installing new connectors in anypoint studio
Installing new connectors in anypoint studioInstalling new connectors in anypoint studio
Installing new connectors in anypoint studio
Akil Shadab
 
Router: first successful - mule
Router: first successful - muleRouter: first successful - mule
Router: first successful - mule
Akil Shadab
 
Quartz scheduler - Mule
Quartz scheduler  - MuleQuartz scheduler  - Mule
Quartz scheduler - Mule
Akil Shadab
 
Message properties in Mule
Message properties in MuleMessage properties in Mule
Message properties in Mule
Akil Shadab
 
Flow reference in Mule
Flow reference in MuleFlow reference in Mule
Flow reference in Mule
Akil Shadab
 
Scopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scopeScopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scope
Akil Shadab
 
Exception strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mappingException strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mapping
Akil Shadab
 
Exception strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategyException strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategy
Akil Shadab
 
Exception strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategyException strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategy
Akil Shadab
 
Exception strategy part 2 default exception strategy
Exception strategy part 2 default exception strategyException strategy part 2 default exception strategy
Exception strategy part 2 default exception strategy
Akil Shadab
 
Exception strategy part 1 introduction
Exception strategy part 1 introductionException strategy part 1 introduction
Exception strategy part 1 introduction
Akil Shadab
 
Dynamic endpoints - Mule
Dynamic endpoints - MuleDynamic endpoints - Mule
Dynamic endpoints - Mule
Akil Shadab
 
Configuring properties Mule
Configuring properties MuleConfiguring properties Mule
Configuring properties Mule
Akil Shadab
 
Scopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache ScopeScopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache Scope
Akil Shadab
 
Scopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll ReferenceScopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll Reference
Akil Shadab
 
Database Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template QueryDatabase Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template Query
Akil Shadab
 
Database Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored ProcedureDatabase Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored Procedure
Akil Shadab
 
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ OperationDatabase Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Akil Shadab
 
Database Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) OperationDatabase Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) Operation
Akil Shadab
 

More from Akil Shadab (20)

Append string transformer - Mule
Append string transformer - MuleAppend string transformer - Mule
Append string transformer - Mule
 
Installing new connectors in anypoint studio
Installing new connectors in anypoint studioInstalling new connectors in anypoint studio
Installing new connectors in anypoint studio
 
Router: first successful - mule
Router: first successful - muleRouter: first successful - mule
Router: first successful - mule
 
Quartz scheduler - Mule
Quartz scheduler  - MuleQuartz scheduler  - Mule
Quartz scheduler - Mule
 
Message properties in Mule
Message properties in MuleMessage properties in Mule
Message properties in Mule
 
Flow reference in Mule
Flow reference in MuleFlow reference in Mule
Flow reference in Mule
 
Scopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scopeScopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scope
 
Exception strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mappingException strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mapping
 
Exception strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategyException strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategy
 
Exception strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategyException strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategy
 
Exception strategy part 2 default exception strategy
Exception strategy part 2 default exception strategyException strategy part 2 default exception strategy
Exception strategy part 2 default exception strategy
 
Exception strategy part 1 introduction
Exception strategy part 1 introductionException strategy part 1 introduction
Exception strategy part 1 introduction
 
Dynamic endpoints - Mule
Dynamic endpoints - MuleDynamic endpoints - Mule
Dynamic endpoints - Mule
 
Configuring properties Mule
Configuring properties MuleConfiguring properties Mule
Configuring properties Mule
 
Scopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache ScopeScopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache Scope
 
Scopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll ReferenceScopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll Reference
 
Database Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template QueryDatabase Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template Query
 
Database Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored ProcedureDatabase Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored Procedure
 
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ OperationDatabase Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
 
Database Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) OperationDatabase Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) Operation
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Filters in Mule Part-5 Payload Filter

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Lets Hit any request from postman You will get a response as “Input Request Processed Successfully !!”
  • 6. Now DELETE “byte-array-to-string-transformer” so that the Payload TYPE changes from String to stream. Changes should look like below diagram. Save the changes and Test with the same request.
  • 7. Send the same request and you will observe that Payload Type Filter will Reject the Message because the Payload TYPE is not String anymore. You will get response as: “Payload Filter Rejected the message !!”