SlideShare a Scribd company logo
Lets Hit a request from postman using text Payload which starts with text “Password”
You will get a response as “Input Request Processed Successfully !!”
Now if we change the request or even change the case of Password then the message will be
discarded by the Filter because we have defined a Case Sensitive Wildcard pattern.
Lets Hit a request and try.
You will get a response as “Wildcard Filter Rejected the message !!”
Filters in Mule Part-7 Wildcard Filter

More Related Content

More from Akil Shadab

Append string transformer - Mule
Append string transformer - MuleAppend string transformer - Mule
Append string transformer - Mule
Akil Shadab
 
Installing new connectors in anypoint studio
Installing new connectors in anypoint studioInstalling new connectors in anypoint studio
Installing new connectors in anypoint studio
Akil Shadab
 
Router: first successful - mule
Router: first successful - muleRouter: first successful - mule
Router: first successful - mule
Akil Shadab
 
Quartz scheduler - Mule
Quartz scheduler  - MuleQuartz scheduler  - Mule
Quartz scheduler - Mule
Akil Shadab
 
Message properties in Mule
Message properties in MuleMessage properties in Mule
Message properties in Mule
Akil Shadab
 
Flow reference in Mule
Flow reference in MuleFlow reference in Mule
Flow reference in Mule
Akil Shadab
 
Scopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scopeScopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scope
Akil Shadab
 
Exception strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mappingException strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mapping
Akil Shadab
 
Exception strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategyException strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategy
Akil Shadab
 
Exception strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategyException strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategy
Akil Shadab
 
Exception strategy part 2 default exception strategy
Exception strategy part 2 default exception strategyException strategy part 2 default exception strategy
Exception strategy part 2 default exception strategy
Akil Shadab
 
Exception strategy part 1 introduction
Exception strategy part 1 introductionException strategy part 1 introduction
Exception strategy part 1 introduction
Akil Shadab
 
Dynamic endpoints - Mule
Dynamic endpoints - MuleDynamic endpoints - Mule
Dynamic endpoints - Mule
Akil Shadab
 
Configuring properties Mule
Configuring properties MuleConfiguring properties Mule
Configuring properties Mule
Akil Shadab
 
Scopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache ScopeScopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache Scope
Akil Shadab
 
Scopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll ReferenceScopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll Reference
Akil Shadab
 
Database Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template QueryDatabase Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template Query
Akil Shadab
 
Database Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored ProcedureDatabase Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored Procedure
Akil Shadab
 
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ OperationDatabase Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Akil Shadab
 
Database Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) OperationDatabase Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) Operation
Akil Shadab
 

More from Akil Shadab (20)

Append string transformer - Mule
Append string transformer - MuleAppend string transformer - Mule
Append string transformer - Mule
 
Installing new connectors in anypoint studio
Installing new connectors in anypoint studioInstalling new connectors in anypoint studio
Installing new connectors in anypoint studio
 
Router: first successful - mule
Router: first successful - muleRouter: first successful - mule
Router: first successful - mule
 
Quartz scheduler - Mule
Quartz scheduler  - MuleQuartz scheduler  - Mule
Quartz scheduler - Mule
 
Message properties in Mule
Message properties in MuleMessage properties in Mule
Message properties in Mule
 
Flow reference in Mule
Flow reference in MuleFlow reference in Mule
Flow reference in Mule
 
Scopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scopeScopes in mule part 10 until successful scope
Scopes in mule part 10 until successful scope
 
Exception strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mappingException strategy part 7 mapping exception strategy & exception mapping
Exception strategy part 7 mapping exception strategy & exception mapping
 
Exception strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategyException strategy part 6 custom exception strategy
Exception strategy part 6 custom exception strategy
 
Exception strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategyException strategy part 5 choice exception strategy
Exception strategy part 5 choice exception strategy
 
Exception strategy part 2 default exception strategy
Exception strategy part 2 default exception strategyException strategy part 2 default exception strategy
Exception strategy part 2 default exception strategy
 
Exception strategy part 1 introduction
Exception strategy part 1 introductionException strategy part 1 introduction
Exception strategy part 1 introduction
 
Dynamic endpoints - Mule
Dynamic endpoints - MuleDynamic endpoints - Mule
Dynamic endpoints - Mule
 
Configuring properties Mule
Configuring properties MuleConfiguring properties Mule
Configuring properties Mule
 
Scopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache ScopeScopes In Mule Part-9 Cache Scope
Scopes In Mule Part-9 Cache Scope
 
Scopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll ReferenceScopes In Mule Part-6 Poll Reference
Scopes In Mule Part-6 Poll Reference
 
Database Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template QueryDatabase Connector In Mule Part-14 Template Query
Database Connector In Mule Part-14 Template Query
 
Database Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored ProcedureDatabase Connector In Mule Part-13 Stored Procedure
Database Connector In Mule Part-13 Stored Procedure
 
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ OperationDatabase Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
Database Connector In Mule Part-11 Bulk Execute ‘Query Text’ Operation
 
Database Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) OperationDatabase Connector In Mule Part-7 Insert (DML) Operation
Database Connector In Mule Part-7 Insert (DML) Operation
 

Recently uploaded

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 

Recently uploaded (20)

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 

Filters in Mule Part-7 Wildcard Filter

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Lets Hit a request from postman using text Payload which starts with text “Password” You will get a response as “Input Request Processed Successfully !!”
  • 6. Now if we change the request or even change the case of Password then the message will be discarded by the Filter because we have defined a Case Sensitive Wildcard pattern. Lets Hit a request and try. You will get a response as “Wildcard Filter Rejected the message !!”