Handling NFRs for the API through API policies (Custom Policies) -Part 2 | MuleSoft Mysore Meetup #26
Event Link:- https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-part-2-handling-nfrs-for-the-api-through-api-policies-custom-policies/
-Summary of Session One (Part 1 - Recap)
API’s NFR & Handling NFR
API Out of the Box Policies
API Policy Enforcement
-Handling NFR using Custom Policy
-Develop, Package, Publish & Manage a Custom Policy
-Use Case : Creating a Custom policy
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
Youtube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speaker:-
Vijayaraghavan Venkatadri:- https://www.linkedin.com/in/vijayaraghavan-venkatadri-b2210020/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...Jitendra Bafna
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Proxy and AutoDiscovery), HTTPS Proxy, Accessing Non Mule Application With API Manager
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...MysoreMuleSoftMeetup
Handling NFRs for the API through API policies (Out of the box policies) Part 1 | MuleSoft Mysore Meetup #25
Session Link:- https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-part-1-handling-nfrs-for-the-api-through-api-policies-out-of-the-box-policies/
-What is the NFR of an API?
-How can API Policies deal with NFR?
-API Out of the Box policies
-API Policy Enforcement
-Discussion on each API Policy
-Discussion on use case scenarios
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
Youtube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speaker:-
Vijayaraghavan Venkatadri:- https://www.linkedin.com/in/vijayaraghavan-venkatadri-b2210020/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Prox...Jitendra Bafna
MuleSoft Surat Virtual Meetup#3 - Anypoint Custom Policies, API Manager (Proxy and AutoDiscovery), HTTPS Proxy, Accessing Non Mule Application With API Manager
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...MysoreMuleSoftMeetup
Handling NFRs for the API through API policies (Out of the box policies) Part 1 | MuleSoft Mysore Meetup #25
Session Link:- https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-part-1-handling-nfrs-for-the-api-through-api-policies-out-of-the-box-policies/
-What is the NFR of an API?
-How can API Policies deal with NFR?
-API Out of the Box policies
-API Policy Enforcement
-Discussion on each API Policy
-Discussion on use case scenarios
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
Youtube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speaker:-
Vijayaraghavan Venkatadri:- https://www.linkedin.com/in/vijayaraghavan-venkatadri-b2210020/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...jorgelebrato
Todos hablamos de seguridad y todos queremos tener una fuerte como la que más. En esta edición veremos qué herramientas nos ofrece MuleSoft en su API Manager para aplicar políticas de seguridad y veremos cómo podemos crear y aplicar nuestras propias políticas.
In this session Johann will explain some of the basics of the BizTalk BRE before moving on to advanced topics. Some of the basics include an explanation of what facts are and how the BRE works with them, rule priorities, long running facts, versioning and source control, and deployment. He will then demonstrate some more advanced topics such as executing business rules from a .NET application, rules traceability, and will discuss how to assert the various different types of facts. Finally he will explain and demonstrate the usage of the BRE Pipeline Framework CodePlex project to build loosely coupled and lightweight solutions with minimal custom development.
#vBrownBag presentation given on OpenStack Summit 2015
Policy is a generic way to control fulfillment (deployment) of applications. This presentation describes current implementation status in Kilo release of OpenStack.
For more details check
https://wiki.openstack.org/wiki/PolicyGuidedFulfillment
https://wiki.openstack.org/wiki/PolicyGuidedFulfillmentDemo
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral ZoneIntegralZone
It's time for our Mule Meet up in Reading (Virtual). Two interesting and informative topics are on the agenda.
Topic 1
Transaction management in MuleSoft
In a nutshell, a transaction is a group of actions that should be performed as one 'bulk action'. During this session, we will discuss how we can achieve it by using connectors, scopes, and exception handlers.
Topic 2
How to automate issue fixing in MuleSoft?
The presentation will discuss how the identified issues can be fixed in an automated manner, resulting in huge time & cost savings, code standardization, etc.
Watch now!
Book now online demo of IZ Analyzer: https://integralzone.com/book-online-demo/
[Madrid-Meetup Octubre 22] Seguridad fuerte como el vinagre de Jerez. Políti...jorgelebrato
Todos hablamos de seguridad y todos queremos tener una fuerte como la que más. En esta edición veremos qué herramientas nos ofrece MuleSoft en su API Manager para aplicar políticas de seguridad y veremos cómo podemos crear y aplicar nuestras propias políticas.
In this session Johann will explain some of the basics of the BizTalk BRE before moving on to advanced topics. Some of the basics include an explanation of what facts are and how the BRE works with them, rule priorities, long running facts, versioning and source control, and deployment. He will then demonstrate some more advanced topics such as executing business rules from a .NET application, rules traceability, and will discuss how to assert the various different types of facts. Finally he will explain and demonstrate the usage of the BRE Pipeline Framework CodePlex project to build loosely coupled and lightweight solutions with minimal custom development.
#vBrownBag presentation given on OpenStack Summit 2015
Policy is a generic way to control fulfillment (deployment) of applications. This presentation describes current implementation status in Kilo release of OpenStack.
For more details check
https://wiki.openstack.org/wiki/PolicyGuidedFulfillment
https://wiki.openstack.org/wiki/PolicyGuidedFulfillmentDemo
MuleSoft Meetup | Reading Meetup Group | Hosted by Integral ZoneIntegralZone
It's time for our Mule Meet up in Reading (Virtual). Two interesting and informative topics are on the agenda.
Topic 1
Transaction management in MuleSoft
In a nutshell, a transaction is a group of actions that should be performed as one 'bulk action'. During this session, we will discuss how we can achieve it by using connectors, scopes, and exception handlers.
Topic 2
How to automate issue fixing in MuleSoft?
The presentation will discuss how the identified issues can be fixed in an automated manner, resulting in huge time & cost savings, code standardization, etc.
Watch now!
Book now online demo of IZ Analyzer: https://integralzone.com/book-online-demo/
Deep Dive into Munits in Mule 4 | MuleSoft Mysore Meetup #40
Event Link:-
https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-munits-in-mule-4-deep-dive/
Agenda
-Overview of Munits
-What is Munit and how does it help
-Overview of Code Coverage
-What is code coverage and its implications
-Parameterizing Munits
-Benefits and use cases
-Special cases of Munits
-Choice Router
-For Each Scope
-APIKIT
-Hands-On
-Each of the special cases mentioned
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
YouTube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speakers:-
Prithwish Karforma - https://www.linkedin.com/in/prithwish-karforma-b2727b1a1
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
Priya Shaw - https://www.linkedin.com/in/priya-shaw
State Management in Mule applications | MuleSoft Mysore Meetup #42MysoreMuleSoftMeetup
State Management in Mule 4 | MuleSoft Mysore Meetup #42
Event Link:-
https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-state-management-in-mule-applications/
Agenda
-Managing State (Data) in Mule Applications
-Mule Event
-Object Store
-VM Queues
-Batch Job Scope Queues
-File-based persistence
-External data store
-Optimal Methods for storing state
-Pros and Cons of different state storage
Trade off between different state storage
-Exploring State Implementation
Cloudhub 1.0
Cloudhub 2.0
-Real-world Examples
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
YouTube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speakers:-
Vijay Kumar - https://www.linkedin.com/in/vijay-kumar-011308109/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
Priya Shaw - https://www.linkedin.com/in/priya-shaw
Application Design Thinking wrt Integration Architecture - Part II | MuleSoft...MysoreMuleSoftMeetup
Application Design Thinking with respect to Integration Architecture - Part II | MuleSoft Mysore Meetup #33
Event Link:-
https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-application-design-thinking-with-respect-to-integration-architecture-part-ii/
-What are architectural designs?
-Is it the back-end or backbone of any technology?
-Why a good design architecture is important for any application?
-How Integration Architecture impacts the design of an application
Part 1 of the Application Design Thinking Series
https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-application-design-thinking-with-respect-to-integration-architecture-part-i/
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
Youtube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speaker:-
Robin Sinha:- https://www.linkedin.com/in/robin-sinha/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
Application Design Thinking wrt Integration Architecture - Part I | MuleSoft ...MysoreMuleSoftMeetup
Application Design Thinking with respect to Integration Architecture - Part I | MuleSoft Mysore Meetup #31
Event Link:- https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-application-design-thinking-with-respect-to-integration-architecture-part-i/
-What is Design Thinking & why is it important?
-What is the definition of a good design?
-What are different models of Design Thinking?
-Discussion on some real-life business use cases
Part 2 of the Application Design Thinking Series
https://meetups.mulesoft.com/events/details/mulesoft-mysore-presents-application-design-thinking-with-respect-to-integration-architecture-part-ii/
For Upcoming Meetups Join Mysore Meetup Group - https://meetups.mulesoft.com/mysore/
Youtube:- youtube.com/@mulesoftmysore
Mysore WhatsApp group:- https://chat.whatsapp.com/EhqtHtCC75vCAX7gaO842N
Speaker:-
Robin Sinha:- https://www.linkedin.com/in/robin-sinha/
Organizers:-
Shubham Chaurasia - https://www.linkedin.com/in/shubhamchaurasia1/
Giridhar Meka - https://www.linkedin.com/in/giridharmeka
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. February 18, 2023
Mysore MuleSoft Meetup
Part 2 - Handling NFRs of the API through API
Custom Policies
3. Safe Harbour Statement
● Both the speaker and the host are organizing this meet-up in individual capacity only.
We are not representing our companies here.
● This presentation is strictly for learning purposes only.
● Organizer/Presenter do not hold any responsibility that same solution will work for
your business requirements.
● This presentation is not meant for any promotional activities.
3
4. A recording of this meetup will be uploaded to events page within 24 hours
Questions can be submitted/asked at any time in the Chat/Questions and Answers Tab
Make it more Interactive!!!
Give us feedback! Rate this meetup session by filling feedback form at the end of the day
We Love Feedbacks!!! Its Bread & Butter for Meetup
Housekeeping
4
5. Introduction
● About the Organizers
5
Shubham Chaurasia
Billennium India
Pro Integration Developer
A SHOW OF HANDS:
Who is new to this Meetup?
Giridhar Meka
Sr. Technical Architect
linkedin.com/in/giridharmeka
linkedin.com/in/shubhamchaurasia1
6. 6
Vijayaraghavan Venkatadri
Integration Architect
Introduction
● About the Speaker
✔ Working as an Integration Architect at Ernst & Young GDS
✔ 11+ years of experience in Integration and API products in
Solutioning & Design
✔ Spanning across MuleSoft, IBM stack & Cloud technologies
✔ MuleSoft Mentor & Speaker in the MuleSoft Community
✔ 6x certified in IBM & 2x certified in MuleSoft
7. Agenda
● Introductions
o Summary of Session One (Part 1 - Recap)
■ API’s NFR & Handling NFR
■ API Out of the Box Policies
■ API Policy Enforcement
o Handling NFR using Custom Policy
o Develop, Package, Publish & Manage a Custom Policy
o Use Case : Creating a Custom policy
● Demo
● Q & A
7
8. • Non-functional requirements define ground rules of how the implementation of the functional
requirements guarded and performed.
○ When it comes to API-First approach design, the NFR defines how the Web API
implementation should perform and react upon the Web API invocation by Web API client.
○ NFRs seeks below segments encapsulated in an API implementation such as performance,
security, compliance, consistency & reliability.
Summary of Session One (Part 1- Recap)
8
API’s Non-Functional Requirements
Handling Non-Functional Requirements
High Performant Runtime
Plane
API Design API Policy
Defines the scalability and
reliability by increasing the
throughput and processing time
of an API
Increases the consistency in delivering the data
and also increase the throughput, prevent data
loss being persistent
API Policy plays vital role in
handling the NFR to define the
security, compliance, Quality of
your service and operations
For example: CloudHub
For example: server-side caching,
asynchronous reliable implementations, etc.,
For example: Out-of-the-Box
policies, custom policies
9. ✔ Compliance
○ Client ID enforcement
○ Cross-Origin Resource Sharing (CORS)
✔ Security
○ HTTP Basic Authentication API policies
■ Basic Authentication - LDAP
■ Basic Authentication - Simple
○ IP-based API Policies
■ IP blocklist
■ IP allowlist
Summary of Session One (Part 1- Recap)
9
Out of the Box (OOTB) API Policies
10. ○ Threat Protection API Policies
■ JSON threat protection
■ XML threat protection
○ OAuth 2.0 access token enforcement API policies
■ OAuth 2.0 access token enforcement using Mule OAuth Provider
■ OpenAM access token enforcement
■ PingFederate access token enforcement
■ OpenId Connect access token enforcement
○ JSON Web Token
✔ Quality of Service - QoS
○ SLA-based API policies
■ Rate Limiting - SLA-based 10
Summary of Session One (Part 1- Recap)
Out of the Box (OOTB) API Policies
11. ○ Non-SLA-based API Policies
■ Rate Limiting
■ Spike Control
■ HTTP Caching
✔ Transformation
○ HTTP header manipulation API policies
■ Header Injection
■ Header Removal
✔ Troubleshooting
○ Message Logging
11
Summary of Session One (Part 1- Recap)
Out of the Box (OOTB) API Policies
12. 12
Summary of Session One (Part 1- Recap)
API Policy Enforcement
Mule Application
Non-Mule Application
(Non-Kubernetes cluster)
Non-Mule Application
(Kubernetes cluster)
On Anypoint Platform, the
embedded Mule runtime
enforce the API policies by
acquiring the API policy
enforcement capability within it
Any non-mule application requires
API proxies which can enable API
policy enforcement. API Proxies are
templated mule applications that
can be auto-generated by Anypoint
API manager. It is deployed to Mule
runtime which is typically called as
API Gateway
Anypoint Service Mesh enables API
policy enforcement which can be
installed by customers into their
customer-hosted Kubernetes
cluster. It builds on Istio, hence it is
required in Kubernetes cluster
before installing Anypoint Service
Mesh.
API policies will be
downloaded in Runtime from
API Manager control plane
using API Auto-discovery
Web API client should invoke API
proxies. Upon enforcing API
policies, the call will be routed to
actual API implementation
Web API clients can invoke Web
API implementation directly in which
Istio/Envoy directly intercept the
invocation and enforce API policy.
13. ✔ Custom policy as the name denotes is a custom-made policy specific to the requirement which
you cannot fulfill through out of the box policies.
✔ These custom policies can developed, published as an asset and apply to the API in the API
Managers.
✔ Ideally a custom policy made of two important configuration files
○ Policy Configuration File: It is a YAML file where the policy parameters and metadata are
defined and subsequently rendered into User Interface field sections.
○ Policy Implementation File: It is a XML file where the actual custom policy logics
implemented and created a deployable JAR file.
Handling Non-Functional Requirements
✔ Custom Policy can accommodate both Functional and Non-Functional requirements. But is
predominantly intended for handling non-functional requirements such as
○ Checking Compliance
○ Additional Authentication
○ Custom Logging, etc..
Custom Policy
13
14. ⮚ http-policy:proxy - The definition of a policy starts with this xml element. This element has an
argument that states the policy name.
⮚ http-policy:source - The element contains the instruction to execute and also can perform pre and
post processing activities before and after the HTTP listener event.
⮚ http-policy:execute - The element requires to execute actual Mule application or other policy.
▪ The instruction before the execute element will execute before executing Mule event processing.
▪ The instruction after the execute element will execute after executing Mule event processing.
Policy Implementation File - XML
14
15. An API having two custom policies in the order of authentication and logging
Policy Implementation File - XML
15
Execution Order
When an Web API invocation happens, the transaction route will take place in below pattern
★ Authenticate
★ Log-request
★ Flow execution
★ Log-response
16. ✔ Like Mule application, custom policies also can use extension to make use of mule core capabilities.
✔ Example: mule-http-policy-transform-extension - is used to simplifies the modification of HTTP requests
and responses that go through the different policies.
✔ Also, custom code incorporation is allowed by using Mule plugin programmed using java or XML SDK.
Policy Implementation File - XML
16
Using Extension
✔ Applying API policies for the outbound calls i.e. outgoing HTTP calls within Mule application.
✔ http-policy:operation - is used to inject instructions before the Mule processing reaches the HTTP
requester.
Outbound Policies
Error Handling
✔ Mule 4 can handle errors thrown by API policy. Error handling can be done try and error-handler
elements.
✔ Once an error is caught by an error-handler, the error is either, propagated up the Mule Event
processing chain, or handled, where normal Mule event process execution continues
17. ✔ Handlebars are simple templating framework which is required to control the execution of the
instructions within the Custom Policy.
✔ The execution will happen only when the appropriate criterias are selected.
○ It will access configuration values from YAML config file
○ Conditionally decides which section of the policy are applied depending on the selection criteria
○ Supports multiple operators
Policy Implementation File - XML
17
Handlebars
18. ✔ Mule 4 uses this YAML file to store metadata and user parameters.
These parameters rendered in UI.
✔ This flexible design to allows policy to work for multiple API.
Policy Configuration File - YAML
18
Parameters Type
✔ Depending on the type of the parameter, the UI will render,
such as:
○ text boxes
○ radio buttons
○ checkboxes
19. ✔ Mule 4 requires below steps for publishing a full-fledged custom policy
➢ Develop the policy
➢ Package the policy
➢ Upload the resulting policy assets to Exchange
➢ Apply the policy to any API through API Manager
Publishing Custom Policy
19
Develop the policy
✔ The first step to develop a custom policy consists in setting up a project with the required files.
✔ Maven archetype is the easiest way to gather required files in the project
✔ There are four files created and needed for a working policy
➢ pom.xml
➢ mule-artifact.json
➢ custom-policy.yaml
➢ template.xml
20. Publishing Custom Policy
20
Packaging the policy
✔ Use Maven plugin to package the policy into a deployable jar file.
✔ Use mvn clean package command to package your application
Upload the policy to Exchange
✔ In order to deploy to exchange, update your settings.xml with your exchange credentials or use
connected apps.
✔ Use mvn clean deploy command to deploy to Exchange.
Apply the policy to API via API Manager
✔ In the Anypoint API Manager, you can see the custom Policy is available in the Custom Policy section.
✔ Apply the Custom policy to the API you want.
21. USE CASE: Creating a Custom Policy
21
✔ A specific use case that an API receives customer creating request in which it has all the
customer information. As part of the customer creation in the backend, custId should be
generated in the response.
✔ Custom Logging Requirement
➢ Custom Message to be logged when the request is received.
➢ Should have option to dynamic plug and play logging in the request and the response.
➢ If the request logging is enabled,
■ Request attributes to be logged
■ Option of enabling/disabling of request attributes should be available.
➢ If the response logging is enabled
■ Response Payload to be logged
■ Option of enabling/disabling of response payload should be available.
POST /customers
24. Take a stand !
● Nominate yourself for the next meetup speaker and suggest a topic as well.
24
25. ● Share:
○ Tweet using the hashtag #MuleSoftMeetups
○ Join Mysore Group: https://meetups.mulesoft.com/mysore/
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
○ Reach out to Mysore Meetup Leaders (Shubham/Giridhar) to suggest topics
for next Meetup
What’s next?
25