SlideShare a Scribd company logo
WORKING OF MULE
Layers :
 There are three layers in the architecture :
 The application layer,
 The integration layer,
 The transport layer.
Architechture :
General types of tasks you can perform to
configure and customize your Mule deployment:
 Service Component Development: Developing or reuse
existing POJOs, services, Cloud Connectors, or Spring beans
that contain the business logic and will consume, process, or
enrich messages.
 Service Orchestration: Configuring message processors,
routers, transformers, and filters that provide the service
mediation and orchestration capabilities required to allow
composition of loosely coupled services using a Mule Flow.
 Integration: A key requirement of service mediation is
decoupling services from the underlying protocols. Mule
provides transports to allow dispatching and receiving
messages on different protocol connectors. These connectors
are configured in the Mule configuration and then can be
referenced from the orchestration layer.
Create a Service Component :
 A service component is a class, web service, or
other application that contains the business logic
you want to plug in to the Mule service bus. You
can use any existing :
 Java class,
 Spring bean,
 Groovy script,
 Cloud Connector, or create a new component.
 Your service component does not need to contain
any Mule-specific code. All the Mule-specific
instructions will be configured on the service that
wraps the service component.
Configure the Mule Instance :
 The Mule configuration file allows you to configure
all the elements you need in your Mule instance.
 <configuration> element is used to set global
configuration options such as the threading
profile.
 Then define the connectors, transformers, and
endpoints to be used in different flows. Lastly,
configure flows or service models, which act as
containers for services and orchestration
elements and apply settings such as the queue
profile and error handling to all the services in that
flow or service model.
Configure the Flow :
 Configure a flow using the <flow> element in the
Mule configuration file.
 The flow creates a composition around the service
component(s) that will allow to define how
messages are routed, filtered, transformed and
enriched before or after processing by one or a
series of service components.
 Flows are more flexible and robust than the
traditional service model in Mule, allowing a more
natural and compact means of describing service
orchestration.
Configure the Service :
 Service can be configured within
a <model> element in the Mule configuration
file.
 The service points to the service component,
routers, filters, and transformers.
 It also specifies the endpoint on which this
service will receive messages and the
outbound endpoint where messages will go
next.
Message Processors :
 Message Processors are the basic building
blocks in Mule and in fact, components, routers,
filters, and transformers are all message
processors.
 There are also other special message processors
that do not fall in one of those categories.
 These include a number of specialized modules
like CXF and Jersey Web Services, BPM, as well
as a few specialized integration elements
like <poll>, <content-enricher>, and <logger>.
 Custom message processor can also be created
easily.
Routers :
 Router types :
 Inbound routers
 Outbound routers
 Default routers (many)
 Inbound routers specify how messages are routed
to a service.
 Outbound routers specify how messages are
routed after the service has finished processing
them.
 There are several default routers that come with
Mule that you can use, or you can create your
own routers.
Filters :
 Filters specify conditions that must be met for
a message to be routed to a service.
 There are several default filters that come with
Mule that you can use, or you can create your
own filters.
Transformers :
 Transformers convert incoming payload data
to the type required by the service component.
 After the service has finished processing the
message, they can also convert the message
to a different type as needed by the outbound
transport.
 There are several default transformers you can
use, or create your own.
Transports and Connectors :
 Mule provides default transports for many different
channels, including :
 File,
 FTP,
 HTTP,
 JMS,
 JDBC,
 Quartz, and many more.
 Transports communicate with the channel using a
connector.
 There are also many community-contributed
transports and Cloud Connectors on Mule Forge.
Cloud Connectors :
 Cloud Connectors are actually message
processors that are used to speak to
application APIs over existing transports -
almost always HTTP.
 Cloud Connectors typically connect
 SaaS applications,
 Social media,
 Cloud infrastructure services,
 Cloud-based data services.
Extend Mule :
 Mule provides a complete set of APIs for
extending Mule. Typical custom extensions
include:
 Cloud Connectors
 Transports
 Custom Message Processors
 Custom Transformers
 Configuration Patterns
 Still more to learn!!!!!!!!!!!! STAY TUNED!!!!!!

More Related Content

What's hot

Webservice vm in mule
Webservice vm in muleWebservice vm in mule
Webservice vm in mule
Praneethchampion
 
Mule soa
Mule soaMule soa
Mule soa
Khasim Saheb
 
Mule esb
Mule esbMule esb
Mule esb
charan teja R
 
Testing mule
Testing   muleTesting   mule
Testing mule
Sindhu VL
 
Mule soa
Mule soaMule soa
Mule soa
D.Rajesh Kumar
 
Introduction to mule esb
Introduction to mule esbIntroduction to mule esb
Introduction to mule esb
Khasim Cise
 
Mule Esb Introduction
Mule Esb IntroductionMule Esb Introduction
Mule Esb Introduction
AbdulImrankhan7
 
Mule core concepts
Mule core conceptsMule core concepts
Mule core concepts
Khadhar Koneti
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esb
Sreekanth Kondapalli
 
MuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
MuleSoft Consuming Soap Web Service - CXF Proxy-Client ModuleMuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
MuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
Vince Soliza
 
Mule advanced
Mule advancedMule advanced
Mule advanced
D.Rajesh Kumar
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esb
RaviShankar Mishra
 
Rabbit Mq in Mule
Rabbit Mq in MuleRabbit Mq in Mule
Rabbit Mq in Mule
Mohammed246
 
Introduction To Mule
Introduction To MuleIntroduction To Mule
Introduction To Mule
Roy Prins
 
Mulesoft idempotent Message Filter
Mulesoft idempotent Message FilterMulesoft idempotent Message Filter
Mulesoft idempotent Message Filter
kumar gaurav
 

What's hot (15)

Webservice vm in mule
Webservice vm in muleWebservice vm in mule
Webservice vm in mule
 
Mule soa
Mule soaMule soa
Mule soa
 
Mule esb
Mule esbMule esb
Mule esb
 
Testing mule
Testing   muleTesting   mule
Testing mule
 
Mule soa
Mule soaMule soa
Mule soa
 
Introduction to mule esb
Introduction to mule esbIntroduction to mule esb
Introduction to mule esb
 
Mule Esb Introduction
Mule Esb IntroductionMule Esb Introduction
Mule Esb Introduction
 
Mule core concepts
Mule core conceptsMule core concepts
Mule core concepts
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esb
 
MuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
MuleSoft Consuming Soap Web Service - CXF Proxy-Client ModuleMuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
MuleSoft Consuming Soap Web Service - CXF Proxy-Client Module
 
Mule advanced
Mule advancedMule advanced
Mule advanced
 
Send email attachment using smtp in mule esb
Send email attachment using smtp in mule esbSend email attachment using smtp in mule esb
Send email attachment using smtp in mule esb
 
Rabbit Mq in Mule
Rabbit Mq in MuleRabbit Mq in Mule
Rabbit Mq in Mule
 
Introduction To Mule
Introduction To MuleIntroduction To Mule
Introduction To Mule
 
Mulesoft idempotent Message Filter
Mulesoft idempotent Message FilterMulesoft idempotent Message Filter
Mulesoft idempotent Message Filter
 

Viewers also liked

intraparankimal hemoraji
intraparankimal hemorajiintraparankimal hemoraji
intraparankimal hemoraji
gopacil
 
BSS_Software Engineer_Accenture_5years-QA
BSS_Software Engineer_Accenture_5years-QABSS_Software Engineer_Accenture_5years-QA
BSS_Software Engineer_Accenture_5years-QASumit Shah
 
11.11.2015 macro risk outlook ankhbayar mandal- eng (1)
11.11.2015 macro risk outlook   ankhbayar mandal- eng (1)11.11.2015 macro risk outlook   ankhbayar mandal- eng (1)
11.11.2015 macro risk outlook ankhbayar mandal- eng (1)
The Business Council of Mongolia
 
22.04.2011, NEWSWIRE, Issue 164
22.04.2011, NEWSWIRE, Issue 16422.04.2011, NEWSWIRE, Issue 164
22.04.2011, NEWSWIRE, Issue 164
The Business Council of Mongolia
 
Merged
MergedMerged
Merged
alexxmason
 
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
The Business Council of Mongolia
 
Marc
MarcMarc
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
The Business Council of Mongolia
 
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
The Business Council of Mongolia
 
13.05.2014 Mongolia investment law select issues, B.Enkhbat
13.05.2014 Mongolia investment law select issues, B.Enkhbat13.05.2014 Mongolia investment law select issues, B.Enkhbat
13.05.2014 Mongolia investment law select issues, B.Enkhbat
The Business Council of Mongolia
 
Renal Enfarkt
Renal EnfarktRenal Enfarkt
Renal Enfarkt
gopacil
 
2013.06.19 Эрчим хүчний диваажин, Б. Бямбасайхан
2013.06.19  Эрчим хүчний диваажин, Б. Бямбасайхан2013.06.19  Эрчим хүчний диваажин, Б. Бямбасайхан
2013.06.19 Эрчим хүчний диваажин, Б. Бямбасайхан
The Business Council of Mongolia
 
23.04.2010, NEWSWIRE, Issue 115
23.04.2010, NEWSWIRE, Issue 11523.04.2010, NEWSWIRE, Issue 115
23.04.2010, NEWSWIRE, Issue 115
The Business Council of Mongolia
 
Os cigano sinti
Os cigano sintiOs cigano sinti
Os cigano sinti
filhosdagehenna
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Nordic Infrastructure Conference
 
Money laundering
Money launderingMoney laundering
Money laundering
Sana Hassan Afridi
 
AndreaRenaud_DesignMgt_Portfolio2
AndreaRenaud_DesignMgt_Portfolio2AndreaRenaud_DesignMgt_Portfolio2
AndreaRenaud_DesignMgt_Portfolio2Andrea Renaud
 
Visible light communication (VLC) systems & the effect of noise on their perf...
Visible light communication (VLC) systems & the effect of noise on their perf...Visible light communication (VLC) systems & the effect of noise on their perf...
Visible light communication (VLC) systems & the effect of noise on their perf...
Sasa Mavrommati
 

Viewers also liked (19)

intraparankimal hemoraji
intraparankimal hemorajiintraparankimal hemoraji
intraparankimal hemoraji
 
BSS_Software Engineer_Accenture_5years-QA
BSS_Software Engineer_Accenture_5years-QABSS_Software Engineer_Accenture_5years-QA
BSS_Software Engineer_Accenture_5years-QA
 
11.11.2015 macro risk outlook ankhbayar mandal- eng (1)
11.11.2015 macro risk outlook   ankhbayar mandal- eng (1)11.11.2015 macro risk outlook   ankhbayar mandal- eng (1)
11.11.2015 macro risk outlook ankhbayar mandal- eng (1)
 
22.04.2011, NEWSWIRE, Issue 164
22.04.2011, NEWSWIRE, Issue 16422.04.2011, NEWSWIRE, Issue 164
22.04.2011, NEWSWIRE, Issue 164
 
Merged
MergedMerged
Merged
 
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
2012. REPORT, Risk report for Mongolia 2012, Mongolia Economic Forum
 
Marc
MarcMarc
Marc
 
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
07.08.2006, LAW, On Combating Money Laundering and Terrorism Financing
 
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
23.07.2012 Quantifying the costs of regulatory inefficiency, Olin McGill
 
13.05.2014 Mongolia investment law select issues, B.Enkhbat
13.05.2014 Mongolia investment law select issues, B.Enkhbat13.05.2014 Mongolia investment law select issues, B.Enkhbat
13.05.2014 Mongolia investment law select issues, B.Enkhbat
 
RaviCV-2016- Updated
RaviCV-2016- UpdatedRaviCV-2016- Updated
RaviCV-2016- Updated
 
Renal Enfarkt
Renal EnfarktRenal Enfarkt
Renal Enfarkt
 
2013.06.19 Эрчим хүчний диваажин, Б. Бямбасайхан
2013.06.19  Эрчим хүчний диваажин, Б. Бямбасайхан2013.06.19  Эрчим хүчний диваажин, Б. Бямбасайхан
2013.06.19 Эрчим хүчний диваажин, Б. Бямбасайхан
 
23.04.2010, NEWSWIRE, Issue 115
23.04.2010, NEWSWIRE, Issue 11523.04.2010, NEWSWIRE, Issue 115
23.04.2010, NEWSWIRE, Issue 115
 
Os cigano sinti
Os cigano sintiOs cigano sinti
Os cigano sinti
 
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
Justin Morris - Enhancing your lync 2013 rollout to make it a killer success ...
 
Money laundering
Money launderingMoney laundering
Money laundering
 
AndreaRenaud_DesignMgt_Portfolio2
AndreaRenaud_DesignMgt_Portfolio2AndreaRenaud_DesignMgt_Portfolio2
AndreaRenaud_DesignMgt_Portfolio2
 
Visible light communication (VLC) systems & the effect of noise on their perf...
Visible light communication (VLC) systems & the effect of noise on their perf...Visible light communication (VLC) systems & the effect of noise on their perf...
Visible light communication (VLC) systems & the effect of noise on their perf...
 

Similar to How muleworks

Working of mule
Working of muleWorking of mule
Working of mule
Sindhu VL
 
Mule
MuleMule
Mule esb
Mule esbMule esb
Mule esb
Khasim Saheb
 
Mule esb
Mule esbMule esb
Mule esb
Phaniu
 
Mule esb
Mule esbMule esb
Mule esb
Anand kalla
 
Mule esb Basics
Mule esb BasicsMule esb Basics
Mule esb Basics
Sunil Komarapu
 
Mule esb
Mule esbMule esb
Mule esb
Phaniu
 
Mule esb
Mule esbMule esb
Mule esb
irfan1008
 
Mule esb
Mule esbMule esb
Mule esb
vishnukanthro45
 
Mule esb
Mule esbMule esb
Srilekha mule esb
Srilekha mule esbSrilekha mule esb
Srilekha mule esb
srilekha2820
 
Elements in a mule flow
Elements in a mule flowElements in a mule flow
Elements in a mule flow
Sindhu VL
 
Mule enterprise service introduction
Mule enterprise service introductionMule enterprise service introduction
Mule enterprise service introduction
Son Nguyen
 
Mule esb
Mule esbMule esb
Mule esb
himajareddys
 
Mule esb
Mule esbMule esb
Mule esb
himajareddys
 
Mule esb naveen
Mule esb naveenMule esb naveen
Mule esb naveen
naveenkodumuri12
 
Niranjan mule esb
Niranjan mule esbNiranjan mule esb
Niranjan mule esb
niranjan1234567
 
Mule
MuleMule
Sai mule esb batch
Sai mule esb batchSai mule esb batch
Sai mule esb batch
saikiran6423
 
Esb process
Esb processEsb process
Esb process
saikiran6423
 

Similar to How muleworks (20)

Working of mule
Working of muleWorking of mule
Working of mule
 
Mule
MuleMule
Mule
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb Basics
Mule esb BasicsMule esb Basics
Mule esb Basics
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Srilekha mule esb
Srilekha mule esbSrilekha mule esb
Srilekha mule esb
 
Elements in a mule flow
Elements in a mule flowElements in a mule flow
Elements in a mule flow
 
Mule enterprise service introduction
Mule enterprise service introductionMule enterprise service introduction
Mule enterprise service introduction
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule esb naveen
Mule esb naveenMule esb naveen
Mule esb naveen
 
Niranjan mule esb
Niranjan mule esbNiranjan mule esb
Niranjan mule esb
 
Mule
MuleMule
Mule
 
Sai mule esb batch
Sai mule esb batchSai mule esb batch
Sai mule esb batch
 
Esb process
Esb processEsb process
Esb process
 

More from Khadhar Koneti

Glip team integration with ring central
Glip team integration with ring centralGlip team integration with ring central
Glip team integration with ring central
Khadhar Koneti
 
Sms integration with ring central
Sms integration with ring centralSms integration with ring central
Sms integration with ring central
Khadhar Koneti
 
Call ringout app
Call ringout appCall ringout app
Call ringout app
Khadhar Koneti
 
Ring central messaging api
Ring central messaging apiRing central messaging api
Ring central messaging api
Khadhar Koneti
 
Ring central voice api
Ring central voice apiRing central voice api
Ring central voice api
Khadhar Koneti
 
Ring central sdk overview
Ring central sdk overviewRing central sdk overview
Ring central sdk overview
Khadhar Koneti
 
Data weave documentation
Data weave documentationData weave documentation
Data weave documentation
Khadhar Koneti
 

More from Khadhar Koneti (7)

Glip team integration with ring central
Glip team integration with ring centralGlip team integration with ring central
Glip team integration with ring central
 
Sms integration with ring central
Sms integration with ring centralSms integration with ring central
Sms integration with ring central
 
Call ringout app
Call ringout appCall ringout app
Call ringout app
 
Ring central messaging api
Ring central messaging apiRing central messaging api
Ring central messaging api
 
Ring central voice api
Ring central voice apiRing central voice api
Ring central voice api
 
Ring central sdk overview
Ring central sdk overviewRing central sdk overview
Ring central sdk overview
 
Data weave documentation
Data weave documentationData weave documentation
Data weave documentation
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

How muleworks

  • 2. Layers :  There are three layers in the architecture :  The application layer,  The integration layer,  The transport layer.
  • 4. General types of tasks you can perform to configure and customize your Mule deployment:  Service Component Development: Developing or reuse existing POJOs, services, Cloud Connectors, or Spring beans that contain the business logic and will consume, process, or enrich messages.  Service Orchestration: Configuring message processors, routers, transformers, and filters that provide the service mediation and orchestration capabilities required to allow composition of loosely coupled services using a Mule Flow.  Integration: A key requirement of service mediation is decoupling services from the underlying protocols. Mule provides transports to allow dispatching and receiving messages on different protocol connectors. These connectors are configured in the Mule configuration and then can be referenced from the orchestration layer.
  • 5. Create a Service Component :  A service component is a class, web service, or other application that contains the business logic you want to plug in to the Mule service bus. You can use any existing :  Java class,  Spring bean,  Groovy script,  Cloud Connector, or create a new component.  Your service component does not need to contain any Mule-specific code. All the Mule-specific instructions will be configured on the service that wraps the service component.
  • 6. Configure the Mule Instance :  The Mule configuration file allows you to configure all the elements you need in your Mule instance.  <configuration> element is used to set global configuration options such as the threading profile.  Then define the connectors, transformers, and endpoints to be used in different flows. Lastly, configure flows or service models, which act as containers for services and orchestration elements and apply settings such as the queue profile and error handling to all the services in that flow or service model.
  • 7. Configure the Flow :  Configure a flow using the <flow> element in the Mule configuration file.  The flow creates a composition around the service component(s) that will allow to define how messages are routed, filtered, transformed and enriched before or after processing by one or a series of service components.  Flows are more flexible and robust than the traditional service model in Mule, allowing a more natural and compact means of describing service orchestration.
  • 8. Configure the Service :  Service can be configured within a <model> element in the Mule configuration file.  The service points to the service component, routers, filters, and transformers.  It also specifies the endpoint on which this service will receive messages and the outbound endpoint where messages will go next.
  • 9. Message Processors :  Message Processors are the basic building blocks in Mule and in fact, components, routers, filters, and transformers are all message processors.  There are also other special message processors that do not fall in one of those categories.  These include a number of specialized modules like CXF and Jersey Web Services, BPM, as well as a few specialized integration elements like <poll>, <content-enricher>, and <logger>.  Custom message processor can also be created easily.
  • 10. Routers :  Router types :  Inbound routers  Outbound routers  Default routers (many)  Inbound routers specify how messages are routed to a service.  Outbound routers specify how messages are routed after the service has finished processing them.  There are several default routers that come with Mule that you can use, or you can create your own routers.
  • 11. Filters :  Filters specify conditions that must be met for a message to be routed to a service.  There are several default filters that come with Mule that you can use, or you can create your own filters.
  • 12. Transformers :  Transformers convert incoming payload data to the type required by the service component.  After the service has finished processing the message, they can also convert the message to a different type as needed by the outbound transport.  There are several default transformers you can use, or create your own.
  • 13. Transports and Connectors :  Mule provides default transports for many different channels, including :  File,  FTP,  HTTP,  JMS,  JDBC,  Quartz, and many more.  Transports communicate with the channel using a connector.  There are also many community-contributed transports and Cloud Connectors on Mule Forge.
  • 14. Cloud Connectors :  Cloud Connectors are actually message processors that are used to speak to application APIs over existing transports - almost always HTTP.  Cloud Connectors typically connect  SaaS applications,  Social media,  Cloud infrastructure services,  Cloud-based data services.
  • 15. Extend Mule :  Mule provides a complete set of APIs for extending Mule. Typical custom extensions include:  Cloud Connectors  Transports  Custom Message Processors  Custom Transformers  Configuration Patterns
  • 16.  Still more to learn!!!!!!!!!!!! STAY TUNED!!!!!!