This document provides instructions for creating a load balancer and virtual private cloud (VPC) on MuleSoft's Anypoint Platform. It describes how to create a VPC with a specified name, region, and CIDR block. It then explains how to create a load balancer within that VPC, associating it with an SSL certificate and setting firewall rules. It also discusses how to add mapping rules and update an existing load balancer's configuration via the API.
Session on API auto scaling, monitoring and Log managementpqrs1234
API Autoscaling
When to configure
How to configure
Points to be noted while configuring
Anypoint Monitoring Overview
Advantages and uses
Built-in dashboards
Custom dashboards
Reports
Alerts
Functional Monitoring
Log Management
Log Search
Log Points
Log Download
IBM DataPower Gateway appliances are used in a variety of user scenarios to enable security, control, integration and optimized access for a range of workloads including Mobile, Web, API, B2B, Web Services and SOA. This presentation from the IBM DataPower team provides an in-depth look at each use case.
Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...Angel Alberici
Speakers:
- Arno Brugman
- Anu Vijayamohan
Host: Angel Alberici
Youtube: Virtual Muleys (https://www.youtube.com/c/VirtualMuleysOnline/videos)
Meetups: https://meetups.mulesoft.com/online-group-english/
After our first session, Containerizing the Mule Runtime with Kubernetes, you will understand the pros and cons of containerizing the Mule Runtime and how Anypoint Runtime Fabric eliminates many of the management and maintenance headaches. We will discuss:
Introduction to containerization
Containerization environments
Containerizing the Mule Runtime with Kubernetes
Building the Image
Deploying the application
CI/CD
Runtime Fabric
After our second session, From Zero to Batch, you will understand the concept of Batch Processing in Mule 4. We will discuss:
Introduction to Batch processing
Use Cases for Batch
Batch Processing Features in Mule 4
Best Practices for Batch Processing
Error Handling
Performance Tuning Considerations
Certification Tips
Session on API auto scaling, monitoring and Log managementpqrs1234
API Autoscaling
When to configure
How to configure
Points to be noted while configuring
Anypoint Monitoring Overview
Advantages and uses
Built-in dashboards
Custom dashboards
Reports
Alerts
Functional Monitoring
Log Management
Log Search
Log Points
Log Download
IBM DataPower Gateway appliances are used in a variety of user scenarios to enable security, control, integration and optimized access for a range of workloads including Mobile, Web, API, B2B, Web Services and SOA. This presentation from the IBM DataPower team provides an in-depth look at each use case.
Containerising the Mule Runtime with Kubernetes & From Zero to Batch : MuleS...Angel Alberici
Speakers:
- Arno Brugman
- Anu Vijayamohan
Host: Angel Alberici
Youtube: Virtual Muleys (https://www.youtube.com/c/VirtualMuleysOnline/videos)
Meetups: https://meetups.mulesoft.com/online-group-english/
After our first session, Containerizing the Mule Runtime with Kubernetes, you will understand the pros and cons of containerizing the Mule Runtime and how Anypoint Runtime Fabric eliminates many of the management and maintenance headaches. We will discuss:
Introduction to containerization
Containerization environments
Containerizing the Mule Runtime with Kubernetes
Building the Image
Deploying the application
CI/CD
Runtime Fabric
After our second session, From Zero to Batch, you will understand the concept of Batch Processing in Mule 4. We will discuss:
Introduction to Batch processing
Use Cases for Batch
Batch Processing Features in Mule 4
Best Practices for Batch Processing
Error Handling
Performance Tuning Considerations
Certification Tips
MuleSoft Deployment Strategies (RTF vs Hybrid vs CloudHub)Prashanth Kurimella
Differences between MuleSoft Deployment Strategies (RTF vs Hybrid vs CloudHub)
For additional information, read https://www.linkedin.com/pulse/mulesoft-deployment-strategies-rtf-vs-hybrid-cloudhub-kurimella/
Application Architecture: The Next Wave | MuleSoftMuleSoft
The way we build applications is changing. By analyzing architecture trends of the past and studying forward thinking infrastructures at Apple and Netflix we present a compelling framework for how to think about the future as the traditional application stack is redefined.
Speaker: Anu Vijayamohan
Host: Angel Alberici
VirtualMuleys: 66 - 20220304-April
Recording & Slides: https://meetups.mulesoft.com/events/details/mulesoft-online-group-english-presents-mulesoft-sizing-guidelines/
All Recordings & Slides: meetups.mulesoft.com/online-group-english/ & youtube.com/c/VirtualMuleysOnline/videos
In this session we will discuss:
Core concepts of sizing
Factors that impact mule sizing
T-Shirt sizing
Sizing nuances in Cloudhub vs OnPrem vs RTF
High Availability
A presentation from internal meeting on Message Broker System and RabbitMQ. RabbitMQ is open source message broker software that implements the Advanced Message Queuing Protocol (AMQP).
Frequently asked MuleSoft Interview Questions and Answers from TechlightningArul ChristhuRaj Alphonse
MuleSoft Interview Questions and answers from youtube channel Techlightning
https://www.youtube.com/watch?v=JqBgT2t6cCQ&list=PLfEAetjBY9s4YdBie3VSpufxNcnC3wJvK
AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.
Presented by: Alessandro Esposito, Cloudfront Account Manager, Amazon Web Services
With the growing interest in the API economy, IBM Integration Bus (IIB) has provided many recent enhancements in the area of REST APIs and JSON support. This session will discuss how to create an IIB REST API, either from scratch or starting from a Swagger (OpenAPI specification) document. We will also cover the new JSON Schema support for the Graphical Data Mapper, and the new REST Request node for calling REST APIs from IIB, which can be easily configured by drag-and-drop. Easy integration of IIB Rest APIs with an API Connect catalog is also possible, from both the IIB Toolkit and the IIB Web UI. We will talk through these new capabilities and how they relate to IBM's Application Integration Suite (AIS) solution.
MuleSoft Deployment Strategies (RTF vs Hybrid vs CloudHub)Prashanth Kurimella
Differences between MuleSoft Deployment Strategies (RTF vs Hybrid vs CloudHub)
For additional information, read https://www.linkedin.com/pulse/mulesoft-deployment-strategies-rtf-vs-hybrid-cloudhub-kurimella/
Application Architecture: The Next Wave | MuleSoftMuleSoft
The way we build applications is changing. By analyzing architecture trends of the past and studying forward thinking infrastructures at Apple and Netflix we present a compelling framework for how to think about the future as the traditional application stack is redefined.
Speaker: Anu Vijayamohan
Host: Angel Alberici
VirtualMuleys: 66 - 20220304-April
Recording & Slides: https://meetups.mulesoft.com/events/details/mulesoft-online-group-english-presents-mulesoft-sizing-guidelines/
All Recordings & Slides: meetups.mulesoft.com/online-group-english/ & youtube.com/c/VirtualMuleysOnline/videos
In this session we will discuss:
Core concepts of sizing
Factors that impact mule sizing
T-Shirt sizing
Sizing nuances in Cloudhub vs OnPrem vs RTF
High Availability
A presentation from internal meeting on Message Broker System and RabbitMQ. RabbitMQ is open source message broker software that implements the Advanced Message Queuing Protocol (AMQP).
Frequently asked MuleSoft Interview Questions and Answers from TechlightningArul ChristhuRaj Alphonse
MuleSoft Interview Questions and answers from youtube channel Techlightning
https://www.youtube.com/watch?v=JqBgT2t6cCQ&list=PLfEAetjBY9s4YdBie3VSpufxNcnC3wJvK
AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. AWS WAF gives you control over which traffic to allow or block to your web applications by defining customizable web security rules. You can use AWS WAF to create custom rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that are designed for your specific application. New rules can be deployed within minutes, letting you respond quickly to changing traffic patterns. Also, AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of web security rules.
Presented by: Alessandro Esposito, Cloudfront Account Manager, Amazon Web Services
With the growing interest in the API economy, IBM Integration Bus (IIB) has provided many recent enhancements in the area of REST APIs and JSON support. This session will discuss how to create an IIB REST API, either from scratch or starting from a Swagger (OpenAPI specification) document. We will also cover the new JSON Schema support for the Graphical Data Mapper, and the new REST Request node for calling REST APIs from IIB, which can be easily configured by drag-and-drop. Easy integration of IIB Rest APIs with an API Connect catalog is also possible, from both the IIB Toolkit and the IIB Web UI. We will talk through these new capabilities and how they relate to IBM's Application Integration Suite (AIS) solution.
CloudHub provides a variety of tools to architect your integrations and APIs so that they are maintainable, secure, and scalable. This guide covers the basic network architecture, DNS, and firewall rules.
Scaling Puppet Enterprise with Compile Masters requires you to provision new machines and manually configure them, as well as your Puppet Master server.
Learn how you can automatically provision and configure new Compile Master nodes for your AWS Opsworks for Puppet Enterprise server by leveraging AWS Systems Manager
AWS provides a range of security services and features that AWS customers can use to secure their content and meet their own specific business requirements for security. This presentation focuses on the top 5 ways you can make use of AWS security features to meet your own organization's security and compliance objectives.
Reasons to attend:
Learn about the AWS approach to security and how responsibilities are shared between AWS and our customers.
Learn how to build your own secure virtual private cloud and integrate it with your existing solutions.
Learn how to use AWS services and scale to assist in mitigation against attacks.
Learn best practices for securing your AWS account, your content and your applications.
AWS Webcast - Deploying Remote Desktop Gateway on the AWS CloudAmazon Web Services
This webinar reviews our new Remote Desktop Gateway Reference Implementation Guide which will help you deploy Remote Desktop Gateway on AWS in about an hour. Included is an overview of the reference architecture, best practices for securely accessing your Windows-based instances using the Remote Desktop Protocol (RDP) for remote administration. Also provided are AWS CloudFormation templates to help automate deployment.
Do you get too many visitors on the website, getting maximum hits on your site may crash your site, your site may get stuck or it may go through a downtime? How to avoid such instances?
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...Kasun Gajasinghe
Setting up a cluster is important when developing enterprise software and deploying them in production environments. Distributing deployment artifacts & related metadata to all nodes in a homogeneous cluster is a typical requirement for a clustered deployment of any middleware platform. In such a cluster, all nodes should contain the deployed artifacts as well as the related metadata.
The Deployment Synchronizer (DepSync) is the mechanism used in the WSO2 platform for distributing these artifacts and metadata across all nodes in the cluster. It provides the ability to synchronize data between the worker nodes of a product cluster. When used with the WSO2 Application Server, or the WSO2 ESB, you can synchronize your deployable artifacts like web services, and web applications etc. across the cluster nodes. In addition, with the latest WSO2 Carbon 4 release, WSO2 provides the ability to synchronize service metadata which includes service policies, transports, and service-type specific data. Now you only have to deploy and configure services in one node - called the manager. Then, DepSync will replicate those to other nodes - workers.
In this presentation, we present how this is done in the WSO2 Cloud-enabled middleware platform. Typical deployment artifacts will include webapps, JAXWS/JAXRS apps, data services, proxy services, and BPEL processes . The WSO2 platform also natively supports multi-tenancy. Tenants & tenant artifacts are loaded on demand. We will demonstrate how DepSync works efficiently with multi-tenancy.
Kasun Gajasinghe did the demonstration section of this webinar presentation while Pradeep Fernando provided technical aspects of Deployment Synchronizer
Migrating from Pivotal tc Server on-prem to IBM Liberty in the cloudJohn Donaldson
The airline company was trying to create a new mobile check-in solution hosted on the cloud, to improve availability in peak usage check-in times which are unpredictable during any given time in the week. They saw the cloud as the way to accomplish this without maintaining costly disaster recovery centers.
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks
Use this VNS3 set up guide to get started in the Amazon Cloud (AWS) VPC public cloud environments.
About VNS3:
VNS3 delivers cloud networking and NFV functionality for virtual and cloud environments. The VNS3 virtual network security appliance includes a router, switch, stateful firewall, VPN support (IPsec and SSL), and protocol redistributor, and extensible NFV optimized for all major cloud providers. VNS3 cloud networks are configured and managed through the VNS3 Manager web-based UI or resetful API.
VNS3 is available in: Amazon Web Services EC2, Amazon Web Services VPC, Microsoft Azure, CenturyLink Cloud, Google Compute Engine (GCE), Rackspace, IBM SoftLayer, ElasticHosts, Verizon Terremark vCloud Express, InterRoute, Abiquo, Openstack, Flexiant, Eucalyptus, Abiquo, HPE Helion, VMware (all formats), Citrix, Xen, KVM, and more.
VNS3 supports most IPsec data center solutions, including: Preferred Most models from Cisco Systems*, Juniper, Watchguard, Dell SONICWALL, Netgear, Fortinet, Barracuda Networks, Check Point*, Zyxel USA, McAfee Retail, Citrix Systems, Hewlett Packard, D-Link, WatchGuard, Palo Alto Networks, OpenSwan, pfSense, Vyatta, and any IPsec device that supports IKE1 or IKE2, AES256 or AES128 or 3DES, SHA1 or MD5, and most importantly NAT-Traversal standards.
AWS Certified Cloud Practitioner Course S7-S10Neal Davis
This deck contains the slides from our AWS Certified Cloud Practitioner video course. It covers:
Section 7 DNS, Elastic Load Balancing, and Auto Scaling
Section 8 Application Services
Section 9 Amazon VPC, Networking, and Hybrid
Section 10 Deployment and Automation
Full course can be found here: https://digitalcloud.training/courses/aws-certified-cloud-practitioner-video-course/
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsAmazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). First, we will cover build-out and design fundamentals for VPC, including picking your IP space, subnetting, routing, security, NAT, and much more. We will then transition into different approaches and use cases for optionally connecting your VPC to your physical data center with VPN or AWS Direct Connect. This mid-level architecture discussion is aimed at architects, network administrators, and technology decision-makers interested in understanding the building blocks AWS makes available with VPC and how you can connect this with your offices and current data center footprint.
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...VMworld
VMworld 2013
Nicholas Colyer, Catamaran RX
Dan Mitchell, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Amazon Web Services (AWS) provides Elastic Load Balancing to automatically distribute incoming web traffic across multiple Amazon Elastic Compute Cloud (Amazon EC2) instances.
With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall flow of information. If one EC2 instance fails, Elastic Load Balancing automatically reroutes the traffic to the remaining running EC2 instances. If the failed EC2 instance is restored, Elastic Load Balancing restores the traffic to that instance.
Elastic Load Balancing offers clients a single point of contact, and it can also serve as the first line of defense against attacks on your network. You can offload the work of encryption and decryption to Elastic Load Balancing, so your servers can focus on their main task.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Load balancer in mule
1. Load Balancer in Mule
and VPC creation
This feature will eventually be built into the
Runtime Manager UI, however currently it’s
only available as a service that can be used via
the Anypoint Command Line Interface.
2. • Create a VPC
• To create a VPC, log in to your Anypoint
Platform and follow these steps:
• Select the VPCs tab from the navigation bar to
your left.
• Click the Create VPC option:
3.
4.
5. All VPCs need to be associated to a
CloudHub region.
• A VPC name.
For this tutorial, name your VPC vpc-tutorial.
• The region to which the VPC is bound.
In this case, the VPC is bound to US East
(Virginia).
6. • The size of your VPC in Classless Inter-Domain
Routing (CIDR) notation.
Set it to 10.111.0.0/24 which grants us 256 IP
addresses from 10.111.0.0 to 10.111.0.255.
The CIDR Blocks chosen for the VPC should
ideally come from a private IP space, and
should not overlap with any other VPC’s CIDR
Blocks or any CIDR Blocks in use in your
corporate network.
7. • Once the VPC is created, it is not possible to
resize it, nor to edit your selected CIDR block.
Understanding how to size your VPC is crucial
at this point. If you are not sure how to
configure this, make sure to follow our VPC
sizing guide.
8. • Each load balancer can be associated with one
or more SSL endpoints. Such endpoints are
identified by their certificate names.
• Certificates are an important component of
your dedicated load balancer. When creating a
load balancer, at least one SSL endpoint needs
to be configured, meaning that each load
balancer needs to have at least one certificate
associated to it.
9. • All inbound traffic is blocked by default. Firewall rules are required
to allow traffic to your worker.
The UI suggests you a list of most used firewall rules. For this
example, add a firewall rule with type 'http.private.port'
from Anywhere.
Note that the port range is automatically set to 8091.
• This means that only connections through the port 8091 are
whitelisted inside the VPC and that your worker will listen to all
interfaces coming through port 8091.
Setting this firewall rule allows a dedicated load balancer to
communicate to your workers using its default configurations.
• Additionally, to properly receive requests from the load balancer, all
applications that are deployed to the VPC must be listening on port
8091.
10.
11. Create a Load Balancer
• A load balancer can be created using the load-
balancer create command.
• cloudhub load-balancer create vpc-tutorial
lb-tutorial
/Users/myuser/Documents/cert.pem
/Users/myuser/Documents/key.pem --http on
--verificationMode on
12. • Pass vpc-tutorial as the vpc name in which you
want to create the load balancer.
• In order to keep consistency among tutorials, we
are using components created in the VPC tutorial.
• Name the load balancer lb-tutorial.
• The load balancer’s name must be unique.
• Each load balancer has an internal domain name:
internal-<lb-name>.lb.anypointdns.net where
<lb-name> is the name you set here.
13. • Pass the path to a .pem file certificate and its key
We are using the self-signed certificate created earlier, along with
its private key: cert.pemand key.pem.
The certificate that you upload to the Load Balancer must be
contained in one pem encoded and unencrypted file.
Your private key file needs to be passphraseless.
• Set the option for the http method to on.
This sets the load balancer to accept all http requests and forwards
it to your default SSL endpoint. In this case, the only ssl endpoint
configured is lb-tutorial-cert
• Set the option for the verificationMode to on
This instructs the SSL endpoint to always verify the certificate
• When the operation succeeds, the CLI displays the details of the
newly created load balancer.
14. • > cloudhub load-balancer mappings add lb-
tutorial 0 /{app}/ {app} /
• Set lb-tutorial as the target for this new mapping rule
• Set the index priority for this mapping rule to 0
This rule now has the first priority.
• Set the input URL as /{app}/
This rule uses patterns so that every value passed as {app} in the
load balancer’s domain name: lb-
tutorial.lb.anypointdns.net/{app} gets mapped to the URL set as the
output URL.
• Set the output URL to {app}
So that the domain lb-tutorial.lb.anypointdns.net/{app} gets
mapped to {app}.cloudub.io/ using the pattern {app} to match your
application’s name.
• Set the appURI to / to redirect to the initial path of your application.
15. Update an Existing Load Balancer
• It is possible to edit the Whitelists, Mapping
Rules and SSL Endpoints from the Anypoint
Platform CLI.
• Remove the existing configuration using load-
balancer whitelist remove, load-balancer
mappings remove and load-balancer ssl-
endpoint remove respectively and add the
new configurations.
16. Update an Existing Load Balancer Using the CloudHub API
• Although it is not possible to update certain load
balancer values through the Anypoint Platform CLI, you
can use the Cloudhub API to programmatically manage
and update your load balancer:
• Log in to the CloudHub services passing your
credentials to
https://anypoint.mulesoft.com/accounts/login.
• Use the
organizations/{orgId}/vpcs/{vpcId}/loadbalancers/{lbId}
endpoint to update your load balancer.