SlideShare a Scribd company logo
[02nd May 2020]: [Securing Data Transmission and Logging
Mechanism using Splunk & Mule 4 Dockerization]
[Mumbai - India]
All contents © MuleSoft Inc. 2
• 1.Please keep yourself muted unless you have any question.
• 2.We encourage keeping your video for making our meetup
interactive.
• 3.You'll can also write down your questions in chat section.
• 4.Once you join write down your name in chat section so we will
have an attendance.
• 5.As this is our first online Meetup we appreciate your valuable
feedback. Thanks.
Guidelines for Mumbai MuleSoft Meetup #10 [Online]
All contents © MuleSoft Inc. 3
• Training and certification update:
• MuleSoft training is hosting FREE instructor lectures through the end
of May to accompany our free self-paced Development Fundamentals
course.
• Also, any certification set to expire on or after Feb 1, 2020 is now
valid through July 31, 2020.
• Please participate!
>> Share this link
>> Training slides
• MuleSoft Global Connect is Virtual! Register for free to be a part.
https://connect.mulesoft.com/
Important Announcement
All contents © MuleSoft Inc.
Agenda
4
 Introductions
 Secure Data Transmission
 Logging Mechanism Using SPLUNK
 Dockers
 Containers
 Demo and Configurations to create Mule 4 image
 Networking time
All contents © MuleSoft Inc.
Introductions
5
• About the organizers:
– Sudeshna Mitra
– Manish Yadav
– Akshata Sawant
• About the sponsors: MuleSoft
A SHOW OF HANDS:
Who is new to this MeetUp?
All contents © MuleSoft Inc.
Speaker
6
[Secure data transmission]
All contents © MuleSoft Inc.
Why Security of data is Important ?
8
All contents © MuleSoft Inc.
Session will cover
9
• What is Encryption/Decryption Process?
• What are its benefits?
• How can we achieve encryption /decryption of data using Mulesoft?
• What are the different methods to achieve it?
• Tools used – Mulesoft, GPA, Kleopatra
• Demos
• Question and answers
All contents © MuleSoft Inc. 10
All contents © MuleSoft Inc. 11
• Sensitive information can be protected; others cannot view it and cannot be stolen over the
internet.
• Information can be shared securely within a group of users or company departments.
• Files are compressed to a smaller size before being sent over the network.
• There is no need to purchase private key or certificates.
• Secure mail and text cannot be infiltrated by hackers or infected and misused through email
attacks.
• Future-proof technology and complete compatibility with other applications.
• In-built key manager to securely manage yours and others' keys.
• Provides absolute assurance that data receives or sent has not been modified in transit.
• Provides protection against viruses and the newest blended email threat.
Advantages of Security
All contents © MuleSoft Inc. 12
MuleSoft provides various encryption strategies to
encrypt your messages.
Encryption strategy Description
JCE encrypter
Encrypts stream, byte[], or
string.
XML encrypter
Encrypts string; encrypts
individual fields using xpath
expressions.
PGP encrypter
Encrypts stream, byte[], or
string; applies tighter
security (relative to JCE and
XML); increases processing
load (relative to JCE and
XML).
All contents © MuleSoft Inc. 13
Using password and keys
All contents © MuleSoft Inc. 14
Mule 3 Vs. Mule 4 for plugin installation
All contents © MuleSoft Inc. 15
Mule 3 Vs. Mule 4 for operations
All contents © MuleSoft Inc. 16
Mule 3 ----- Encryption Process
To download module for mule 4
All contents © MuleSoft Inc. 17
Mule 4 - JCE encrypter
• The JCE strategy enables you to use the wider range of cryptography capabilities
provided by the Java Cryptography Extension.
• You can use cryptography capabilities in two ways:
• Password-based encryption (PBE)
• Key-based encryption:
• You can encrypt all, or part of a message using any of these two methods.
All contents © MuleSoft Inc. 18
Mule 4 - XML encrypter
• The XML strategy enables you to use the wider range of cryptography
capabilities
• Key-based encryption
• Encrypts string; encrypts individual fields using xpath expressions.
All contents © MuleSoft Inc. 19
Mule 4 - PGP encrypter
• Mule can encrypt all or part of a message using Pretty Good Privacy
(PGP). PGP combines data compression and data encryption to secure
messages. The compression reduces the size of the payload to help
reduce the transmission time later on your application.
• This section addresses these scenarios:
• Encryption: Using another party’s public key to encrypt an outgoing
message in a Mule app.
• Decryption: Using your own private key to decrypt an incoming
message in a Mule app.
All contents © MuleSoft Inc. 20
Mule 4 - PGP encrypter
Encrypted
message 
[Logging Mechanism Using
SPLUNK]
All contents © MuleSoft Inc.
Why logging is Important ?
22
?
All contents © MuleSoft Inc.
Logger component in Mulesoft
23
Levels:
1. DEBUG
2. ERROR
3. INFO
4. TRACE
5. WARN
All contents © MuleSoft Inc. 24
• Splunk is a software platform to search, analyze and visualize the
machine-generated data gathered from the websites, applications,
sensors, devices etc. which make up your IT infrastructure and
business. Splunk performs capturing, indexing, and correlating the
real-time data in a searchable container from which it can produce
graphs, reports, alerts, dashboards, and visualizations.
• Benefits :
– Splunk Automatically collects the data in Real-time from Multiple systems.
– Splunk can accept any data like csv, json, log formats, xml etc.
– Splunk can give Alerts/Everts Notifications.
– Using Splunk data and analytics, Dashboards can be created.
– And Many more…
What is SPLUNK ?
All contents © MuleSoft Inc. 25
Features of SPLUNK:
All contents © MuleSoft Inc. 26
How SPLUNK Look Like ?
All contents © MuleSoft Inc. 27
• With the help of default + custom fields given Below:
– Index – Its kind of Directory
– host (default)
– source (default)
– sourceType (default)
– flowName
– Severity
– message
– messageType
– messageSize
– event
– KPI
– Correlation id
– Marker
How SPLUNK can be effective in terms of Logging?
All contents © MuleSoft Inc. 28
• An index is a collection of directories and files .
• By default, All events will be stored under “main” index. The default
Splunk Enterprise index. All processed external data is stored here
unless otherwise specified
• Create the new index by navigating to settings->indexes->create
New
– Enter your index name
– The index data type. For event data, click Events. This is the default data type.
– Set the size for your index , default is 500 GB.
Splunk Query : index=“dev_mulesoft”
Index
All contents © MuleSoft Inc. 29
Why there is a need to have multiple indexes ?
• To control user access.
• To speed searches in certain situations.
All contents © MuleSoft Inc. 30
• A default field that contains the host name that generate an event.
• the host field is used in searches to narrow the search results to
events that originate from a specific device.
• Each event has a host name.
• For example ,it can be “Mulesoft” , “Java” etc.
• If no other host rules are specified for a source, Splunk software
assigns the host field a default value that applies to all data coming
into the instance from any input.
• Splunk Query : index=“dev_mulesoft” host=mulesoft
Host:
All contents © MuleSoft Inc. 31
• The source of an event is the name of the file, stream, or other
input from which the event originates.
• For example : “application name” , “Configuration.xml name” etc.
• The source type of an event is the format of the data input from
which it originates like for windows .evt files from event viewer
• For example : “Any point studio” , “application name” etc.
• Splunk Query : index=“dev_mulesoft” source=customer-exp-api
Source and sourceType:
All contents © MuleSoft Inc. 32
• flowName is a custom field that can be created in order to track the
flow level events logged in SPLUNK.
• Severity field can be created in order to track the success and
failure events logged in SPLUNK.
• Which can accept the only below values from API:
– Success/INFO
– Failure/ERROR
– Splunk Query : index=“dev_mulesoft” flowname=customer-exp-api-post
– Splunk Query : index=“dev_mulesoft” severity=Success
flowName and severity:
All contents © MuleSoft Inc. 33
• message is the field which holds the actual Payload or data in each
event.
• messageType field can be created to hold the datatype of particular
message in each event.
• For example : “order”, “customer”, “employee” etc.
• messageSize field can be created to describe the size of particular
message in the event.
message, messageType and messageSize
All contents © MuleSoft Inc. 34
• A Correlation ID, also known as a Transit ID, is a
unique identifier value that is attached to requests and messages
that allow reference to a particular transaction or event chain.
• By using this field, we can get the result of each transaction in one
go.
• For example : Experience , Process and System layer logs.
• Splunk Query : index="test_mulesoft" 4cd2dc81-3daf-11ea-bf82-
0a7661ac9eeb
Correlation id
All contents © MuleSoft Inc. 35
• We can create event field to track the end to end transaction of
Mulesoft API.
• which can accept the values given below:
– Received and sent
– Source and target
• It can also be used to analyze the transactions in case of any errors.
• Splunk Query : index=“dev_mulesoft” event=received
Event:
All contents © MuleSoft Inc. 36
• In Marker property you can set information of the particular event.
• This field can be act as optional though.
• For example :
– Order information received from SAP
– Data successfully sent to Salesforce.
Marker
All contents © MuleSoft Inc. 37
• A Key Performance Indicator (KPI) is a measurable value that
demonstrates how effectively a company is achieving
key business objectives. Organizations use KPIs to evaluate their
success at reaching targets.
• Its an mandatory criteria to implement the Dashboards which are
known as KPI dashboards.
• KPI Dashboards are the perfect tool for your performance tracking
reports as they can be used to visually depict the performance of an
enterprise, a specific department, or a key business operation.
KPI (Key Performance Indicators)
All contents © MuleSoft Inc. 38
For Example :
All contents © MuleSoft Inc. 39
• {
“message” : “{…}”, <- for eg: customer data JSON
“host” : “Mulesoft”,
“source” : “sales-exp-api”,
“sourceType” : “Anypoint studio”,
“flowName” : “customer-order-post-flow”,
“severity” : “INFO”,
“messageType : “Customer”,
“messageSize” : “500KB”,
“event” : “Received”,
“correlationId : “8d82dce0-87dc-11ea-96a3-12c261b2ccf9”,
“KPI” : {
key: quantity,
value: 5
},
“marker” : “Customer data received from SAP”
}
SPLUNK event will look like?
All contents © MuleSoft Inc. 40
• Makes life easy for developers especially when there is a need to
troubleshoot the application, detect issues, review the performance
of the application, etc.
• Easy to utilize other features of SPLUNK like Alerts , Reports,
Dashboards and Visualization etc which takes your business to the
next level.
Benefits of Smart logging in SPLUNK:
[Docker and Containers]
All contents © MuleSoft Inc.
What is Docker?
42
• Developing apps today requires so much more than writing code.
Multiple languages, frameworks, architectures, and discontinuous
interfaces between tools for each lifecycle stage creates enormous
complexity. Docker simplifies and accelerates your workflow, while
giving developers the freedom to innovate with their choice of tools,
application stacks, and deployment environments for each project.
• In 2013, Docker introduced what would become the industry
standard for containers. Containers are a standardized unit of
software that allows developers to isolate their app from its
environment, solving the “it works on my machine” headache. For
millions of developers today, Docker is the de facto standard to build
and share containerized apps - from desktop, to the cloud.
All contents © MuleSoft Inc.
Container: A standardized unit of software
Containers?
43
• A container is a standard unit of software that packages up code and all its
dependencies so the application runs quickly and reliably from one computing
environment to another. A Docker container image is a lightweight, standalone,
executable package of software that includes everything needed to run an
application: code, runtime, system tools, system libraries and settings.
• Container images become containers at runtime and in the case of Docker
containers - images become containers when they run on Docker Engine. Available
for both Linux and Windows-based applications, containerized software will always
run the same, regardless of the infrastructure. Containers isolate software from its
environment and ensure that it works uniformly despite differences for instance
between development and staging.
All contents © MuleSoft Inc.
Docker-Container: What's in it for us?
What is good about all this?
44
• Standard: Docker created the industry standard for containers, so they could be
portable anywhere
• Lightweight: Containers share the machine’s OS system kernel and therefore do
not require an OS per application, driving higher server efficiencies and reducing
server and licensing costs
• Secure: Applications are safer in containers and Docker provides the strongest
default isolation capabilities in the industry
All contents © MuleSoft Inc.
Container Vs VM
Hey but we have VM’s then why Container?
45
Containers VM
An abstraction at the app layer that
packages code and dependencies
together. Multiple containers can run on
the same machine and share the OS
kernel with other containers, each
running as isolated processes in user
space. Containers take up less space than
VMs (container images are typically tens
of MBs in size), can handle more
applications and require fewer VMs and
Operating systems.
(VMs) are an abstraction of physical
hardware turning one server into many
servers. The hypervisor allows multiple
VMs to run on a single machine. Each VM
includes a full copy of an OS, the app,
necessary binaries and libraries - taking
up tens of GBs. VMs can also be slow to
boot.
[Demo and Configurations to
create Mule 4 image]
All contents © MuleSoft Inc.
Prerequisites
Demo Time !!!
47
• Windows Docker Desktop is installed on your machine.
https://hub.docker.com/search?q=&type=edition&offering=community&sort=updat
ed_at&order=desc
• Make sure you have switched to Linux based containers. Click on Docker Desktop
icon and click on “Switch to Linux Containers”.
• Anypoint Studio (7.4.2) is installed and you have a valid license (or trial) version of
Mule Runtime “mule-ee-distribution-standalone-4.2.2.zip” placed in your system.
• A Sample Hello-World Application created in Mule 4 and create a deployable archive
out of it using Studio Export capability. We will not go in detail about this as this
tutorial assumes that audience already has a brief knowledge of Mule based
application development.
All contents © MuleSoft Inc.
Local settings:
Configurations to create Mule 4 image
48
• 1. Create a folder on your desktop to place the required items for this PoC. For example:
• C:UsersankurDesktopDocker Demo
• Place following items in this folder:
• a) mule-ee-distribution-standalone-4.2.2.zip
• b) mule-hello.jar
• c) muleLicenseKey.lic (this is provided by your respective MuleSoft Customer Success Manager)
• d) DockerFile
• 2. Now check if the Docker Desktop is up and running.
• 3. Populate DockerFile:
• Github Link : https://github.com/ancur4u/DockerDemo
All contents © MuleSoft Inc. 49
Encryption strategies -
https://docs.mulesoft.com/mule-runtime/4.2/cryptography
Kleopatra tool -
https://www.openpgp.org/software/kleopatra/
GPA tool -
https://www.gnupg.org/related_software/gpa/index.html
pgp-encryption and decryption -
https://dzone.com/articles/pgp-encryption-and-decryption-with-mule-esb
Splunk documentation -
https://docs.splunk.com/Documentation
Reference links
All contents © MuleSoft Inc.
Take a stand !
50
• Nominate yourself for
the next meetup speaker
and suggest a topic as
well.
All contents © MuleSoft Inc.
What’s next
51
• Share:
– Tweet your pictures with the hashtag #MuleMeetup #MuleSoftMeetup
– Invite your network to join: https://meetups.mulesoft.com/mumbai/
• Feedback:
– Contact your organizers Manish Yadav, Sudeshna Mitra and Akshata Sawant to suggest topics
– Tweet your organizers at @SudeshnaMitra14, @Manish_Kyadav, @sawantakshata02
– Contact MuleSoft at meetup@mulesoft.com for ways to improve the program
– Follow us on Instagram (mumbai_mulesoftofficialpage)
– Your Feedback is Food for us
• Our next meetup:
– Date: TBD
– Location: Mumbai
– Topic: TBD
Networking time
Introduce yourself to your neighbors!
See you next time
Please send topic suggestions to the organizer
THANK YOU
Meet up slides_mumbai_05022020_final

More Related Content

PPTX
MuleSoft Meetup Mumbai Mule 4 Presentation Slide
PPTX
Clustering, Server setup and Hybrid deployment setup using Anypoint Runtime M...
PPTX
Mumbai MuleSoft Meetup 12
PPTX
Mulesoft meetup slides mumbai_20113019_exception_handling
PPTX
Mumbai MuleSoft Meetup 11
PPTX
Meet up slides_mumbai_21032020_final
PPTX
MuleSoft Clustring, Okta, CI/CD Integration with Jenkins
PDF
Ahmedabad MuleSoft Meetup #4
MuleSoft Meetup Mumbai Mule 4 Presentation Slide
Clustering, Server setup and Hybrid deployment setup using Anypoint Runtime M...
Mumbai MuleSoft Meetup 12
Mulesoft meetup slides mumbai_20113019_exception_handling
Mumbai MuleSoft Meetup 11
Meet up slides_mumbai_21032020_final
MuleSoft Clustring, Okta, CI/CD Integration with Jenkins
Ahmedabad MuleSoft Meetup #4

What's hot (20)

PPTX
Mumbai MuleSoft Meetup:Batch Processing, Anypoint Messaging Queue and Custom ...
PDF
MuleSoft meetup_sg_no2_may19
PDF
MuleSoft Online Meetup - MuleSoft integration with snowflake and kafka
PPTX
mulesoft meetup @ bangalore
PPTX
MuleSoft Meetup Warsaw Group #1
PDF
MuleSoft Manchester Meetup #2 slides 29th October 2019
PDF
Mule 4 migration + Common Integration Challenges : MuleSoft Virtual Muleys Me...
PPTX
MuleSoft Meetup Virtual_ 2_Charlotte
PPTX
Mule soft meetup_virtual_ 3_charlotte_07july_2021__final
PDF
MuleSoft Meetup Singapore June 2021
PDF
Custom policies in mule 4 and a circuit breaker example
PDF
20210916 mule soft_meetup_nz_online_uploadedversion
PPTX
Mulesoft KL Meetup 2
PPTX
Warsaw mulesoft meetup #9 mastering integration with salesforce
PPTX
Meetup bangalore-sept5th 2020 (1)
PPTX
Warsaw MuleSoft Meetup #7 - custom policy
PPTX
Mulesoft with ELK (Elastic Search, Log stash, Kibana)
PPTX
Warsaw MuleSoft Meetup #6 - CI/CD
PPTX
MuleSoft Meetup Charlotte 2019
PDF
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
Mumbai MuleSoft Meetup:Batch Processing, Anypoint Messaging Queue and Custom ...
MuleSoft meetup_sg_no2_may19
MuleSoft Online Meetup - MuleSoft integration with snowflake and kafka
mulesoft meetup @ bangalore
MuleSoft Meetup Warsaw Group #1
MuleSoft Manchester Meetup #2 slides 29th October 2019
Mule 4 migration + Common Integration Challenges : MuleSoft Virtual Muleys Me...
MuleSoft Meetup Virtual_ 2_Charlotte
Mule soft meetup_virtual_ 3_charlotte_07july_2021__final
MuleSoft Meetup Singapore June 2021
Custom policies in mule 4 and a circuit breaker example
20210916 mule soft_meetup_nz_online_uploadedversion
Mulesoft KL Meetup 2
Warsaw mulesoft meetup #9 mastering integration with salesforce
Meetup bangalore-sept5th 2020 (1)
Warsaw MuleSoft Meetup #7 - custom policy
Mulesoft with ELK (Elastic Search, Log stash, Kibana)
Warsaw MuleSoft Meetup #6 - CI/CD
MuleSoft Meetup Charlotte 2019
WHISHWORKS-MuleSoft Hyderabad Meetup -Oct 2018
Ad

Similar to Meet up slides_mumbai_05022020_final (20)

PPTX
Mulesoft meetup 9thmay Thiruvananthapuram
PPTX
Mule soft Meetup #3
PPTX
MuleSoft Meetup Charlotte 2 - 2019
PPTX
Cmm vm 002
PPTX
Baltimore jan2019 mule4
PPTX
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
PDF
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
PPTX
Rtf externalize tls MuleSoft meetup
PDF
Sydney mule soft meetup 30 april 2020
PDF
Information Security Whitepaper
PPTX
Second Caracas MuleSoft Meetup Slides
PDF
C days2015
PPTX
Cracow MuleSoft Meetup #1
PDF
soctool.pdf
PDF
Securing the Internet of Things - Hank Chavers
PDF
MuleSoft Meetup Singapore - Reliable Messaging & RTF Operations
PDF
SOC-BlueTEam.pdf
PDF
100 Security Operation Center Tools.pdf
PPTX
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
PDF
Mailjet Security Presentation 2017
Mulesoft meetup 9thmay Thiruvananthapuram
Mule soft Meetup #3
MuleSoft Meetup Charlotte 2 - 2019
Cmm vm 002
Baltimore jan2019 mule4
Ahmadabad mule soft_meetup_17april2021_mule4_cryptography
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Rtf externalize tls MuleSoft meetup
Sydney mule soft meetup 30 april 2020
Information Security Whitepaper
Second Caracas MuleSoft Meetup Slides
C days2015
Cracow MuleSoft Meetup #1
soctool.pdf
Securing the Internet of Things - Hank Chavers
MuleSoft Meetup Singapore - Reliable Messaging & RTF Operations
SOC-BlueTEam.pdf
100 Security Operation Center Tools.pdf
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!
Mailjet Security Presentation 2017
Ad

More from Akshata Sawant (18)

PPTX
Robust Data Cloud Protection with MuleSoft-2.pptx
PPTX
Anypoint Tools and MuleSoft Automation (DRAFT).pptx
PPTX
London MuleSoft Meetup
PPTX
Zero Trust Security - Updated
PPTX
Mumbai MuleSoft Meetup #22.pptx
PPTX
Mumbai MuleSoft Meetup #21
PPTX
Manchester MuleSoft Meetup #8 - 28 Sept.pptx
PPTX
London MuleSoft Meetup 15 Sept
PPTX
Manchester MuleSoft Meetup #7
PPTX
Zero Trust Security in practice.pptx
PPTX
Mumbai MuleSoft Meetup #20
PPTX
Power of Einstein Analytics - Salesforce + Mulesoft
PPTX
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
PPTX
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
PPTX
Mumbai MuleSoft Meetup #18
PPTX
Mumbai MuleSoft Meetup #17 - GraphQL
PPTX
Mumbai MuleSoft Meetup #15
PPTX
Mumbai MuleSoft Meetup 13
Robust Data Cloud Protection with MuleSoft-2.pptx
Anypoint Tools and MuleSoft Automation (DRAFT).pptx
London MuleSoft Meetup
Zero Trust Security - Updated
Mumbai MuleSoft Meetup #22.pptx
Mumbai MuleSoft Meetup #21
Manchester MuleSoft Meetup #8 - 28 Sept.pptx
London MuleSoft Meetup 15 Sept
Manchester MuleSoft Meetup #7
Zero Trust Security in practice.pptx
Mumbai MuleSoft Meetup #20
Power of Einstein Analytics - Salesforce + Mulesoft
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
Manchester MuleSoft Meetup #6 - Runtime Fabric with Mulesoft
Mumbai MuleSoft Meetup #18
Mumbai MuleSoft Meetup #17 - GraphQL
Mumbai MuleSoft Meetup #15
Mumbai MuleSoft Meetup 13

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
A Presentation on Artificial Intelligence
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
Cloud computing and distributed systems.
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
A Presentation on Artificial Intelligence
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Meet up slides_mumbai_05022020_final

  • 1. [02nd May 2020]: [Securing Data Transmission and Logging Mechanism using Splunk & Mule 4 Dockerization] [Mumbai - India]
  • 2. All contents © MuleSoft Inc. 2 • 1.Please keep yourself muted unless you have any question. • 2.We encourage keeping your video for making our meetup interactive. • 3.You'll can also write down your questions in chat section. • 4.Once you join write down your name in chat section so we will have an attendance. • 5.As this is our first online Meetup we appreciate your valuable feedback. Thanks. Guidelines for Mumbai MuleSoft Meetup #10 [Online]
  • 3. All contents © MuleSoft Inc. 3 • Training and certification update: • MuleSoft training is hosting FREE instructor lectures through the end of May to accompany our free self-paced Development Fundamentals course. • Also, any certification set to expire on or after Feb 1, 2020 is now valid through July 31, 2020. • Please participate! >> Share this link >> Training slides • MuleSoft Global Connect is Virtual! Register for free to be a part. https://connect.mulesoft.com/ Important Announcement
  • 4. All contents © MuleSoft Inc. Agenda 4  Introductions  Secure Data Transmission  Logging Mechanism Using SPLUNK  Dockers  Containers  Demo and Configurations to create Mule 4 image  Networking time
  • 5. All contents © MuleSoft Inc. Introductions 5 • About the organizers: – Sudeshna Mitra – Manish Yadav – Akshata Sawant • About the sponsors: MuleSoft A SHOW OF HANDS: Who is new to this MeetUp?
  • 6. All contents © MuleSoft Inc. Speaker 6
  • 8. All contents © MuleSoft Inc. Why Security of data is Important ? 8
  • 9. All contents © MuleSoft Inc. Session will cover 9 • What is Encryption/Decryption Process? • What are its benefits? • How can we achieve encryption /decryption of data using Mulesoft? • What are the different methods to achieve it? • Tools used – Mulesoft, GPA, Kleopatra • Demos • Question and answers
  • 10. All contents © MuleSoft Inc. 10
  • 11. All contents © MuleSoft Inc. 11 • Sensitive information can be protected; others cannot view it and cannot be stolen over the internet. • Information can be shared securely within a group of users or company departments. • Files are compressed to a smaller size before being sent over the network. • There is no need to purchase private key or certificates. • Secure mail and text cannot be infiltrated by hackers or infected and misused through email attacks. • Future-proof technology and complete compatibility with other applications. • In-built key manager to securely manage yours and others' keys. • Provides absolute assurance that data receives or sent has not been modified in transit. • Provides protection against viruses and the newest blended email threat. Advantages of Security
  • 12. All contents © MuleSoft Inc. 12 MuleSoft provides various encryption strategies to encrypt your messages. Encryption strategy Description JCE encrypter Encrypts stream, byte[], or string. XML encrypter Encrypts string; encrypts individual fields using xpath expressions. PGP encrypter Encrypts stream, byte[], or string; applies tighter security (relative to JCE and XML); increases processing load (relative to JCE and XML).
  • 13. All contents © MuleSoft Inc. 13 Using password and keys
  • 14. All contents © MuleSoft Inc. 14 Mule 3 Vs. Mule 4 for plugin installation
  • 15. All contents © MuleSoft Inc. 15 Mule 3 Vs. Mule 4 for operations
  • 16. All contents © MuleSoft Inc. 16 Mule 3 ----- Encryption Process To download module for mule 4
  • 17. All contents © MuleSoft Inc. 17 Mule 4 - JCE encrypter • The JCE strategy enables you to use the wider range of cryptography capabilities provided by the Java Cryptography Extension. • You can use cryptography capabilities in two ways: • Password-based encryption (PBE) • Key-based encryption: • You can encrypt all, or part of a message using any of these two methods.
  • 18. All contents © MuleSoft Inc. 18 Mule 4 - XML encrypter • The XML strategy enables you to use the wider range of cryptography capabilities • Key-based encryption • Encrypts string; encrypts individual fields using xpath expressions.
  • 19. All contents © MuleSoft Inc. 19 Mule 4 - PGP encrypter • Mule can encrypt all or part of a message using Pretty Good Privacy (PGP). PGP combines data compression and data encryption to secure messages. The compression reduces the size of the payload to help reduce the transmission time later on your application. • This section addresses these scenarios: • Encryption: Using another party’s public key to encrypt an outgoing message in a Mule app. • Decryption: Using your own private key to decrypt an incoming message in a Mule app.
  • 20. All contents © MuleSoft Inc. 20 Mule 4 - PGP encrypter Encrypted message 
  • 22. All contents © MuleSoft Inc. Why logging is Important ? 22 ?
  • 23. All contents © MuleSoft Inc. Logger component in Mulesoft 23 Levels: 1. DEBUG 2. ERROR 3. INFO 4. TRACE 5. WARN
  • 24. All contents © MuleSoft Inc. 24 • Splunk is a software platform to search, analyze and visualize the machine-generated data gathered from the websites, applications, sensors, devices etc. which make up your IT infrastructure and business. Splunk performs capturing, indexing, and correlating the real-time data in a searchable container from which it can produce graphs, reports, alerts, dashboards, and visualizations. • Benefits : – Splunk Automatically collects the data in Real-time from Multiple systems. – Splunk can accept any data like csv, json, log formats, xml etc. – Splunk can give Alerts/Everts Notifications. – Using Splunk data and analytics, Dashboards can be created. – And Many more… What is SPLUNK ?
  • 25. All contents © MuleSoft Inc. 25 Features of SPLUNK:
  • 26. All contents © MuleSoft Inc. 26 How SPLUNK Look Like ?
  • 27. All contents © MuleSoft Inc. 27 • With the help of default + custom fields given Below: – Index – Its kind of Directory – host (default) – source (default) – sourceType (default) – flowName – Severity – message – messageType – messageSize – event – KPI – Correlation id – Marker How SPLUNK can be effective in terms of Logging?
  • 28. All contents © MuleSoft Inc. 28 • An index is a collection of directories and files . • By default, All events will be stored under “main” index. The default Splunk Enterprise index. All processed external data is stored here unless otherwise specified • Create the new index by navigating to settings->indexes->create New – Enter your index name – The index data type. For event data, click Events. This is the default data type. – Set the size for your index , default is 500 GB. Splunk Query : index=“dev_mulesoft” Index
  • 29. All contents © MuleSoft Inc. 29 Why there is a need to have multiple indexes ? • To control user access. • To speed searches in certain situations.
  • 30. All contents © MuleSoft Inc. 30 • A default field that contains the host name that generate an event. • the host field is used in searches to narrow the search results to events that originate from a specific device. • Each event has a host name. • For example ,it can be “Mulesoft” , “Java” etc. • If no other host rules are specified for a source, Splunk software assigns the host field a default value that applies to all data coming into the instance from any input. • Splunk Query : index=“dev_mulesoft” host=mulesoft Host:
  • 31. All contents © MuleSoft Inc. 31 • The source of an event is the name of the file, stream, or other input from which the event originates. • For example : “application name” , “Configuration.xml name” etc. • The source type of an event is the format of the data input from which it originates like for windows .evt files from event viewer • For example : “Any point studio” , “application name” etc. • Splunk Query : index=“dev_mulesoft” source=customer-exp-api Source and sourceType:
  • 32. All contents © MuleSoft Inc. 32 • flowName is a custom field that can be created in order to track the flow level events logged in SPLUNK. • Severity field can be created in order to track the success and failure events logged in SPLUNK. • Which can accept the only below values from API: – Success/INFO – Failure/ERROR – Splunk Query : index=“dev_mulesoft” flowname=customer-exp-api-post – Splunk Query : index=“dev_mulesoft” severity=Success flowName and severity:
  • 33. All contents © MuleSoft Inc. 33 • message is the field which holds the actual Payload or data in each event. • messageType field can be created to hold the datatype of particular message in each event. • For example : “order”, “customer”, “employee” etc. • messageSize field can be created to describe the size of particular message in the event. message, messageType and messageSize
  • 34. All contents © MuleSoft Inc. 34 • A Correlation ID, also known as a Transit ID, is a unique identifier value that is attached to requests and messages that allow reference to a particular transaction or event chain. • By using this field, we can get the result of each transaction in one go. • For example : Experience , Process and System layer logs. • Splunk Query : index="test_mulesoft" 4cd2dc81-3daf-11ea-bf82- 0a7661ac9eeb Correlation id
  • 35. All contents © MuleSoft Inc. 35 • We can create event field to track the end to end transaction of Mulesoft API. • which can accept the values given below: – Received and sent – Source and target • It can also be used to analyze the transactions in case of any errors. • Splunk Query : index=“dev_mulesoft” event=received Event:
  • 36. All contents © MuleSoft Inc. 36 • In Marker property you can set information of the particular event. • This field can be act as optional though. • For example : – Order information received from SAP – Data successfully sent to Salesforce. Marker
  • 37. All contents © MuleSoft Inc. 37 • A Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs to evaluate their success at reaching targets. • Its an mandatory criteria to implement the Dashboards which are known as KPI dashboards. • KPI Dashboards are the perfect tool for your performance tracking reports as they can be used to visually depict the performance of an enterprise, a specific department, or a key business operation. KPI (Key Performance Indicators)
  • 38. All contents © MuleSoft Inc. 38 For Example :
  • 39. All contents © MuleSoft Inc. 39 • { “message” : “{…}”, <- for eg: customer data JSON “host” : “Mulesoft”, “source” : “sales-exp-api”, “sourceType” : “Anypoint studio”, “flowName” : “customer-order-post-flow”, “severity” : “INFO”, “messageType : “Customer”, “messageSize” : “500KB”, “event” : “Received”, “correlationId : “8d82dce0-87dc-11ea-96a3-12c261b2ccf9”, “KPI” : { key: quantity, value: 5 }, “marker” : “Customer data received from SAP” } SPLUNK event will look like?
  • 40. All contents © MuleSoft Inc. 40 • Makes life easy for developers especially when there is a need to troubleshoot the application, detect issues, review the performance of the application, etc. • Easy to utilize other features of SPLUNK like Alerts , Reports, Dashboards and Visualization etc which takes your business to the next level. Benefits of Smart logging in SPLUNK:
  • 42. All contents © MuleSoft Inc. What is Docker? 42 • Developing apps today requires so much more than writing code. Multiple languages, frameworks, architectures, and discontinuous interfaces between tools for each lifecycle stage creates enormous complexity. Docker simplifies and accelerates your workflow, while giving developers the freedom to innovate with their choice of tools, application stacks, and deployment environments for each project. • In 2013, Docker introduced what would become the industry standard for containers. Containers are a standardized unit of software that allows developers to isolate their app from its environment, solving the “it works on my machine” headache. For millions of developers today, Docker is the de facto standard to build and share containerized apps - from desktop, to the cloud.
  • 43. All contents © MuleSoft Inc. Container: A standardized unit of software Containers? 43 • A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings. • Container images become containers at runtime and in the case of Docker containers - images become containers when they run on Docker Engine. Available for both Linux and Windows-based applications, containerized software will always run the same, regardless of the infrastructure. Containers isolate software from its environment and ensure that it works uniformly despite differences for instance between development and staging.
  • 44. All contents © MuleSoft Inc. Docker-Container: What's in it for us? What is good about all this? 44 • Standard: Docker created the industry standard for containers, so they could be portable anywhere • Lightweight: Containers share the machine’s OS system kernel and therefore do not require an OS per application, driving higher server efficiencies and reducing server and licensing costs • Secure: Applications are safer in containers and Docker provides the strongest default isolation capabilities in the industry
  • 45. All contents © MuleSoft Inc. Container Vs VM Hey but we have VM’s then why Container? 45 Containers VM An abstraction at the app layer that packages code and dependencies together. Multiple containers can run on the same machine and share the OS kernel with other containers, each running as isolated processes in user space. Containers take up less space than VMs (container images are typically tens of MBs in size), can handle more applications and require fewer VMs and Operating systems. (VMs) are an abstraction of physical hardware turning one server into many servers. The hypervisor allows multiple VMs to run on a single machine. Each VM includes a full copy of an OS, the app, necessary binaries and libraries - taking up tens of GBs. VMs can also be slow to boot.
  • 46. [Demo and Configurations to create Mule 4 image]
  • 47. All contents © MuleSoft Inc. Prerequisites Demo Time !!! 47 • Windows Docker Desktop is installed on your machine. https://hub.docker.com/search?q=&type=edition&offering=community&sort=updat ed_at&order=desc • Make sure you have switched to Linux based containers. Click on Docker Desktop icon and click on “Switch to Linux Containers”. • Anypoint Studio (7.4.2) is installed and you have a valid license (or trial) version of Mule Runtime “mule-ee-distribution-standalone-4.2.2.zip” placed in your system. • A Sample Hello-World Application created in Mule 4 and create a deployable archive out of it using Studio Export capability. We will not go in detail about this as this tutorial assumes that audience already has a brief knowledge of Mule based application development.
  • 48. All contents © MuleSoft Inc. Local settings: Configurations to create Mule 4 image 48 • 1. Create a folder on your desktop to place the required items for this PoC. For example: • C:UsersankurDesktopDocker Demo • Place following items in this folder: • a) mule-ee-distribution-standalone-4.2.2.zip • b) mule-hello.jar • c) muleLicenseKey.lic (this is provided by your respective MuleSoft Customer Success Manager) • d) DockerFile • 2. Now check if the Docker Desktop is up and running. • 3. Populate DockerFile: • Github Link : https://github.com/ancur4u/DockerDemo
  • 49. All contents © MuleSoft Inc. 49 Encryption strategies - https://docs.mulesoft.com/mule-runtime/4.2/cryptography Kleopatra tool - https://www.openpgp.org/software/kleopatra/ GPA tool - https://www.gnupg.org/related_software/gpa/index.html pgp-encryption and decryption - https://dzone.com/articles/pgp-encryption-and-decryption-with-mule-esb Splunk documentation - https://docs.splunk.com/Documentation Reference links
  • 50. All contents © MuleSoft Inc. Take a stand ! 50 • Nominate yourself for the next meetup speaker and suggest a topic as well.
  • 51. All contents © MuleSoft Inc. What’s next 51 • Share: – Tweet your pictures with the hashtag #MuleMeetup #MuleSoftMeetup – Invite your network to join: https://meetups.mulesoft.com/mumbai/ • Feedback: – Contact your organizers Manish Yadav, Sudeshna Mitra and Akshata Sawant to suggest topics – Tweet your organizers at @SudeshnaMitra14, @Manish_Kyadav, @sawantakshata02 – Contact MuleSoft at meetup@mulesoft.com for ways to improve the program – Follow us on Instagram (mumbai_mulesoftofficialpage) – Your Feedback is Food for us • Our next meetup: – Date: TBD – Location: Mumbai – Topic: TBD
  • 53. See you next time Please send topic suggestions to the organizer