Skip to main content

[Short Blog] Testing RDBMS store with WSO2 APIM SI analytic triggers

 This blog post contain steps and instructions on testing RDBMS store with SI analytics. The common problem while testing SI is complexity of calling stream without tooling UI. Here, we used siddhi triggers on the siddhi script it self to trigger RDBMS event process.

  1. Download SI product pack from WSO2 Github https://github.com/wso2/streaming-integrator/releases
  2. Download mysql-connector-java-8.0.18 MySQL DB driver and copy it into the `<SI_HOME>/lib`
  3. Create database named production in MySQL
  4. Create table SweetProductionTablewith following SQL:

5. Insert data into the table with following SQL:

3. Create a file Store-rdbms.siddhi and add the following content into the `<SI_HOME>/wso2/server/deployment/siddhi-files/Store-rdbms.siddhi` file.

4. Start the SI server with sh <SI_HOME>/bin/server.sh command. Replace <SI_HOME> with SI home location.

5. Check the logs getting printed on the SI console.

Comments

Popular posts from this blog

Gentle Introduction to the Envoy Proxy and Load-balancing

For a devops engineer, load balancing is a popular word. You need to figure out a way to scale the system so that it can manage it correctly when enormous traffic enters your system. One alternative is to boost the running single node’s efficiency. Adding more nodes and distributing the job among these nodes is another option. Having many nodes has another high availability added benefit. Envoy proxy is a proxy service that in the growing trend has been used as a service mesh. In this blog post, we’ll see the load balancing aspect of the Envoy Proxy. Load Balancers Load balancers is an endpoint that listens to the request that comes into the computation cluster. When application enters the Load Balancer, it checks for accessible worker nodes and distributes requests among worker nodes. Load balancer has the following characteristics. Service Discovery: Check available worker nodes Health check: Regularly inspect worker nodes health. Load balancing: Distribute the reque

Database Internel Architecture: SQLite

Introduction A database is an essential part of building a software system which used to store and read data efficiently. Here, We are going to discuss some architectural details of database implementation by using an early version of SQLite. SQLite is a small database application which used in millions of software and devices. SQLite invented by D.Richard Hipp in August 2000. SQLite is a high performance, lightweight relational database. If you are willing to learn internal of a database in coding level, then SQLite is the best open source database available out there with highly readable source code with lots of documentation. Reading later versions of SQLite become a little harder since it contains lots of new features. In order to understand the basic implementation of database internals, You should have good knowledge about data structures, some knowledge about Theory of Computing and how an operating system works. Here we are looking into the SQLite 2.5.0 version. Here

Weird Programming Languages

There are thousands of programming languages are invented and only about hundred of programming languages are commonly used to build software. Among this thousands of programming languages, there are some weird type of programming languages can be also found. These programming languages are seems to be called weird, since their programming syntax and the way it represent its code. In this blog we will look into some of these language syntax. Legit Have you ever wonder, when you come to a Github project that print hello world program, but you cannot see any codes or any content. Check this link  https://github.com/blinry/legit-hello  and you will see nothing in this repository. But trust me, there is hidden code in this project. If you see the  commit  section, you can reveal the magic. Yeah, you are right. Its storing hello world code in inside the git commit history. If you clone this project and run the following command, then you can see the hidden code in this project. g