Tag: keploy
-
Testing BunJs Web Application with Cucumber JS and Keploy
In our previous blog, we explored how to build a modern web server using BunJs and Prisma, integrating robust authentication mechanisms with JWT tokens. Now, it’s time to ensure our application is reliable and error-free through thorough testing. In this blog, we’ll dive into testing methodologies using Cucumber JS and Keploy, both are a powerful…
-
Understanding the levels of the Software Testing Pyramid
Introduction Before coming to what Software Testing Pyramid actually is, let’s just start with some basics! We all know what a "software" is, but then what is software testing or why is it even important? Let me answer your doubts- Software Testing is a process that involves evaluating software components to ensure they meet specified…
-
Decoding Network Traffic: Telemetry with Network Activity
Network Telemetry, in simple terms, is like having a conversation with machines or systems located far away. It’s about collecting data from these distant sources to better understand how they’re performing. Think of it as a health check-up, but for machines or systems instead of people. This technology plays a crucial role in a variety…
-
Using TC-BPF program to redirect DNS traffic in docker containers
The adoption of eBPF (Extended Berkeley Packet Filter) has revolutionized high-performance applications, tracing, security, and packet filtering within the Linux kernel. Specifically, TC-BPF, a type of eBPF program attached to the Traffic Control (TC) layer, has emerged as a powerful tool for packet manipulation in both ingress and egress. This blog delves into the practical…
-
Adding colour to the log output of logging libraries in Go
Logging is an integral part of software development, providing developers with valuable insights into the behaviour and performance of their applications. In the Go programming language, various logging libraries, such as the standard library’s log package or third-party options like logrus , zap and zerolog, facilitate the generation of log output. While the primary goal…
-
SCRAM Authentication: Overcoming Mock Testing Challenges
In the vast landscape of cybersecurity, authentication stands as the guardian of digital fortresses, ensuring that only the right individuals gain access to sensitive information and services. Imagine you’re at the entrance of a top-secret facility, and you need to prove your identity to the security personnel. In the digital realm, this is precisely what…
-
How I simulated a response from a Third Party app
Whether you’re building a web application, a mobile app, or any other software product, integrating with third-party APIs is almost inevitable. But what happens when you need to test your application’s behavior without relying on these external services? That’s where the magic of simulation comes in handy. In this blog, we’ll explore how you can…
-
Writing test cases for Cron Job Testing
Understanding Cron Jobs: A Quick Recap Cron is a time-based job scheduler in Unix-like operating systems. It allows you to schedule tasks (or jobs) to run at specified intervals. Now, let’s get down to business – testing these Cron jobs to make sure they’re doing what they’re supposed to do. How can you be certain…
-
Understanding Testing in production
Introduction Testing in production was previously ignored by Product Developers, But recently it gaining Popularity Again! Even, more organizations are planning use this. In this Article, We’ll explore What is Testing in Production,How & Why to use it,It’s Benefits , drawbacks and many more. So Without Delaying Further, Let’s START! What is Testing in Production?…
-
eBPF, Service Mesh and Sidecar
The operating system is like the boss of your computer, handling security, networking, and keeping an eye on what’s happening. But tweaking or improving the core part of the operating system, called the kernel, is a bit tricky because it’s mainly focused on keeping things stable and secure. Most cool new stuff usually happens outside…