Systems | Development | Analytics | API | Testing

Latest News

End-to-End API Monetization with Azure APIM, Stripe, and Moesif

Many API developers and companies struggle to find ways to set up systems to monetize their APIs easily. Some are simple but not customizable and some are complex and require massive engineering effort to actually get it all running. To make things easier, Moesif created the Billing Meters feature which gives massive customizability but with a minimal amount of code and engineering effort to monetize APIs.

Become a Financial Storyteller

Financial statements tell an important story, but they rarely tell the entire story. It often requires a sharp eye and a healthy measure of experience to elicit meaningful information from the numbers. Even people with keen financial acumen will have questions, and they can easily overlook important realities that lay buried somewhere within the details. For those with less experience reading financial reports, this task is far more difficult.

How to Use DataProvider in TestNG for Automated Testing (With Examples)

Learn the fundamentals of DataProvider and how it can be used in TestNG for automated testing. As the volume of applications increases, software testing teams find themselves overburdened with a “combinatorial explosion” of permutations for their test cases. In the early days, we hard-coded our test cases with the most important workflows, and we wrote bespoke automation scripts, each one to handle its own particular use case.

Why & How to Invest in Software Quality

Most people have encountered frustrating software errors. While the Windows "blue screen of death" was a necessary evil in the 1990s, customers have much more choice in today's software-as-a-service market. A single error or broken workflow is often enough for a would-be customer to switch over to a competitor. Of course, many software businesses mitigate these risks through testing and quality assurance.

Code signing issues in Xcode 14 and how to fix them

Since the release of Xcode 14, numerous code signing issues have emerged, plaguing builds across various CI/CD platforms. And even though code signing process was never easy, issues like these were relatively uncommon in previous versions of Xcode, such as Xcode 13 and Xcode 12, leaving many developers worried. If you are facing some unfamiliar code signing issues with Xcode 14, while everything seems to be fine with your keys and certificates, you aren’t alone.

Using Moesif's Live Event Log to Filter and Inspect API Calls and Events

As you may know, event logs are a common feature in operating systems and other software that keep track of system and application errors. When you have API traffic to follow or front-end actions you want to watch, using Moesif’s Live Event Log is a simple way to filter and find the data you need.

End To End Testing vs Regression Testing: A Comprehensive Comparison

End-to-end testing is a type of software testing that checks the system as a whole from start to finish. Regression testing is software testing that checks for errors after changes have been made to the code. Both are important for the software development process. However, they are two different types of tests that serve different purposes.

Transforming Kong Logs for Ingestion into Your Observability Stack

As a Solutions Engineer here at Kong, one question that frequently comes across my desk is “how can I transform a Kong logging plugin message into a format that my insert-observability-stack-here understands, i.e. ELK, Loki, Splunk, etc.?” In this blog, I’m going to show you how to easily accomplish converting a Kong logging payload to the Elastic Common Schema. In order to accomplish this task, we’re going to be running Kong Gateway in Kubernetes and using two Kong plugins.

Dynamic Routing Based on JWT Token's Claim with Kong Konnect

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI as it makes the implementation easier. But behind the scenes they might need to tailor specific configuration/applications for them, hence routing their request based on their identity.