Keploy

San Franciso, CA, USA
2021
  |  By Pranshu Srivastava
Tracing TLS (Transport Layer Security) traffic is crucial for modern observability systems. It helps monitor encrypted communication, diagnose issues, and optimize application performance. However, traditional methods like TLS proxying and packet capturing often come with significant performance overheads and security risks. They are not always the ideal solution, particularly for high-performance or security-sensitive environments.
  |  By Swapnoneel Saha
Chaos testing, also known as chaos engineering, is one of the most-used methodology to test the resilience and reliability of systems by intentionally introducing controlled failures. Simply put, the goal is to identify weaknesses and improve a system’s ability to handle unexpected scenarios. Originating from Netflix’s famous Chaos Monkey tool, chaos testing has become a key practice in building robust distributed systems.
  |  By Ritesh Mishra
Software Testing is the most important step in the software development process. This process helps in validating and verifying that a software application is Bug-free, and the software is improved in terms of efficiency, accuracy and usability. Black Box Testing and White Box Testing are two most useful testing techniques for Software Testing. In this blog, we will be covering more about their definitions, advantages, disadvantages, their types, limitations and tools used for testing.
  |  By Animesh Pathak
Let’s talk about stubbing and verifying – two critical tools that transformed how I approach testing. Early in my career, testing was often frustrating, slow, and full of surprises, most of them bad. I used to think testing meant running my app against real systems and crossing my fingers that everything worked. Spoiler: it rarely did. Here’s the thing: testing doesn’t have to be painful.
  |  By Animesh Pathak, Pranshu Srivastava
Network security professionals and observability applications have been trying to trace data in secure TLS connections since a very long time now. TLS( Transport Layer Security) is an encryption protocol that is used by servers are clients for encrypting the data that they share over a connection. Specifically, it uses symmetric encryption which creates a single shared key that both the server and the client use for encrypting and decrypting the data.
  |  By Himanshu Mandhyan
The "Cannot use import statement outside a module" error can be quite confusing, especially for those working with JavaScript or Node.js. This error is generally raised in a context that doesn’t recognize ES6 modules when the import statement is referred to. Therefore, discover the cause and solve it.
  |  By Pranshu Srivastava
TCP connections, they are everywhere, almost every online interaction you make, whether it’s streaming your favourite video, sending an important email, or just casually browsing through different websites. They are like the foundational building blocks of the internet and so it’s important for them to be consistent and reliable. As you can see TCP servers get and handle billions of requests in a day, so it’s important for them to be able to do this efficiently.
  |  By Debajyati Dey
Selenium has long been the standard for web automation testing, but modern web development demands more flexible, efficient, and developer-friendly solutions. We are Node.js developers and we all know what a Node.js developer wants.
  |  By Tvisha Raji
Imagine you’re testing a specific feature in an app, say the login page. You’ve already run your test cases, and things look fine, but you want to go further. What if you hammer this one feature repeatedly, trying to break it by using unexpected inputs or extreme scenarios? Gorilla testing is an approach that is preferred when we are trying to understand in depth about a particular functionality.
  |  By Swapnoneel Saha
Access control, also known as authorization, is a critical aspect of application security that ensures users can access only the resources they are permitted to use. And a failure in access control,- can lead to unauthorized data exposure, privilege escalation, or system compromise. Imagine, What if the keys to your house were lying in plain sight, allowing anyone to walk in? That’s exactly what broken access control feels like for hackers.
  |  By Keploy
Istio Ambient Mesh is a massive overhaul of Istio's data plane architecture. The goal is to simplify operations and make it more cost effective to run a service mesh like Istio in production. In this video we will look at: 1] What are the challenges of a traditional service mesh sidecar approach? 2] Take a look at how Istio Ambient Mesh Solves that problem.
  |  By Keploy
Outline/Structure of the TalkStructure: Introduction to Theoretical Models: A quick rundown of the Testing Pyramid, Testing Trophy, and Testing Honeycomb, and what they're all about.
  |  By Keploy
Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".
  |  By Keploy
Talking about Open Source, and Git was still new Open Source VCS. Today 93% of devs use it to build & deploy software.
  |  By Keploy
Looking for an automated test solution that offers unparalleled accuracy? Meet Keploy, your AI-driven API test engineer. Here's a description for "Introducing Keploy | Your Automated API Test Engineer: AI-Driven Edge Cases & No Hallucinations ".
  |  By Keploy
The resurgence of Artificial Intelligence (AI) in recent years owes much to a pivotal moment: the publication of a groundbreaking paper by Google. This event underscores the significant role of Open Source in advancing AI technologies. In this presentation, we delve into how Open Source is not just influencing but also shaping the landscape of Generative AI (GenAI). However, our focus extends beyond the traditional dichotomy of Open Source versus proprietary technologies. Instead, we explore the complementary nature of both realms in fostering the development of the AI ecosystem.
  |  By Keploy
GitOps enhances the DevOps experience/process. My talk is based on GitOps. I will be explaining GitOps workflow, its use cases and how companies can incorporate GitOps in their organization. I will share my experience on how I started using GitOps and what problems it is solving. I will be giving a small demo on GitOps concept to show how deployment can be done with the use of GitOps in Kubernetes. This will help developers, organization and each individual.
  |  By Keploy
Combinatorial testing is a crucial technique for ensuring software reliability by efficiently testing various combinations of input parameters. However, manual creation and execution of test cases for all possible combinations can be time-consuming and impractical. To address this challenge, this talk introduces an open-source tool designed to streamline combinatorial testing processes, maximizing test coverage while minimizing effort.
  |  By Keploy
In the world of microservices, networking and Observabilty is always a challenge, often there are different methodologies used. A service mesh is something that standardizes this. Istio service mesh is a mature framework that runs in K8s and provides a standard interface for this In this session we will do a istio 101 and go over how a service mesh helps with microservices and hybrid architectures.
  |  By Keploy
In this video, We will be seeing how to create testcases of popular JavaScript runtime and Toolkit BunJS based application.

Keploy is a developer-centric backend testing tool. It makes backend tests with built-in-mocks, faster than unit tests, from user traffic, making it easy to use, powerful, and extensible.

  • Combined Test Coverage: Merge your Keploy Tests with your fave testing libraries(JUnit, go-test, py-test, jest) to see a combined test coverage.
  • EBPF Instrumentation: Keploy uses EBPF like a secret sauce to make integration code-less, language-agnostic, and oh-so-lightweight.
  • CI/CD Integration: Run tests with mocks anywhere you like—locally on the CLI, in your CI pipeline, or even across a Kubernetes cluster. It's testing wherever you want it!
  • Multi-Purpose Mocks: Use 'em in existing tests, as server tests, or just to impress your friends!
  • Record-Replay Complex Flows: Keploy can record and replay complex, distributed API flows as mocks and stubs. It's like having a time machine for your tests—saving you tons of time!

Give your teams the tool they need to move faster.