Wednesday 12 October 2022

JAVA 8 - Lambads,Streams - Very Simple Manner

Lambda - Nameless methods we are calling as lambda,

We heard anonymous class as nameless class, What is nameless function ?

Lambda are advanced short cut version of anonymous class.

Usecase: Convertion of Method as Nameless Method (Lambda)

public void fan() {
      System.out.println("Ramesh is megastar fan");
}

As I told lambda means nameless function/method, Now I am going to remove the method name "public void fan"

()  -> {
             System.out.println("Ramesh is megastar fan");
         }

For the single statement we don't require curly brackets {,} and then

() -> System.out.println("Ramesh is megastar fan");


2nd Ex: methods with arguments .

public void add(int a,int b) {
        System.out.println(a+b);
}

As I told lambda means nameless function/method, Now I am going to remove the method name "public void add"

(int a,int b) -> {
                          System.out.println(a+b);
                      }

For the single statement we don't require curly brackets {,} and then

(int a,int b) ->  System.out.println(a+b);
                      
 If the type of the parameter can be decided by compiler automatically based on the context then we can remove types also. 

(a,b) ->  System.out.println(a+b);


3rd Ex: method with arguments and return type

public String str(String str) { 
                return str;
 }

As I told lambda means nameless function/method, Now I am going to remove the method name "public String str"

(String str) -> { return str };

 If the type of the parameter can be decided by compiler automatically based on the context then we can remove types also. 

(str) -> { str };

(str) ->  str ;


Hope you understand lambda secret, As I told lambda is advanced version of anonymous class, Now we will see the scenario.

Concept: Functional Interface.
If an interface contain only one abstract method, such type of interfaces are called functional interfaces and the method is called functional method or single abstract method (SAM). 

Ex: 
1) Runnable -> It contains only run() method 
2) Comparable ->  It contains only compareTo() method 
3) ActionListener -> It contains only actionPerformed() 
4) Callable ->  It contains only call() method 

Inside functional interface in addition to single Abstract method (SAM) we write any number of default and static methods.


Usecase: Convertion of Anonymous Class as Lambda (Anonymous method)

class Test { 
    public static void main(String[] args) { 
        Thread t = new Thread(new Runnable() {
                                                                            public void run() { 
                                                                                 for(int i=0; i<10; i++) { 
                                                                                    System.out.println("Child Thread"); 
                                                                                } 
                                                                           }  
                                              }); 
          t.start(); 
         for(int i=0; i<10; i++) 
                System.out.println("Main thread");  
        }  
}  

In the above example anonymous (Nameless class) -> 

new Runnable() {
           public void run() { 
                  for(int i=0; i<10; i++) { 
                          System.out.println("Child Thread"); 
                  } 
           }  
 }

Converting above one into Lambda (Nameless Function/Method)

For the nameless Function - we only focus on function or method, here function/method is run() method.

 public void run() { 
           for(int i=0; i<10; i++) { 
                     System.out.println("Child Thread"); 
           } 
 }

Remove the function name -> 

 ()  ->  { 
           for(int i=0; i<10; i++) { 
                     System.out.println("Child Thread"); 
           } 
 }

We successfully converted the Anonymous class into Lambda.

Few more scenarios:

interface Calculator { 
        public void sum(int a,int b); 
}

 class Demo implements Calculator { 
        public void sum(int a,int b) { 
             System.out.println("The sum:"+(a+b)); 
        } 


public class Test { 
    public static void main(String[] args) { 
       Calculator  cal = new Demo(); 
        cal .sum(20,5); 
    } 
}


Convert into anonymous class approach

public class Test { 
    public static void main(String[] args) { 
       //Calculator cal = new Demo();
 Calculator cal = new Calculator() {
            public void sum(int a,int b) { 
                                  System.out.println((a+b)); 
                            }
                 };
        cal .sum(20,5); 
    } 
}

Now Converting anonymous class into anonymous function/method (Lambda approach)

public class Test { 
    public static void main(String[] args) { 
       //Calculator cal = new Demo();
  Calculator cal = (a,b) -> { 
                                                 System.out.println(a+b); 
                                               };
        cal .sum(20,5); 
    } 
}

Hope you understand lambda alias nameless function/method concept.   

Tuesday 4 October 2022

Microservices/Distributed Design Patterns

 I had started posting of the microservices/Distributed design patterns.

Circuit Breaker Section:


Thursday 4 August 2022

Importance of urandom egd in containers -> java -Djava.security.egd=file:/dev/urandom Importance

 In high distributed, scaled applications , One System/Server needs to connect another Downstream System/Server to establish session, certificates,

Here session/certificates are having random numbers,

Our java security pickup the random number from Linux/Window entropy pool.


What is entropy pool ?

         In any server, user hits the server through keyboard some other noises, Linux server capture those noises put them into entropy pool.


EGD - Entropy Gathered Device


our java security device -> java.security.egd=file:/dev/random


java.security.egd=file:/dev/random

      By default java8 and java11 this property is there in the java.security file, 

If entropy pool having full entries, file:/dev/random works fine,

If entropy pool having no entries, file:/dev/random will waits for long time, it is blocking the thread, it is hitting the performance.


Solution: Always use the java.security.egd=file:/dev/urandom in PCF/Kubernets/Virtual Server.


java.security.egd=file:/dev/urandom

      need to pass this argument in java argument.

If entropy pool having full entries, file:/dev/urandom works fine,

If entropy pool having no entries, file:/dev/urandom will not wait, it will genereate the random number hence it will improve the performance, no blocking of the thread.

Sunday 26 July 2020

Book Review

React: For React js I had seen videos by experts, but not get clarity. But I had read very good book
"Learning React A Hands-On Guide to Building Web Applications Using React and Redux by Kirupa Chinnathambi" It's very good book.It's covered react fundamental very good way.

for redux storage below link given very good
https://chriscourses.com/blog/redux - react-redux

Spring Boot Auto-Configuration:

Kubernetes Administration certification:
Basically Kubernetes is wrapper around the docker container. 
Try to understand kubernetes components. Intention of each kubernets component.
While doing monitoring (logs & metrics) I had taken helm install those packages. Here important point
Metrics :- ( Kubernetes Components ) Level and Application ( Deployed application) Level, Don't confuse here.
First complete extra ordinary course kubernetes administration certification course.
then follow below book some more understanding
"Kubernetes Up and Running Dive Into the Future of Infrastructure by Brendan Burns Joe Beda Kelsey Hightower" best book for kubernetes administrators


Thursday 25 June 2020

CISCO VPN - Docker Issue

Docker server means Docker Process alias Docker daemon. In the oracle vm docker daemon process is running.

Now from windows 10 ( Guest) Wants to talk with Docker Daemon process.  Now if you on cisco vpn then

Windows (10) Guest --> cisco vpn 

Now cisco vpn doesn't know who is the docker daemon process.

"Now we will use port forward technice like we are using in putty", now we will apply same technique through docker command style.

Now giving step by step process.

Click on docker quick start terminal > 

 Delete existing oracle vm instance default
1)  $docker-machine rm -f default

//Now we need create new docker instance (server)
2)  $docker-machine create default --virtualbox-no-vtx-check , if it's throwing error due to proxy then run below command

In case of proxy:
docker-machine create default --virtualbox-no-vtx-check \
--engine-env HTTP_PROXY=http://username:pwd@proxy-server:8080/ \
--engine-env HTTPS_PROXY=http://username:pwd@proxy-server:8080/ \
--engine-env NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.99.0/24,192.168.39.0/24

//docker-env: This is very important step.
 3) $docker-machine env
     $eval $("C:\Softwares\Docker Toolbox\docker-machine.exe" env)

In case 3rd step failing, then you need manual enter below environment varialbes.
export DOCKER_HOST=tcp://192.168.99.101:2376
export DOCKER_TLS_VERIFY=auto
export DOCKER_TOOLBOX_INSTALL_PATH=C:\Softwares\Docker Toolbox
export DOCKER_CERT_PATH=C:/Users/rameshvanka/.docker/machine/machines/default

//check now docker is working or not
4) docker images

4th step not working means our vpn hero enter in the middle

cisco-vpn issue:
___________________

Reference: https://www.iancollington.com/docker-and-cisco-anyconnect-vpn/

$ export DOCKER_HOST="tcp://127.0.0.1:2376"
$ export DOCKER_CERT_PATH=C:/Users/rameshvanka/.docker/machine/machines/default

$ docker-machine stop default
$ VBoxManage modifyvm "default" --natpf1 "docker,tcp,,2376,,2376"
$ docker-machine start default

$ docker --tlsverify=false ps


$ alias docker='docker --tlsverify=false'

$ docker pull hello-world
pull giving error means then we need to follow below steps.

Reference : http://biercoff.com/fixing-docker-registry-io-timeout-issue-on-mac/

//Now connect oracle vm default through docker-machine:
$ docker-machine ssh default

****************NameServer update start******************************************
//change the nameserver
docker@default:~$ sudo vi /etc/resolv.conf
nameserver 8.8.8.8
****************NameServer update end*********************************************

****************profile update start******************************************
//If any proxy is there , configure the proxy details 
docker@default:~$ sudo vi /var/lib/boot2docker/profile

EXTRA_ARGS='
--label provider=virtualbox

'
CACERT=/var/lib/boot2docker/ca.pem
DOCKER_HOST='-H tcp://0.0.0.0:2376'
DOCKER_STORAGE=overlay2
DOCKER_TLS=auto
SERVERKEY=/var/lib/boot2docker/server-key.pem
SERVERCERT=/var/lib/boot2docker/server.pem

export "HTTP_PROXY=http://username:pwd@proxy-server:8080/"
export "HTTPS_PROXY=http://username:pwd@proxy-server:8080/"
export "NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.99.0/24,192.168.39.0/24"

****************profile update end******************************************

//Now exit from docker default vm
docker@default:~$ exit

//Now restart docker default vm
$ docker-machine restart default

//Now check docker is working or not
$ docker pull hello-world


If you like my article, say yes in comments section.

Wednesday 17 June 2020

OAUTH2

What is Oauth2 ?

I had went krutunga restaurant in my car. In the restaurant parking person is there, I will hand over my car keys to that hotel parking person. He will park my car into parking area.

Means ?

I am delegating my access to hotel parking person to park my car.

I ( Ramesh) - Resource Owner - User Context
Hotel Parking Person - Client - Client Context
Car - Resource

In the oauth2 means having 2 contexts 1) User Context 2) Client Context don't confuse.

Oauth2 id "Delegate Access Protocol"

OAuth2 having 4 main pillars
1) End User - Resource Owner
2) Client - Web application client/ any other
3) Authorization Server
4) Resource


Difference between Password Credentials and Authorization Code ?

In Password Credentials, EndUser (Ramesh) will give his credentials to Webapp Client, then Webapp Client will talk to (EndUser Credentials + Webapp Client Credentials) to Authorization Server.

In case Authorization code,
1) EndUser (Ramesh) will not share his credentials to Webapp Client,
Instead Authorization server will give login form, Enduser will enter his credentials login form, Authorization will evaluate it.

For Authorization code example:
https://www.linkedin.com/pulse/basic-oauth2-concepts-ramesh-vankayala-ramesh-vankayala/?published=t


I will update soon with diagrams to explain this concept.

Saturday 9 May 2020

Permutations Program With Backtracking

Backtracking Programming - Check with all feasibles. Dynamic Programming we will choose optimal chosen.

These days in coding exams very popular. Even though you are talented, it will help sharp your skills and ask companies more salary.

If we take the (ABC) --> How many all possible ways to combination, This problem belongs to backtracking.

Backtracking with DFS approach I had taken. DFS (Stack) - means first we will one branch we will complete that branch means here (ABC,0,0) - We will complete all possibilites then we will choose (BAC,0,1) like this way.

For this type of try to understand conceptual logic, it's very tricky here combination of for loop with recursion. for loop --> sequence, recursion --> stack (DFS)

Forumula:
Deriving the recursive with for loop forumula, I am attaching image.




p(ABC,0,2) --> for loop (   (ABC,0,0)  (BAC,0,1)    (CAB,0,2) )
            p(ABC,1,2) --> for ( (swapped str, 1,1)  (swapped str,1,2)) like this

Mixing of recursion with for loop





package optumtest.permutation;

public class PermutationTest {

public static void main(String[] args) {
String str = "ABC";
        int n = str.length();
        PermutationTest permutation = new PermutationTest();
        permutation.permute(str, 0, n-1);
}

int ram = 0;


private void permute(String str, int start, int end) {
System.out.println("("+str+","+start+","+end+")");
if (start == end) {
System.out.println(str);
} else {
for (int i = start; i <= end; i++) {
  str = swap(str, start, i);
permute(str, start + 1, end);
str = swap(str, start, i);
}
}
}


public String swap(String a, int start, int end) {
char temp;
char[] charArray = a.toCharArray();
temp = charArray[start];
charArray[start] = charArray[end];
charArray[end] = temp;
return String.valueOf(charArray);
}

}