Caching is one of the key implementation when it comes to production level deployment of services, which help us to increase the performance of the system by staying as a middle layer between a particular application and the persistence system where the actual data is kept.

When we go through…


Monitoring is an important part of a deployment, which enables support and development teams to easily find the bug or an issue during the run time. …


In a typical setup we have the WSO2 API Manager and WSO2 Identity Server Integrated as a Key Manager, as an add-on WSO2 has introduced API Microgateway which can be integrated and used as Gateway along with WSO2 API Manager. …


This article is about how we can deploy the wso2 products into kubernetes, a container orchestration engine, with a brief explanations on the steps and also how wso2 along with kubernetes work together.

As this is a local setup I’m using the Minikube and using an updated wso2 provided scripts…


This article explains about an Automation process on how we can deploy custom mediators on to wso2 servers through a proper versioning and smooth deployment process which will reduce the cost of manual deployment.

Usually wso2 mediators build through maven, so here also I’m going to build the artifacts through…


This is to share the knowledge on how we can use the Microsoft Graph API to connect to Microsoft Services and do CRUD operations on it. …


This article explains how to transfer public certificate and private key entries between keystore and truststore.

Consider we need to export the certificates from base-keystore.p12, base-truststore.jks and import it to transfer-keystore.p12,transfer-truststore.jks. Follow the below steps to achieve it.

Also to update the passwords can use the below commands.


Security is always a main concern in enterprise systems, so when we building the applications it is a must to implement proper security functionalities along with the business logic. …


This article is to share a single diagram to get understand how the containerization came into the application deployment and how it evolved based on the need during each step it got evolved.

As diagrams always easy to understand and better way to remember the things, I’m sharing here and hope this helps.


This is an article on a common use case, we face during Ansible automation, where in our group_vars and host_vars we used to define the common passwords and also in the hosts file we will have our ssh passwords which needs to be encrypted, as it have the sensitive data…

Ajanthan Eliyathamby 🇱🇰

Senior Tech Lead — Enterprise Integration | WSO2 Certified Solution Architect | https://ajanthane.blogspot.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store