Menu Bar

Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu

Tuesday, 16 May 2023

Job Opening for core java Developer In Lucknow

Job Synopsis  
 
Job Opening for core java Developer
Experience:   2 to 5 yrs
Location:   Lucknow

Job Description  
 
Please walk in directly with resume if your skill is matching to requirement.

Interview Location : Lucknow

Interviews will be conducted on daily basis from 9.30- 5.00 PM for Java/J2Ee Skill with database experience. This is with product based company .

Max CTC offered will be decided over experience & interview.

Mandatory Skills :

Strong coding/Programming experience
Core Java,oops Concepts,Collections,exceptional handling. Multithreading
J2Ee technologies (JSP, Servlets, JDBC)
Data Base : Oracle or SQL

   

Read More »

Friday, 18 June 2021

Java Code to check Kafka Topic Exist or Not



Properties props = new Properties();
props.put(AdminClientConfig.BOOTSTRAP_SERVERS_CONFIG, "localhost:9092");
try (AdminClient client = AdminClient.create(props)) {
    ListTopicsOptions options = new ListTopicsOptions();
    options.listInternal(true); // includes internal topics such as __consumer_offsets
    ListTopicsResult topics = client.listTopics(options);
    Set<String> currentTopicList = topics.names().get();
    System.out.println("currentTopicList ------"+currentTopicList);

}catch(Exception e) {
	e.printStackTrace();
}
   

Read More »

Monday, 19 April 2021

Configure MongoDB to use TLS/SSL

The following information is required to configure TLS/SSL on Mongo:
  • PEMKeyFile: This file that contains the TLS/SSL certificate and key. The mongod/mongos instance presents this file to its clients to establish the instance's identity.
  • CAFile: This file that contains the certificate chain for verifying client certificates. The mongod/mongos instance use this file to verify certificates presented by its clients. The certificate chain includes the certificate of the root Certificate Authority.
Here we are using .pem file to configure MongoDB Server/Client to use TLS/SSL.

Mongo TLS/SSL Server Side Configuration:   

To use TLS/SSL connections and perform client certificate validation, include the following TLS/SSL settings in your mongod/mongos instance's configuration file(mongod.cfg).

mongod.cfg file can be open from your installation directory, in my case i installed Mongo DB in C drive i.e. C:\Program Files\MongoDB\Server\4.2\bin

Add the highlighted lines in your mongod.cfg file, as given below.

# mongod.conf

storage:
  dbPath: C:\Program Files\MongoDB\Server\4.2\data
  journal:
    enabled: true

systemLog:
  destination: file
  logAppend: true
  path:  C:\Program Files\MongoDB\Server\4.2\log\mongod.log

# network interfaces
net:
  port: 27017
  bindIp: 127.0.0.1,localhost
  ssl:
    mode: requireSSL
    PEMKeyFile: C:\Program Files\MongoDB\Server\4.2\bin\application-key.pem
    CAFile: C:\Program Files\MongoDB\Server\4.2\bin\application-ca.pem

Once you add the above properties in mongod.cfg file, restart the MongoDB Server service.




Once you restart the service mongo server is now configured with ssl. 

To verify mongo server is successfully configured with ssl or not open mongod.log (C:\Program Files\MongoDB\Server\4.2\log) file, you will see below logs.



Now Mongo Server is successfully configured to take ssl connections.

Mongo TLS/SSL Client Side Configuration:   

Now RUN below openssl command to create PKCS12 file.

openssl pkcs12 -export -out application_keystore.pkcs12 -in application-key.pem -password pass:changeit

Once your PKCS12 file is created, now we have to create JKS file using below command from cmd. Open cmd from PKCS12 file location, and execute below command. 
Once you execute below command you need to enter password, in my case i use the default keystore password i.e changeit.
After entering the password 3 times JKS file will generate at same location.

keytool -importkeystore -srckeystore application_keystore.pkcs12 -srcstoretype PKCS12 -destkeystore keystore.jks -deststoretype JKS
























Now we need to put this JKS file path in your java code as given below, and restart your application.

System.setProperty("javax.net.ssl.trustStore", "<path>/keystore.jks");
System.setProperty("javax.net.ssl.trustStorePassword", "changeit");

Another way if you do not want to add JKS file from your java code then add the JKS file directly in you  Java cacerts folder. Use below keytool command.

To run below command open cmd from java installation directory in my case i opened from C:\Program Files\Java\jdk1.8.0_65\jre\lib\security location.

keytool -importcert -alias <Alias Name> -file /application-key.pem -trustcacerts -keystore cacerts -storetype JKS











Once you execute above command it will ask for password, in my case i used the default keystore password i.e changeit. Once this is done then restart the application.


Read More »

Sunday, 18 April 2021

Import self-signed certificate into Docker's JRE cacert

In order to import ssl certificate into Java Security cacert from Docker file use below keytool command in Docker file. 
First we need to copy the required file(.pem or .crt) into Docker with the help of below COPY commands.

To copy the .pem file in Docker image, add below command into Docker file.

COPY ./src/main/resources/application.pem application.pem

To copy the .crt file in Docker image, add below command into Docker file.

COPY ./src/main/resources/application_CA.crt application_CA.crt

Below keytool command copy the ssl certificate into Docker Java cacert folder.


<Alias Name>: Certificate Alias Name

<.crt file or .pem file Path>: Certificate file Name with path or .pem file name with path

RUN keytool -importcert -noprompt -alias <Alias Name> -file <.crt file or .pem file> -trustcacerts -keystore $JAVA_HOME/jre/lib/security/cacerts -storetype JKS -storepass changeit

Sample Docker File.

FROM openjdk:8
ADD ./target/sample_application.jar sample_application.jar
COPY ./src/main/resources/application.pem application.pem
RUN keytool -importcert -noprompt -alias sslAppCertificate -file application.pem -trustcacerts -keystore $JAVA_HOME/jre/lib/security/cacerts -storetype JKS -storepass changeit
EXPOSE 8080
ENTRYPOINT ["java", "-jar", "sample_application.jar"]

Note: This application.pem file only contains certificate.

Read More »

How to access secrets in Azure Key Vault using Java Code

   
Below is the Java code to get Azure Key Vault Secret key Value.

Azure Key Vault is a cloud service that provides secure storage for secrets, such as passwords and database connection strings.

The Azure Key Vault Secrets client library allows you to securely store and tightly control the access to tokens, passwords, API keys, and other secrets. This library offers operations to create, retrieve, update, delete, purge, backup, restore, and list the secrets and its versions.

The following information is required to access the Azure Key Vault:
  1. Key Vault URL
  2. Client Id
  3. Client Key

Use the Azure Key Vault Secrets client library to create and manage secrets.
<dependency>
    <groupId>com.azure</groupId>
    <artifactId>azure-security-keyvault-secrets</artifactId>
    <version>4.2.7</version>
</dependency>

Other Required Dependency.
<dependency>
    <groupId>com.fasterxml.jackson.core</groupId>
    <artifactId>jackson-databind</artifactId>
    <version>2.12.3</version>
</dependency>

<dependency>
    <groupId>com.fasterxml.jackson.core</groupId>
    <artifactId>jackson-core</artifactId>
    <version>2.12.3</version>
</dependency>

<dependency>
    <groupId>io.projectreactor</groupId>
    <artifactId>reactor-core</artifactId>
    <version>3.4.5</version>
</dependency>

<dependency>
    <groupId>com.fasterxml.jackson.core</groupId>
    <artifactId>jackson-annotations</artifactId>
    <version>2.12.3</version>
</dependency>

import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.concurrent.Future;

import com.microsoft.aad.adal4j.AuthenticationContext;
import com.microsoft.aad.adal4j.AuthenticationResult;
import com.microsoft.aad.adal4j.ClientCredential;
import com.microsoft.azure.keyvault.KeyVaultClient;
import com.microsoft.azure.keyvault.authentication.KeyVaultCredentials;
import com.microsoft.azure.keyvault.models.SecretBundle;

/**
 * @author pushkarkhosla
 *
 */
public class AzureKeyVaultJavaConfigurationExample extends KeyVaultCredentials {

	private String clientId;
	private String clientKey;

	public AzureKeyVaultJavaConfigurationExample(String clientId, String clientKey) {
		this.clientId = clientId;
		this.clientKey = clientKey;
	}

	@Override
	public String doAuthenticate(String authorization, String resource, String scope) {
		AuthenticationResult token = getAccessTokenFromClientCredentials(authorization, resource, clientId, clientKey);
		return token.getAccessToken();
	}

	private static AuthenticationResult getAccessTokenFromClientCredentials(String authorization, String resource,
			String clientId, String clientKey) {
		AuthenticationContext context = null;
		AuthenticationResult result = null;
		ExecutorService service = null;
		try {
			service = Executors.newFixedThreadPool(1);
			context = new AuthenticationContext(authorization, false, service);
			ClientCredential credentials = new ClientCredential(clientId, clientKey);
			Future<AuthenticationResult> future = context.acquireToken(resource, credentials, null);
			result = future.get();
		} catch (Exception e) {
			throw new RuntimeException(e);
		} finally {
			service.shutdown();
		}

		if (result == null) {
			throw new RuntimeException("authentication result was null");
		}
		return result;
	}

	public static void main(String[] args) {
		try {
			KeyVaultClient client = new KeyVaultClient(new AzureKeyVaultJavaConfigurationExample(
					"Client Id", "Client Key"));

			SecretBundle secret = client.getSecret("Azure Key Vault Url",
					"Secret Key");

			System.out.println("------" + secret.value());

		} catch (Exception e) {
			e.printStackTrace();
		}
	}
}



Read More »

Monday, 11 September 2017

Job | Multiple Openings ||Java Developer || Product Based Company || Delhi | Kanban infosystem private limited

I am from Kanban Infosystem Pvt Ltd (A leading HR Out Sourcing Company working for Tier-1 and Fortune 500 Clients
Currently We are Hiring Java Developer -- for one of our client Leading & well established Product Based Company.
================================
Company : Product Based Company
Location: Delhi
Exp : 3 to 6 years
No of open positions : multiple
Job Type : Full time
===============================
Incase if you are not looking for a job change, please recommend someone else who is matching below profile:
=================================
Note: Requesting you please fill the below details and send your updated resume with project work:

Current CTC :
Expected CTC :
Total Exp :
Total Exp in Java Development :
Total Exp in Struts and Spring:
Total Exp in Hibernate:
Total Exp in Apache/NGINX :
Are you available for F2F interview on Week Days : ______
Current Location:
Open for Delhi:
Reason for job Change___.
Official Notice Period :_____
Minimum Notice Period ___

Job Description:
Essential Responsibilities
Design, code, and debug web applications
Create robust high-volume production applications, and develop prototypes quickly
Manage all the stages of large engineering projects - including design, allocation, project management, completion and documentation
Specialize in scalable web application development

Skills and Competencies
  • Strong and current programming ability in one or more of the following languages: PHP, JavaScript/AJAX, Java, C, C++, Python
  • Knowledge of SQL, postgres, MongoDB and other data storage solutions
  • Strong understanding of algorithms and data structures concepts
  • Ability to communicate technical concepts clearly and effectively
  • Extensive knowledge of UNIX/Linux or Windows environments
  • Experience with Apache/NGINX a must,
  • Enjoys solving interesting problem
  • Should have experience in Developing & Supporting High Volume Transaction application and servers
  • Experience with big data (hadoop, Cassandra, elastic search) is a plus.


Key skills: Java, Java Script, Server Side Programming, HTML, JSP, Ajax, Java Struts, spring, Hibernate, Telecom Billing, DTH, E-Commerce, IT Software- E-commerce.

Mail Your Resume at :  vanshika@kanbaninfosystem.com


 

Read More »

Monday, 4 September 2017

Job | Software Engineer - Java - Noida | CrossRoad Solution

We have urgent opening with UK Based MNC Company 

Position- Software Engineer - Java
Experience - 2 to 4 yrs 
Job Location:-Noida 

Kindly reply back with your updated CV & below detail, if interested for the same. 

Current Salary: 
Expected Salary: 
Notice Period: 
Current Location:

Job Responsibility 
  1. Handling new requirements for Java components and change request in various part of the system which service the business.
  2. Will be responsible for Development and guiding the developers ensuring quality within the Adapt/Java team.
  3. Communication with the team leads for any technical / business requirements.
  4. Experience in handling changes in Development and Production Database Servers.
  5. Analysing and resolving production issues independently or within a team
  6. Creating and maintaining of all necessary documentation associated to developed and supported applications. 
  7. Support throughout test and implementation

Skills & Experience
  1. 2+ years development experience in Java Development 
  2. Good Java skills to the level of a java developer.
  3. Understanding of development lifecycle & release management.
  4. Working experience with Oracle Database technologies
  5. Very strong analytical and problem solving skills.
  6. A passion and strong interest for technologies. 
  7. Aptitude for innovation, working independently and thinking ‘outside the box’.
  8. Experience in JavaScript – AngularJS/JQuery with AJAX.
  9. Experience in JSP/Servlet
  10. Experience in Web Services – SOAP & REST
  11. Experience in JUnit
  12. Experience in Maven
  13. Experience in Hibernate
  14. Experience in Spring - MVC Architecture
  15. Experience in Adapt components and configuration tools.
  16. Good to have knowledge of XML, XPATH may be XSLT


Thanks & Regards
Vinod | HR Manager | Cross Road Solution.
Website: www.crossroadsolution.com
Mail Your Resume at :- vinod.k@crossroadsolution.com


 

Read More »

Tuesday, 29 August 2017

Job | Interview Call Letter for Java Development on Saturday_2nd Sep at Aricent Gurgaon

Hi , 

We have multiple openings for Java Development in Gurgaon....

Date: Saturday, 2nd Sep 2017
Time: 10:00am-2:00pm
Venue: Aricent, Tower-5,Unitech Infospace, SEZ, Tikri, Sohna Road, Sector. 48, Gurgaon-122001
Land Mark: Near to Subhash Chowk 

Contact Person: Sushant Kumar

Job Description:-
Experience:- 2.6 - 8.0 Yrs
Location:- Gurgaon 
Total Openings:- 40

We have three different JDs for Java. Pls find below:-

JD:-1
(a)Java SE / J2SE (Java 7 / Java 8)
(b)Java EE / J2EE, Spring framework
(c)NoSQL databases (Cassandra, MongoDB, Redis).
(d)Message bus like RabbitMQ, Kafka, ActiveMQ, etc..

JD:-2
(a) Java SE / J2SE
(b) Automation tools like JUnit, JMockit and Code Coverage tools
(c) Build Tools (ANT, Maven etc.)
(d) HTML, CSS, AJAX

JD:-3
(a)Java SE / J2SE 
(b)REST, SOAP, Web Services, PoJo..
(c)AngularJS, JQuery, Bootstrap

Good to have Skills (Not Mandatory)
1.Scalable, Secure, Highly Available applications
2.Well versed with DevOps tools (Elastic stack, Graffana, Pagerduty, Sensu, etc.) and processes
3.Good Team work and collaboration skills
4.Comfortable with Containers like CloudFoundry, Docker.

Pls come with your updated resume. Resume screening will be at venue.

Regards,
Sushant Kumar
Talent Acquisition
Aricent 
Mail Your Resume at : sushant.kumar@aricent.com

 

Read More »