Category Archives: Web Technology

Managing Relations with Elasticsearch

1. Introduction Elasticsearch is a search engine. It provides a distributed full-text search engine over schema-free JSON documents. As we all know Elasticsearch is a great product to index and search through a large number of documents. It supports various functionality like term and range queries, full-text search and aggregations on large data sets that are very fast and powerful. It is built over Lucene which is a high-performance, full-featured text search engine library written in Java. When we are indexing data, the world is rarely simple as an independent data existing in... Read More

Symfony Vs Phalcon: Which framework to use for building REST APIS?

There are a number of frameworks and micro-frameworks available in PHP for building REST APIS each with its pros and cons. While some provide more performance benefits some are rich in community interaction and 3rd party bundles. We had quite an expertize in symfony and its related components, so we decided to go for a comparison of symfony with the fastest PHP framework available i.e, phalcon. No doubt phalcon is faster but we wanted to know how much performance gain is achieved via phalcon so that we can let go of  symfony which provides many bundles easing our development and reducing our... Read More

How we use docker @ naukri:

What we will be focussing on: Creating tag of application and deploying on kubernetes. Creating an immutable image Naukri Deployer and Endpoints Creating a tag of Application: Whenever we push to git repository, a jenkins job is triggered and runs UT(Unit Test Cases)  on that branch (or tag). If UTs are passed create a tag and run next jenkins job to create immutable image. This new immutable image can be deployed on kubernetes and subsequently QA team can run their FT(Functional Test Cases) on that tag. To know what is an immutable image, refer::... Read More

Tip-toe through Naukri, India’s No.1 job site #OneDayTale

Glipmse of Hackathon 2016. We love open source and hence we are very open to transparency. The inception to this blog post was an idea to share the walk through of how a user is served in a typical day by your beloved Naukri.com. Naukri is a black box which gives you results but under the hood it is way more than what anyone can think. Under the hood [caption id="" align="alignnone" width="800"] Under the hood working of a car, GIF image.[/caption] Source Something like below is what we are continuously doing to serve you better. [caption id="" align="alignnone" width="549"] Car engine... Read More

Spamming is easy, filtering is tough

“Spamming is easy, filtering is tough” We sent 250 million emails through Resdex last month, and that’s way cool ! Maintaining that traffic with good user experience is really a tough task. But Resdex gives it desired attention to make sure the emails sent are relevant. What is Resdex ? Resdex is one of the most commonly used product by recruiters in the country to search desired candidates. Resdex provides various options to ensure the hiring is more targeted and less time consuming. Resdex is Naukri.com’s Resume Database Access. Naukri.com has a large database of over... Read More

Search Upgrade: How we went through changing search architecture along with elasticsearch version upgrade from 1.x to 2.x

Technology upgrade rollouts are too frequent these days, so are the requirements and expectations from a product. We need to keep up with this pace to take advantage of the changes and enhancement in technology and also able to fulfill the needs and expectations of a user. For this the product should be robust and architecture should be scalable to meet the growing demands from a product. So we took a step to upgrade elasticsearch from v1.x to 2.x. Let's start with a small brief on why we decided to go for upgrade and architectural changes. Why we need to do this? To take advantage of... Read More

Sending Mails Through SMTP Servers ( Gmail/Yahoo/Outlook )

Every website or web application needs to send transactional emails at one time or another. A user may request a password reset that sends them an email, or you may need to notify a user through email. So it is necessary to use the right tool when you don’t want to handle everything by yourself. So Let’s discuss what are the options we have got here. Whatever language you are working with you do need a mail server. So you can 1.Host your own mail server It is as complicated as it sounds. There are so many components to handle like Mail transfer agent DNS records Security... Read More

Naukri API Testing Framework

Framework is like blueprint for test automation. A good automation framework design helps in achieving more reusable, scalable, beneficial testing and reduce maintenance cost. Automation test framework provides environment for structured automated testing which includes test scripts writing with the help of reusable functions, test data generation and reporting. In case of API automation, framework become more challenging because of following tasks Handling JSON/XML based request or response parameter/body. Handling connection with API with different HTTP method. Validating API... Read More

Selenium Grid Using Docker

From quite a long time, we have been using selenium grid for parallel testing at Naukri. The purpose of using Selenium Grid is to reduce the total test execution time of an automation suite. This is achieved by running the automated test scripts in parallel on multiple machines. Refer to blog http://engineering.naukri.com/2015/10/parallel-testing-at-naukri/ for more insights on implementation of Selenium Grid for parallel testing at Naukri. Problem Statement: Although Selenium Grid has helped us in a significant manner over normal execution but every tool implementation comes with some... Read More

Session implementation practicing OAuth2.0 fundamentals

What is OAuth 2.0 Protocol and benefits of practicing it for a Session Management system OAuth 2.0 is a protocol that allows distinct parties to share information and resources in a secure and reliable manner. The OAuth 2.0 protocol allows two parties to exchange information securely and reliably. In more practical terms, the most common uses of OAuth 2.0 involve two things: Allowing a user to log into an application with another account. For example, Naukri enabling users to log in with their Facebook accounts. Allowing one service to access resources on another service on behalf... Read More