Skip to content

Commit 99a2f6e

Browse files
author
meiza
committed
update position of Test Cases in README
1 parent f88b2f2 commit 99a2f6e

File tree

1 file changed

+44
-50
lines changed
  • perf/benchmark/security/generate_policies

1 file changed

+44
-50
lines changed

perf/benchmark/security/generate_policies/README.md

Lines changed: 44 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -216,12 +216,6 @@ The values which can be used to create custom RequestAuthentication are as follo
216216

217217
For more information see [RequestAuthentication Reference](https://istio.io/latest/docs/reference/config/security/request_authentication/).
218218

219-
## Test Cases
220-
221-
There are 4 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
222-
223-
The cases are as follows:
224-
225219
## Examples
226220

227221
generate_policies.go also allows a user to create mutliple kinds of policies in one command.
@@ -302,50 +296,6 @@ To apply largePolicy.yaml that was just created to istio use the following comma
302296
kubectl apply -f largePolicy.yaml
303297
```
304298

305-
## Test Cases
306-
307-
There are 5 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
308-
309-
Each script compares a single policy or a number of policies against another set of policies. This gives us easy access to data which we can use to compare the performance of two policies against each other. For each set of policies there are 3 different configurations of the performance tests. The first represents a small load on the system (qps=100, conn=8), the second represents a medium load (qps=500, conn=32), and finally the 3rd represents a large load (qps=1000, conn=64).
310-
311-
The cases are as follows:
312-
313-
1. To get the data of having a single AuthZ policy with 10 path rules as well as running the performance tests with a single AuthZ policy with 1000 path rules.
314-
To run this test run the following commands
315-
316-
```bash
317-
cd testCases
318-
./authZPaths.sh
319-
```
320-
321-
2. To get the data of having a single AuthZ policy with 10 sourceIP rules as well as running the performance tests with a single AuthZ policy with 1000 sourceIP rules.
322-
To run this test run the following commands in the testCases folder:
323-
324-
```bash
325-
./authZSourceIP.sh
326-
```
327-
328-
3. To get the data of having 10 AuthZ policies each with 1 sourceIP rule as well as running the performance tests with 1000 AuthZ policies each with 1 sourceIP rule.
329-
To run this test run the following commands in the testCases folder:
330-
331-
```bash
332-
./authZSourceIPVariable.sh
333-
```
334-
335-
4. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
336-
To run this test run the following commands in the testCases folder:
337-
338-
```bash
339-
./authZPathVariable.sh
340-
```
341-
342-
5. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
343-
To run this test run the following commands in the testCases folder:
344-
345-
```bash
346-
./authZPathVariable.sh
347-
```
348-
349299
## Example 1
350300

351301
- By creating a config file called config.json with the following data, and then running the following command:
@@ -452,3 +402,47 @@ To remove the policies applied navigate to the generate_policies folder and run
452402
```bash
453403
kubectl delete -f largePolicy.yaml
454404
```
405+
406+
## Test Cases
407+
408+
There are 5 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
409+
410+
Each script compares a single policy or a number of policies against another set of policies. This gives us easy access to data which we can use to compare the performance of two policies against each other. For each set of policies there are 3 different configurations of the performance tests. The first represents a small load on the system (qps=100, conn=8), the second represents a medium load (qps=500, conn=32), and finally the 3rd represents a large load (qps=1000, conn=64).
411+
412+
The cases are as follows:
413+
414+
1. To get the data of having a single AuthZ policy with 10 path rules as well as running the performance tests with a single AuthZ policy with 1000 path rules.
415+
To run this test run the following commands
416+
417+
```bash
418+
cd testCases
419+
./authZPaths.sh
420+
```
421+
422+
2. To get the data of having a single AuthZ policy with 10 sourceIP rules as well as running the performance tests with a single AuthZ policy with 1000 sourceIP rules.
423+
To run this test run the following commands in the testCases folder:
424+
425+
```bash
426+
./authZSourceIP.sh
427+
```
428+
429+
3. To get the data of having 10 AuthZ policies each with 1 sourceIP rule as well as running the performance tests with 1000 AuthZ policies each with 1 sourceIP rule.
430+
To run this test run the following commands in the testCases folder:
431+
432+
```bash
433+
./authZSourceIPVariable.sh
434+
```
435+
436+
4. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
437+
To run this test run the following commands in the testCases folder:
438+
439+
```bash
440+
./authZPathVariable.sh
441+
```
442+
443+
5. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
444+
To run this test run the following commands in the testCases folder:
445+
446+
```bash
447+
./authZPathVariable.sh
448+
```

0 commit comments

Comments
 (0)