You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: perf/benchmark/security/generate_policies/README.md
+44-50Lines changed: 44 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -216,12 +216,6 @@ The values which can be used to create custom RequestAuthentication are as follo
216
216
217
217
For more information see [RequestAuthentication Reference](https://istio.io/latest/docs/reference/config/security/request_authentication/).
218
218
219
-
## Test Cases
220
-
221
-
There are 4 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
222
-
223
-
The cases are as follows:
224
-
225
219
## Examples
226
220
227
221
generate_policies.go also allows a user to create mutliple kinds of policies in one command.
@@ -302,50 +296,6 @@ To apply largePolicy.yaml that was just created to istio use the following comma
302
296
kubectl apply -f largePolicy.yaml
303
297
```
304
298
305
-
## Test Cases
306
-
307
-
There are 5 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
308
-
309
-
Each script compares a single policy or a number of policies against another set of policies. This gives us easy access to data which we can use to compare the performance of two policies against each other. For each set of policies there are 3 different configurations of the performance tests. The first represents a small load on the system (qps=100, conn=8), the second represents a medium load (qps=500, conn=32), and finally the 3rd represents a large load (qps=1000, conn=64).
310
-
311
-
The cases are as follows:
312
-
313
-
1. To get the data of having a single AuthZ policy with 10 path rules as well as running the performance tests with a single AuthZ policy with 1000 path rules.
314
-
To run this test run the following commands
315
-
316
-
```bash
317
-
cd testCases
318
-
./authZPaths.sh
319
-
```
320
-
321
-
2. To get the data of having a single AuthZ policy with 10 sourceIP rules as well as running the performance tests with a single AuthZ policy with 1000 sourceIP rules.
322
-
To run this test run the following commands in the testCases folder:
323
-
324
-
```bash
325
-
./authZSourceIP.sh
326
-
```
327
-
328
-
3. To get the data of having 10 AuthZ policies each with 1 sourceIP rule as well as running the performance tests with 1000 AuthZ policies each with 1 sourceIP rule.
329
-
To run this test run the following commands in the testCases folder:
330
-
331
-
```bash
332
-
./authZSourceIPVariable.sh
333
-
```
334
-
335
-
4. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
336
-
To run this test run the following commands in the testCases folder:
337
-
338
-
```bash
339
-
./authZPathVariable.sh
340
-
```
341
-
342
-
5. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
343
-
To run this test run the following commands in the testCases folder:
344
-
345
-
```bash
346
-
./authZPathVariable.sh
347
-
```
348
-
349
299
## Example 1
350
300
351
301
- By creating a config file called config.json with the following data, and then running the following command:
@@ -452,3 +402,47 @@ To remove the policies applied navigate to the generate_policies folder and run
452
402
```bash
453
403
kubectl delete -f largePolicy.yaml
454
404
```
405
+
406
+
## Test Cases
407
+
408
+
There are 5 automated scripts that generate policies, apply those policies, runs the performance tests on them, and then fetches the data of those tests from the fortio client.
409
+
410
+
Each script compares a single policy or a number of policies against another set of policies. This gives us easy access to data which we can use to compare the performance of two policies against each other. For each set of policies there are 3 different configurations of the performance tests. The first represents a small load on the system (qps=100, conn=8), the second represents a medium load (qps=500, conn=32), and finally the 3rd represents a large load (qps=1000, conn=64).
411
+
412
+
The cases are as follows:
413
+
414
+
1. To get the data of having a single AuthZ policy with 10 path rules as well as running the performance tests with a single AuthZ policy with 1000 path rules.
415
+
To run this test run the following commands
416
+
417
+
```bash
418
+
cd testCases
419
+
./authZPaths.sh
420
+
```
421
+
422
+
2. To get the data of having a single AuthZ policy with 10 sourceIP rules as well as running the performance tests with a single AuthZ policy with 1000 sourceIP rules.
423
+
To run this test run the following commands in the testCases folder:
424
+
425
+
```bash
426
+
./authZSourceIP.sh
427
+
```
428
+
429
+
3. To get the data of having 10 AuthZ policies each with 1 sourceIP rule as well as running the performance tests with 1000 AuthZ policies each with 1 sourceIP rule.
430
+
To run this test run the following commands in the testCases folder:
431
+
432
+
```bash
433
+
./authZSourceIPVariable.sh
434
+
```
435
+
436
+
4. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
437
+
To run this test run the following commands in the testCases folder:
438
+
439
+
```bash
440
+
./authZPathVariable.sh
441
+
```
442
+
443
+
5. To get the data of having 10 AuthZ policies each with 1 paths rule as well as running the performance tests with 1000 AuthZ policies each with 1 path rule.
444
+
To run this test run the following commands in the testCases folder:
0 commit comments