Feeds

Testing web transactions

Old tool gets new lease of life

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Generating comprehensive test data sets is always a pain - especially with transaction-based applications. Today's web-based applications are subject to widely-varied live transaction volumes where server traffic can go from one transaction an hour to 1,000 a second in the blink of an eye. So if you want to test them properly you really need to throw shed loads of data at them.

Ross Systems International (RSI), a UK-based software services company, says it has the answer with Pira, its script-based testing tool. Pira, from the Greek "to test", is an intelligent generator tool which can create flexible test-sets for complex applications. It comes as a simple scripting language and Piralib, a set of C libraries.

"The language goes through a two part process during executions, very similar to Java. It is first converted to a meta-language, which is held in a tree structure in the interpreter and then this is executed to produce the test records and actions," explains Rupert Stanley, RSI founder and director.

RSI has a lengthy background in resilient computing in the finance and telecommunications industries and developed Pira originally to test applications in the HP (formerly Tandem) "NonStop" computing environment.

Though the first version of Pira was built for the NonStop platform RSI recognised the growth of high-resilience applications on the back of the web and is now working to make the tool available to a wider community.

"One of the problems with testing communications programs is there is a lot of variability and it is difficult to build comprehensive test sets. With Pira you can set up tests for every possible combination of data," he goes on.

Users can tailor Pira to their own specifications through a set of user hooks which come as a part of Piralib. The result is an economical method of creating variable test data with only a few lines of script.

Here is an example of simple Pira script to generate a small test data set:

<SET COUNT>
<PAUSE 50>
<BEGIN>
<DO 500>
<BEGIN>
<PAUSE>
["Hi 200 = " <COUNT> " PLUS 1 = " <COUNT> ];
<PAUSE>
["Hi 400 = " <COUNT> " PLUS 1 = " <COUNT> ];
<END>
<LOOP>
<END>
<PAUSE 2000>
["Finish, total count = " <COUNT> ];

Pira can generate both sequential and random test sets and vary the speed of test runs according to pre-defined conditions. If, for example, you are running a destruction test on a transaction processing engine, you can slow the test down as errors start to appear to make it easier to detect points of failure.

"Most test generators are mechanistic so they can only generate relatively simple test scenarios. What we have done with Pira is to introduce a probabilistic element to test set generation, which is more realistic," explains Stanley.

Pira produces results and statistics in standard formats so they can be fed into a test analysis program for further examination.

Pira is currently available as part of RSI's suite of test programs. It is licensed on a monthly basis at £160 per CPU although there are discounts for multiple CPUs and for resellers. RSI will make Pira available for other platforms later this year. ®

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.