Establishing an effective performance testing environment. Gordon McKeown www.facilita.com TMF 2010.

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

Fast and Thorough: Quality Assurance for Agile Data Warehousing Projects.
Presentation By Michael Dunstan
VoipNow Core Solution capabilities and business value.
CONFUSED? DON’T BE. IT’S ACTUALLY REALLY STRAIGHTFORWARD. RICK FREEMAN FEBRUARY 4, 2015 The HSPC Tier 1 & Tier 2 Technical Specification Explained.
Introduction to Introduction to Database Systems Rose-Hulman Institute of Technology Curt Clifton.
IACT 901 Module 9 Establishing Technology Strategy - Scope & Purpose.
SaaS, PaaS & TaaS By: Raza Usmani
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
National Manager Database Services
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Banking Clouds V International Youth Banking Forum.
Accelerating Product and Service Innovation © 2013 IBM Corporation IBM Integrated Solution for System z Development (ISDz) Henk van der Wijk 23 Januari.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Organizing Information Technology Resources
Information Systems Security Computer System Life Cycle Security.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Testing Challenges in an Agile Environment Biraj Nakarja Sogeti UK 28 th October 2009.
In the name of God :).
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Electronic Health Records: Healthcare System’s Common Trends Based on Cloud Computing Group 2: OU Jin FANG Ting
OGSA-DAI Scenarios and Requirements OGSA-DAI for Developers GridWorld 2006, Washington DC 11 September 2006.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Capturing the requirements  Requirement: a feature of the system or a description of something the system is capable of doing in order to fulfill the.
Small Business Security Keith Slagle April 24, 2007.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
Adoption and Use of Electronic Medical Records (in Federally Qualified Health Centers) and Supporting an ASP Community Care Network of Virginia, Inc.
1 Wide Area Network Emulation on the Millennium Bhaskaran Raman Yan Chen Weidong Cui Randy Katz {bhaskar, yanchen, wdc, Millennium.
Rod Fontecilla, Ph.D. Vice President Application Services Nov 2015 Deploying Applications Using DevOps.
Greenlight Presentation Oracle 11g Upgrade February 16, 2012.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
17/03/2016"How not to performance test"1 How not to Performance Test Gordon McKeown Alan Gordon.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Welcome to the ICT Department Unit 3_5 Security Policies.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Consolidating Your Database Infrastructure
How to Develop Secure Software using Agile Methods? Dr. Imran Ghani
ICT22 – 2016: Technologies for Learning and Skills ICT24 – 2016: Gaming and gamification Francesca Borrelli DG CONNECT, European Commission BRUXELLES.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Strategy for Complex Networking, IT, & Telecommunication Decisions
Server Upgrade HA/DR Integration
IT Architecture Technical blueprint for evolving a corporate infrastructure resource that can be shared by many users and services processing systems hardware.
People used to install software on their computers
BA Continuum India Pvt Ltd
Leveraging the Cloud: A New Way of Managing Testing
Scaling In e Scaling Out através do elastic pool
ECOMP Information Model
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Information Technology (IT) Department
Cloud Computing Kelley Raines.
Azure SQL Database – Scaling in and Scaling out with elastic pool
Physical Architecture Layer Design
Cloud Testing Shilpi Chugh.
Diskless network security
Web Penetration Testing and Ethical Hacking Capture the Flag
Firewalls Purpose of a Firewall Characteristic of a firewall
Benoît DAUDIN (GS-AIS-PM – CERN) 22-March-2012
"Cloud services" - what it is.
DAT381 Team Development with SQL Server 2005
Cloud Computing LegalRun Solutions Why It’s Right for You!
OPS-7: Building and Deploying a Highly Available Application
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
— IT versus IT Networking: What's the difference?
Engineering Secure Software
Security in the Real World – Plenary Day One
Presentation transcript:

Establishing an effective performance testing environment. Gordon McKeown TMF 2010

Agenda  Introductory tour of the issues.  Share our experiences & identify best practice.  In the spirit of the TMF... You will drive the the session! TMF "Creating an effective performance testing environment" 2 27/1/2010

What do we mean by "Environment“ ?  A wide scope. But not too wide!  In  "Systems"  Network  Tool  Load Injectors  System Under Test (SUT)  Software installation & configuration  Test data  Out  People (except for responsibilities / roles )  Tool selection TMF "Creating an effective performance testing environment" 3 27/1/2010

Performance test elements 27/1/2010 TMF "Creating an effective performance testing environment" 4

Desirable characteristics  Few impediments to tester activities.  Low management & bureaucratic overheads.  “Realistic tests” are possible.  SUT as close as possible to production.  Experimentation is possible.  Isolation  Reproducible tests  Reduced risk of impact on corporate ICT 27/1/2010 TMF "Creating an effective performance testing environment" 5

Some of the issues  Who controls the test infrastructure?  Security standards.  Test data.  Relationship to "production“.  Resource sharing.  Technical innovations.  Any other major areas? 27/1/2010 TMF "Creating an effective performance testing environment" 6

Should the test team declare independence? 27/1/2010 TMF "Creating an effective performance testing environment" 7

Who should control the environment?  " Lack of environmental control by testers is a common, serious impediment to testing efficiency." That is my experience. What is yours?  Testing is an exploratory activity, we often don't know what the next change should be.  Is it easier if load testing is integrated with development?  Are things worse in organisations conducting infrequent tests? E.g. medium sized organisation with limited IT capability who have commissioned a new system. 27/1/2010 TMF "Creating an effective performance testing environment" 8

Corporate security standards  We have the characteristics of hackers!  Denial of Service Attack.  Recording interactions.  "Man in the middle."  Looking inside systems.  Reverse engineering in extremis. 27/1/2010 TMF "Creating an effective performance testing environment" 9

Test data  Quantity & realism  Depending on DB design too little data can give unrealistically fast or slow timings.  An "unrealistic" database can distort results  Managing "real" data extracted from a live system.  Legal & ethical issues  Anonymizing 27/1/2010 TMF "Creating an effective performance testing environment" 10

Test's relationship to “Production"  Naive scaling  But who can afford full duplication?  Are sizing models fit for purpose?  Systems are not linear.  The "unknown unknowns" are a risk.  An example: licensing  One of our client's load tested against a near replica system. We recommended a subset of tests should be run against actual system (with test db) before going live. Discovered default server license for 50 users had not been upgraded to 300.  Significant but unforeseen configuration issues.  Changing configuration settings from scaled down replica to production: should this be tested? 27/1/2010 TMF "Creating an effective performance testing environment" 11

Resource sharing  Functional testing & UAT sharing resources with performance testing.  Mutual interference & frustration  Reproducible tests may not be possible.  Switching between configurations & databases.  Out of hours testing: a solution or another set of problems? 27/1/2010 TMF "Creating an effective performance testing environment" 12

Technical innovation  Cloud computing.  Software as service.  Virtualization.  What else might change the game? 27/1/2010 TMF "Creating an effective performance testing environment" 13