mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-11 10:06:24 +05:00
Add benchmark for diameter+caps
This commit is contained in:
committed by
Dan Christian Bogos
parent
5fd8e50f98
commit
aad5c4a66f
211
agents/diambench_test.go
Normal file
211
agents/diambench_test.go
Normal file
@@ -0,0 +1,211 @@
|
||||
//go:build performance
|
||||
|
||||
/*
|
||||
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
||||
Copyright (C) ITsysCOM GmbH
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>
|
||||
*/
|
||||
|
||||
package agents
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"fmt"
|
||||
"path/filepath"
|
||||
"sync"
|
||||
"sync/atomic"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/cgrates/birpc/context"
|
||||
"github.com/cgrates/cgrates/engine"
|
||||
"github.com/cgrates/cgrates/utils"
|
||||
"github.com/fiorix/go-diameter/v4/diam"
|
||||
"github.com/fiorix/go-diameter/v4/diam/avp"
|
||||
"github.com/fiorix/go-diameter/v4/diam/datatype"
|
||||
"github.com/fiorix/go-diameter/v4/diam/dict"
|
||||
)
|
||||
|
||||
var (
|
||||
capsLimit = flag.Int("caps_limit", 0, "caps limit")
|
||||
capsStrategy = flag.String("caps_strategy", "*busy", "caps strategy")
|
||||
parallelism = flag.Int("parallelism", 0, "parallelism")
|
||||
)
|
||||
|
||||
func BenchmarkDiameterCaps(b *testing.B) {
|
||||
// b.Skip("still incomplete")
|
||||
var dbCfg engine.DBCfg
|
||||
switch *utils.DBType {
|
||||
case utils.MetaInternal:
|
||||
dbCfg = engine.InternalDBCfg
|
||||
case utils.MetaMySQL:
|
||||
case utils.MetaMongo:
|
||||
dbCfg = engine.MongoDBCfg
|
||||
case utils.MetaPostgres:
|
||||
dbCfg = engine.PostgresDBCfg
|
||||
default:
|
||||
b.Fatal("unsupported dbtype value")
|
||||
}
|
||||
|
||||
// CoreS config is dynamic for this benchmark.
|
||||
jsonCfg := fmt.Sprintf(`{
|
||||
"cores": {
|
||||
"caps": %d,
|
||||
"caps_strategy": "%s",
|
||||
|
||||
// use shutdown_timeout option to set the diameter reply timeout.
|
||||
"shutdown_timeout": "100ms"
|
||||
}
|
||||
}`, *capsLimit, *capsStrategy)
|
||||
|
||||
ng := engine.TestEngine{
|
||||
ConfigJSON: jsonCfg,
|
||||
ConfigPath: filepath.Join(*utils.DataDir, "conf", "samples", "diambench"),
|
||||
TpFiles: map[string]string{
|
||||
utils.AccountActionsCsv: `#Tenant,Account,ActionPlanId,ActionTriggersId,AllowNegative,Disabled
|
||||
cgrates.org,1001,PACKAGE_1001,,,`,
|
||||
utils.ActionPlansCsv: `#Id,ActionsId,TimingId,Weight
|
||||
PACKAGE_1001,ACT_TOPUP,*asap,10`,
|
||||
utils.ActionsCsv: `#ActionsId[0],Action[1],ExtraParameters[2],Filter[3],BalanceId[4],BalanceType[5],Categories[6],DestinationIds[7],RatingSubject[8],SharedGroup[9],ExpiryTime[10],TimingIds[11],Units[12],BalanceWeight[13],BalanceBlocker[14],BalanceDisabled[15],Weight[16]
|
||||
ACT_TOPUP,*topup_reset,,,balance_sms,*sms,,,,,*unlimited,,1000000,,,,`,
|
||||
utils.ChargersCsv: `#Tenant,ID,FilterIDs,ActivationInterval,RunID,AttributeIDs,Weight
|
||||
cgrates.org,DEFAULT,,,*default,*none,0`,
|
||||
},
|
||||
DBCfg: dbCfg,
|
||||
}
|
||||
client, cfg := ng.Run(b)
|
||||
|
||||
time.Sleep(10 * time.Millisecond) // wait for DiameterAgent service to start
|
||||
diamClient, err := NewDiameterClient(cfg.DiameterAgentCfg().Listen, "localhost",
|
||||
cfg.DiameterAgentCfg().OriginRealm, cfg.DiameterAgentCfg().VendorID,
|
||||
cfg.DiameterAgentCfg().ProductName, utils.DiameterFirmwareRevision,
|
||||
cfg.DiameterAgentCfg().DictionariesPath, cfg.DiameterAgentCfg().ListenNet)
|
||||
if err != nil {
|
||||
b.Fatal(err)
|
||||
}
|
||||
|
||||
var mu sync.Mutex // to ensure sessionID is unique
|
||||
var sent int64
|
||||
var answered, completed atomic.Int64
|
||||
sendCCR := func(t testing.TB, replyTimeout time.Duration, wantResultCode string) {
|
||||
mu.Lock()
|
||||
sent++
|
||||
sessionID := fmt.Sprintf("session%d", sent)
|
||||
mu.Unlock()
|
||||
ccr := diam.NewRequest(diam.CreditControl, 4, nil)
|
||||
ccr.NewAVP(avp.SessionID, avp.Mbit, 0, datatype.UTF8String(sessionID))
|
||||
ccr.NewAVP(avp.OriginHost, avp.Mbit, 0, datatype.DiameterIdentity("CGR-DA"))
|
||||
ccr.NewAVP(avp.OriginRealm, avp.Mbit, 0, datatype.DiameterIdentity("cgrates.org"))
|
||||
ccr.NewAVP(avp.AuthApplicationID, avp.Mbit, 0, datatype.Unsigned32(4))
|
||||
ccr.NewAVP(avp.ServiceContextID, avp.Mbit, 0, datatype.UTF8String("message@DiamItCCRSMS"))
|
||||
ccr.NewAVP(avp.CCRequestType, avp.Mbit, 0, datatype.Enumerated(4))
|
||||
ccr.NewAVP(avp.CCRequestNumber, avp.Mbit, 0, datatype.Unsigned32(0))
|
||||
ccr.NewAVP(avp.EventTimestamp, avp.Mbit, 0, datatype.Time(time.Date(2018, 10, 5, 11, 43, 10, 0, time.UTC)))
|
||||
ccr.NewAVP(avp.SubscriptionID, avp.Mbit, 0, &diam.GroupedAVP{
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(avp.SubscriptionIDType, avp.Mbit, 0, datatype.Enumerated(0)),
|
||||
diam.NewAVP(avp.SubscriptionIDData, avp.Mbit, 0, datatype.UTF8String("1001")), // Subscription-Id-Data
|
||||
}})
|
||||
ccr.NewAVP(avp.SubscriptionID, avp.Mbit, 0, &diam.GroupedAVP{
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(avp.SubscriptionIDType, avp.Mbit, 0, datatype.Enumerated(1)),
|
||||
diam.NewAVP(avp.SubscriptionIDData, avp.Mbit, 0, datatype.UTF8String("104502200011")), // Subscription-Id-Data
|
||||
}})
|
||||
ccr.NewAVP(avp.ServiceIdentifier, avp.Mbit, 0, datatype.Unsigned32(0))
|
||||
ccr.NewAVP(avp.RequestedAction, avp.Mbit, 0, datatype.Enumerated(0))
|
||||
ccr.NewAVP(avp.RequestedServiceUnit, avp.Mbit, 0, &diam.GroupedAVP{
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(avp.CCTime, avp.Mbit, 0, datatype.Unsigned32(1))}})
|
||||
ccr.NewAVP(873, avp.Mbit, 10415, &diam.GroupedAVP{ //
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(20300, avp.Mbit, 2011, &diam.GroupedAVP{ // IN-Information
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(20302, avp.Mbit, 2011, datatype.UTF8String("22509")), // Calling-Vlr-Number
|
||||
diam.NewAVP(20385, avp.Mbit, 2011, datatype.UTF8String("4002")), // Called-Party-NP
|
||||
},
|
||||
}),
|
||||
diam.NewAVP(2000, avp.Mbit, 10415, &diam.GroupedAVP{ // SMS-Information
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(886, avp.Mbit, 10415, &diam.GroupedAVP{ // Originator-Address
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(899, avp.Mbit, 10415, datatype.Enumerated(1)), // Address-Type
|
||||
diam.NewAVP(897, avp.Mbit, 10415, datatype.UTF8String("1001")), // Address-Data
|
||||
}}),
|
||||
diam.NewAVP(1201, avp.Mbit, 10415, &diam.GroupedAVP{ // Recipient-Address
|
||||
AVP: []*diam.AVP{
|
||||
diam.NewAVP(899, avp.Mbit, 10415, datatype.Enumerated(1)), // Address-Type
|
||||
diam.NewAVP(897, avp.Mbit, 10415, datatype.UTF8String("1003")), // Address-Data
|
||||
}}),
|
||||
},
|
||||
}),
|
||||
}})
|
||||
|
||||
if err := diamClient.SendMessage(ccr); err != nil {
|
||||
t.Errorf("failed to send diameter message: %v", err)
|
||||
return
|
||||
}
|
||||
|
||||
reply := diamClient.ReceivedMessage(replyTimeout)
|
||||
if reply == nil {
|
||||
t.Error("received empty reply")
|
||||
return
|
||||
}
|
||||
answered.Add(1)
|
||||
|
||||
avps, err := reply.FindAVPsWithPath([]any{"Result-Code"}, dict.UndefinedVendorID)
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
return
|
||||
}
|
||||
if len(avps) == 0 {
|
||||
t.Error("missing AVPs in reply")
|
||||
return
|
||||
}
|
||||
|
||||
resultCode, err := diamAVPAsString(avps[0])
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
return
|
||||
}
|
||||
if resultCode != wantResultCode {
|
||||
t.Errorf("Result-Code=%s, want %s", resultCode, wantResultCode)
|
||||
return
|
||||
}
|
||||
completed.Add(1)
|
||||
}
|
||||
|
||||
// actual benchmark
|
||||
b.SetParallelism(*parallelism)
|
||||
b.ResetTimer()
|
||||
b.RunParallel(func(pb *testing.PB) {
|
||||
for pb.Next() {
|
||||
sendCCR(b, cfg.CoreSCfg().ShutdownTimeout, "2001")
|
||||
}
|
||||
})
|
||||
|
||||
// check results
|
||||
b.Logf("sent %d, answered %d, completed %d", sent, answered.Load(), completed.Load())
|
||||
var acnt *engine.Account
|
||||
attrsAcnt := &utils.AttrGetAccount{
|
||||
Tenant: "cgrates.org",
|
||||
Account: "1001",
|
||||
}
|
||||
expBalance := float64(1000000 - completed.Load())
|
||||
if err = client.Call(context.Background(), utils.APIerSv2GetAccount, attrsAcnt, &acnt); err != nil {
|
||||
b.Errorf("APIerSv1.GetAccount unexpected err: %v", err)
|
||||
} else if rply := acnt.BalanceMap[utils.MetaSMS].GetTotalValue(); rply != expBalance {
|
||||
b.Errorf("APIerSv1.GetAccount: sms_balance: %f, want: %f", rply, expBalance)
|
||||
}
|
||||
}
|
||||
130
data/conf/samples/diambench/cgrates.json
Normal file
130
data/conf/samples/diambench/cgrates.json
Normal file
@@ -0,0 +1,130 @@
|
||||
{
|
||||
"general": {
|
||||
"log_level": 7
|
||||
},
|
||||
"schedulers": {
|
||||
"enabled": true,
|
||||
"cdrs_conns": ["*internal"]
|
||||
},
|
||||
"apiers": {
|
||||
"enabled": true,
|
||||
"scheduler_conns": ["*internal"]
|
||||
},
|
||||
"filters": {
|
||||
"apiers_conns": ["*internal"]
|
||||
},
|
||||
"attributes": {
|
||||
"enabled": true,
|
||||
"opts": {
|
||||
"*processRuns": 2
|
||||
}
|
||||
},
|
||||
"sessions": {
|
||||
"enabled": true,
|
||||
"attributes_conns": ["*internal"],
|
||||
"chargers_conns": ["*internal"],
|
||||
"rals_conns": ["*internal"],
|
||||
"cdrs_conns": ["*internal"]
|
||||
},
|
||||
"chargers": {
|
||||
"enabled": true
|
||||
},
|
||||
"rals": {
|
||||
"enabled": true
|
||||
},
|
||||
"cdrs": {
|
||||
"enabled": true,
|
||||
"attributes_conns": ["*internal"],
|
||||
"chargers_conns": ["*internal"],
|
||||
"rals_conns": ["*internal"]
|
||||
},
|
||||
"diameter_agent": {
|
||||
"enabled": true,
|
||||
"listen": "0.0.0.0:3868",
|
||||
"sessions_conns": ["*birpc_internal"],
|
||||
"request_processors": [{
|
||||
"id": "message",
|
||||
"filters": [
|
||||
"*string:~*vars.*cmd:CCR",
|
||||
"*prefix:~*req.Service-Context-Id:message",
|
||||
"*string:~*req.CC-Request-Type:4"
|
||||
],
|
||||
"flags": ["*message", "*accounts", "*cdrs", "*attributes"],
|
||||
"request_fields": [{
|
||||
"tag": "ToR",
|
||||
"path": "*cgreq.ToR",
|
||||
"type": "*constant",
|
||||
"value": "*sms"
|
||||
},
|
||||
{
|
||||
"tag": "OriginID",
|
||||
"path": "*cgreq.OriginID",
|
||||
"type": "*variable",
|
||||
"value": "~*req.Session-Id",
|
||||
"mandatory": true
|
||||
},
|
||||
{
|
||||
"tag": "Category",
|
||||
"path": "*cgreq.Category",
|
||||
"type": "*constant",
|
||||
"value": "sms"
|
||||
},
|
||||
{
|
||||
"tag": "RequestType",
|
||||
"path": "*cgreq.RequestType",
|
||||
"type": "*constant",
|
||||
"value": "*prepaid"
|
||||
},
|
||||
{
|
||||
"tag": "Account",
|
||||
"path": "*cgreq.Account",
|
||||
"type": "*variable",
|
||||
"mandatory": true,
|
||||
"value": "~*req.Subscription-Id.Subscription-Id-Data[~Subscription-Id-Type(0)]"
|
||||
},
|
||||
{
|
||||
"tag": "Destination",
|
||||
"path": "*cgreq.Destination",
|
||||
"type": "*variable",
|
||||
"mandatory": true,
|
||||
"value": "~*req.Service-Information.SMS-Information.Recipient-Address.Address-Data"
|
||||
},
|
||||
{
|
||||
"tag": "SetupTime",
|
||||
"path": "*cgreq.SetupTime",
|
||||
"type": "*variable",
|
||||
"value": "~*req.Event-Timestamp",
|
||||
"mandatory": true
|
||||
},
|
||||
{
|
||||
"tag": "AnswerTime",
|
||||
"path": "*cgreq.AnswerTime",
|
||||
"type": "*variable",
|
||||
"value": "~*req.Event-Timestamp",
|
||||
"mandatory": true
|
||||
},
|
||||
{
|
||||
"tag": "Usage",
|
||||
"path": "*cgreq.Usage",
|
||||
"type": "*variable",
|
||||
"value": "~*req.Requested-Service-Unit.CC-Time",
|
||||
"mandatory": true
|
||||
}
|
||||
],
|
||||
"reply_fields": [{
|
||||
"tag": "CCATemplate",
|
||||
"type": "*template",
|
||||
"value": "*cca"
|
||||
},
|
||||
{
|
||||
"tag": "ResultCode",
|
||||
"path": "*rep.Result-Code",
|
||||
"filters": ["*notempty:~*cgrep.Error:"],
|
||||
"type": "*constant",
|
||||
"value": "5030",
|
||||
"blocker": true
|
||||
}
|
||||
]
|
||||
}]
|
||||
}
|
||||
}
|
||||
@@ -622,4 +622,10 @@ var (
|
||||
Password: utils.StringPointer(""),
|
||||
},
|
||||
}
|
||||
PostgresDBCfg = DBCfg{
|
||||
StorDB: &DBParams{
|
||||
Type: utils.StringPointer(utils.MetaPostgres),
|
||||
Port: utils.IntPointer(5432),
|
||||
},
|
||||
}
|
||||
)
|
||||
|
||||
@@ -58,7 +58,7 @@ func TestNatsConcurrentReaders(t *testing.T) {
|
||||
|
||||
ng := engine.TestEngine{
|
||||
ConfigPath: filepath.Join(*utils.DataDir, "conf/samples/ers_nats"),
|
||||
PreStartHook: func(t *testing.T, c *config.CGRConfig) {
|
||||
PreStartHook: func(t testing.TB, c *config.CGRConfig) {
|
||||
nc := connectToNATSServer(t, "nats://127.0.0.1:4222")
|
||||
|
||||
// Initialize a stream manager and create a stream.
|
||||
@@ -276,7 +276,7 @@ resolver_preload: {
|
||||
|
||||
ng := engine.TestEngine{
|
||||
ConfigJSON: fmt.Sprintf(natsCfg, tc.sourcePath, tc.readerOpts),
|
||||
PreStartHook: func(t *testing.T, c *config.CGRConfig) {
|
||||
PreStartHook: func(t testing.TB, c *config.CGRConfig) {
|
||||
rdrOpts := c.ERsCfg().ReaderCfg("nats_reader").Opts.NATS
|
||||
nop, err := GetNatsOpts(rdrOpts, c.GeneralCfg().NodeID, time.Second)
|
||||
if err != nil {
|
||||
@@ -421,7 +421,7 @@ resolver_preload: {
|
||||
|
||||
ng := engine.TestEngine{
|
||||
ConfigJSON: fmt.Sprintf(natsCfg, tc.sourcePath, tc.readerOpts),
|
||||
PreStartHook: func(t *testing.T, c *config.CGRConfig) {
|
||||
PreStartHook: func(t testing.TB, c *config.CGRConfig) {
|
||||
rdrOpts := c.ERsCfg().ReaderCfg("nats_reader").Opts.NATS
|
||||
nop, err := GetNatsOpts(rdrOpts, c.GeneralCfg().NodeID, time.Second)
|
||||
if err != nil {
|
||||
@@ -461,7 +461,7 @@ resolver_preload: {
|
||||
}
|
||||
}
|
||||
|
||||
func connectToNATSServer(t *testing.T, url string, opts ...nats.Option) *nats.Conn {
|
||||
func connectToNATSServer(t testing.TB, url string, opts ...nats.Option) *nats.Conn {
|
||||
t.Helper()
|
||||
deadline := time.Now().Add(500 * time.Millisecond)
|
||||
time.Sleep(5 * time.Millisecond) // takes around 5ms for the server to be available
|
||||
|
||||
Reference in New Issue
Block a user