This blog post is in series of 100 Days of Skilled Testing. I see, I do not have to pick every questions asked in this series. I pick and share to which I see, I can add value.
The twelfth question from the season two of 100 Days of Skilled Testing, is:
What strategies do you use to simulate realistic user behavior and traffic patterns when conducting performance tests?
The Question and the Gap
I see the below are missing in the above asked question:
- What aspect of performance is under evaluation?
- What is the system that is being evaluated for a performance's aspect?
- What part of the system is being evaluated for a performance's aspect?
- Queuing? Messaging? Database I/O? Memory? Space? CPU? Client Performance? Functional Module?
- Who are the users? What are their personas?
- How and where the users are accessing the system?
- What is the context of users accessing this system?
- What is the geo location of users who are accessing this system?
- How long these users are connected by accessing this system?
- Are there any differences among these users in their roles and privileges in accessing this system?
- Can the user access system through multiple interfaces?
- Are you assuming the user is on web browser and mobile apps to access this system?
- Is this system you are referring to, is a software system? Or any other system that is controlled environment like - access door, elevators, etc. ?
- You are asking to simulate the user behavior and traffic pattern. Should I assume, I and you know or agree to any volume of user? And, all these users are here for the same purpose when accessing the system?
- Are you considering any time or at a particular time when talking about the traffic pattern?
- Are there any unrealistic users who is accessing your system? You say 'realistic user'.
- Do you see that bots and non-human are also allowed as a user in your traffic?
- Have you evaluated this earlier in your system?
- If yes, do you have the history and data for user behavior and traffic pattern?
- If you don't have, do you allow to use or have your competitor's user behavior and traffic pattern data?
- What is the tech stack of your system?
- What part of your tech stack, you want to evaluate with this user behavior and traffic pattern?
- What is the architecture of your system?
- What part of your system and its architecture is being evaluated with this user behavior and traffic pattern?
- Are you running this exercise for the first time? If not, where I can refer to previous exercises?
- How the interaction and events are handled from its start to completion?
- What all are needed to complete the transaction in work flow?
- How this transaction can go invalid for lack or incorrect data, state and action?
- What is spike, drop, saturation, expected, unexpected, and average numbers in the traffic coming in?
- What do you understand by traffic? Do you mean number of requests coming in?
- Do you mean the being committed I/O operations?
- Do you mean the response received at the other end?
- What is the definition of 'traffic' in this context?
- What is that you want to study and evaluate by the User Behavior and Traffic Pattern information gathered in this context?