Skip to content

Commit

Permalink
Merge pull request #157 from nipunsampath/master
Browse files Browse the repository at this point in the history
Documentation update for APIM Traffic Tool
  • Loading branch information
rmsamitha authored Dec 16, 2019
2 parents d7ccb42 + 7e1e799 commit 913ba45
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions apim-traffic-tool/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ The attack tool will attack WSO2 API Manager throughout a user specified time. A
- Download and add apache ivy jar file (https://ant.apache.org/ivy/download.cgi)
- Add attack tool helper package (can be found from `<TOOL_HOME>/resources/add-on/attack-tool-helpers.jar`)

8. **Download a IP Geolocation Database from https://www.ipinfodb.com/free-database and add it to `<TOOL_HOME>/resources/libraries/` directory. Include name of the added file in `<TOOL_HOME>/config/user-settings.yaml` file infront of `ip_database` under `resources` (include name with the csv file extension).**
8. Download a IP Geolocation Database from https://www.ipinfodb.com/free-database and add it to `<TOOL_HOME>/resources/libraries/` directory. Include name of the added file in `<TOOL_HOME>/config/user-settings.yaml` file in front of `ip_database` under `resources` (include name with the csv file extension). Make sure the column order of the database schema matches with the column order in `user-settings.yaml` file.
> Above link contains two types of datasets "Free IP Geolocation Databases" and "Free IP Proxy Databases". Please download a IP Geolocation dataset.
9. By default, access tokens get expired after 60 minutes time interval. So if you are planning to simulate a traffic for more than 1 hour duration, please configure WSO2 API Manager and APIM Traffic Tool as below.
Expand Down Expand Up @@ -259,7 +259,7 @@ Scenario is involved with following 6 different APIs and 3 different application

100 users are distributed among those applications according to the following table and invoking happens as stated in the 5th column.

![APIM Example Scenario](/resources/images/APIM_scenario.png)
![APIM Example Scenario](resources/images/APIM_scenario.png)

## Attack Simulation for the Example Scenario

Expand Down

0 comments on commit 913ba45

Please sign in to comment.