Good afternoon

We have recently implemented SSO for Banner 8 via CAS.  Our LDAP repository
is AD.  We are running one CAS server and are now in the process of load
testing the capability of CAS to match the load volume tested when using
only Banner BEIS authentication.

The tests are set up through WebLOAD.  The tests are designed by setting a
fixed number of virtual users who attempt to log in at the same time.  The
tests start at 100, then 200, 250, 275, and 300.  At 275 simultaneous
attempts to login, the WebLOAD tool receives many Internal 500 errors.

Some on the team assess the situation as an indication that CAS can not
keep up with the load.  Others suspect the tool itself, which must now
contend with browser redirects while simulating a high volume of users.

Which ever the case, I do know that there are no issues in volume
connections to AD.  All LDAP authentication steps are made.

The Socket failure messages take the following form, but not always at the
exact same juncture:

2013-09-05 07:40:39,174 DEBUG
[org.jasig.cas.web.support.SamlArgumentExtractor] - Extractor generated
service for: 
https://<server>.alaska.edu:443/<<https://beisregx.alaska.edu/ssomanager/c/SSB>
target>
2013-09-05 07:40:39,178 ERROR
[org.jasig.cas.web.view.Saml10SuccessResponseView] -
ClientAbortException:  java.net.SocketException: Broken pipe

2013-09-05 07:40:42,235 ERROR
[org.jasig.cas.web.view.Saml10SuccessResponseView] -
ClientAbortException:  java.net.SocketException: Broken pipe

Ellucian, when Atlassian, indicated this error was not fatal, however, our
team is seeking a definite assurance that a single CAS server can manage
such high volumes during peak times when login attempts can exceed 2000 in
the first five minutes.

Is CAS incapable of accepting more than 250 simultaneous login attempts
without failure?  If not, how have teams tested the load so that it met
load requirements?

Linda

PS
 also should mention that our team has not been interested in using tomcat
8443, but instead uses 443.  Personally, I do not see a special advantage
to doing it this way, but there it is.  I am forwarding how our SA suspects
the socket failures are occurring:

*Apache's default timeout is 300 seconds.  Red Hat reduces the connection
timeout for Apache to 60 seconds.  Most users aren't going to wait more
than 10 seconds, anyway.  If tomcat does not respond to Apache before that
timeout, Apache will close the connection and log the timeout expired
messages David mentioned.  When tomcat tries to respond after Apache has
closed the connection it will throw a SocketException with the message
"Broken Pipe".
*
Linda
--
Linda Toth
University of Alaska - Office of Information Technology (OIT) - Identity
and Access Management
910 Yukon Drive, Suite 103
907-450-8320
Fairbanks, Alaska 99775
linda.t...@alaska.edu | www.alaska.edu/oit/

-- 
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to