![]() |
| When you run our smoke tests from a console we show the results to the terminal. |
Our system is used by many clients. When we get requests we then turn around and talk to about 20 different back-end systems. Many times we are caught in the middle when there are anomalies found by our clients. When this happens we have to turn to the logs to see if there's a problem with a system we depend on. We also didn't have much visibility when our systems were not acting as they should.
![]() |
| A more boring example of an HTML report we can generate. |
The output is so simple that my wife looked at a screen with a bunch of red and said, "that doesn't look good." I'm not sure if we'll opensource it, there isn't much intellectual property to speak of. We decided to set up the scripts to run in a cron job once an hour and generate an HTML report showing the same type of data.
We set a low bar on the smoke tests, sometimes they use cURL to POST a SOAP request and we just look at the response to see a specific piece of information is present. Sometimes we just use NMAP to convince us that the port is warm on the far end and NMAP at least thinks it's the right type of application. The idea is that these tests should be written in 5 minutes.
We're not sure how these will be used. We hope that folks that support operations (including developers) will see new problems that come up not only as an opportunity to diagnose the matter at hand but to also add another smoke test that will give us a more clear indication of the problem the next time around.
This was an incredibly tactical bit of software that won't win us any design awards but it has already paid off a handful of times. I regret that we didn't put something together like this sooner.



