🔄 Parameterization
Just like the Postman, Ddosify supports parameterization (dynamic variables) on URL, headers, payload (body) and basic authentication. Actually, we support all the random methods Postman supports. If you use {{$randomVariable}}
on Postman you can use it as {{_randomVariable}}
on Ddosify. Just change $
to _
and you will be fine. To simulate a realistic load test on your system, Ddosify can send every request with dynamic variables.
The full list of dynamic variables can be found in the documentation.
Parameterization on URL
Ddosify sends 100 GET requests in 10 seconds with random string key
parameter. This approach can be also used in cache bypass.
ddosify -t https://getanteon.com/?key={{_randomString}} -d 10 -n 100
Parameterization on Headers
Ddosify sends 100 GET requests in 10 seconds with random Transaction-Type
and Country
headers.
ddosify -t https://getanteon.com -d 10 -n 100 -h 'Transaction-Type: {{_randomTransactionType}}' -h 'Country: {{_randomCountry}}'
Parameterization on Payload (Body)
Ddosify sends 100 GET requests in 10 seconds with random latitude
and longitude
values in body.
ddosify -t https://getanteon.com -d 10 -n 100 -b '{"latitude": "{{_randomLatitude}}", "longitude": "{{_randomLongitude}}"}'
Parameterization on Basic Authentication
Ddosify sends 100 GET requests in 10 seconds with random username
and password
with basic authentication.
ddosify -t https://getanteon.com -d 10 -n 100 -a '{{_randomUserName}}:{{_randomPassword}}'
Parameterization on Config File
Dynamic variables can be used on config file as well. Ddosify sends 100 GET requests in 10 seconds with random string key
parameter in URL and random User-Key
header.
ddosify -config ddosify_config_dynamic.json
{
"iteration_count": 100,
"load_type": "linear",
"duration": 10,
"steps": [
{
"id": 1,
"url": "https://getanteon.com/?key={{_randomString}}",
"method": "POST",
"headers": {
"User-Key": "{{_randomInt}}"
}
}
]
}
Environment Variables
In addition, you can also use operating system environment variables. To access these variables, simply add the $
prefix followed by the variable name wrapped in double curly braces. The syntax for this is {{$OS_ENV_VARIABLE}}
within the config file.
For instance, to use the USER
environment variable from your operating system, simply input {{$USER}}
. You can use operating system environment variables in URL
, Headers
, Body (Payload)
, and Basic Authentication
.
Here is an example of using operating system environment variables in the config file. TARGET_SITE
operating system environment variable is used in URL
and USER
environment variable is used in Headers
.
export TARGET_SITE="https://getanteon.com"
ddosify -config ddosify_config_os_env.json
{
"iteration_count": 100,
"load_type": "linear",
"duration": 10,
"steps": [
{
"id": 1,
"url": "{{$TARGET_SITE}}",
"method": "POST",
"headers": {
"os-env-user": "{{$USER}}"
}
}
]
}