当前位置:网站首页>JMeter correlation technology
JMeter correlation technology
2022-07-04 10:47:00 【dijiaye1】
Association overview
Regular expressions
() The enclosed part is to be extracted .
. Match any string
+ Once or more
? Don't be greedy , Stop after first match found
Regular expression extractor
Parameters - details
Quote name : It's the variable name , Call to use ${name}
Regular expressions :() Brackets indicate the value you want
Templates :$$ Indicates the value obtained by using the regular expression template , There is only one regular general filling 1, namely $1$
Match the Numbers : Match to multiple values and take the number :-1 All ,0 Represents random ,1 Represents the first ,2 Represents the second
The default value : If this doesn't match , Define a default value for him
Case one
In the picture above g0 For combination ,g1 Bit single variable
The second case
The third case , If there are two requests
The fourth situation : The ginseng
As shown in the figure above , Three regular variables , Respectively r_1、r_2、t, Write these three variables into the parameters of the parameter transfer request respectively .
Practical cases
边栏推荐
- Rhcsa operation
- Using SA token to solve websocket handshake authentication
- Dichotomy search (C language)
- Es advanced series - 1 JVM memory allocation
- Common system modules and file operations
- What is an excellent architect in my heart?
- Number of relationship models
- Rhcsa - day 13
- [advantages and disadvantages of outsourcing software development in 2022]
- Occasional pit compiled by idea
猜你喜欢
shell awk
Idea SSH channel configuration
Latex learning insertion number - list of filled dots, bars, numbers
Rhcsa - day 13
C language structure to realize simple address book
Hidden C2 tunnel -- use of icmpsh of ICMP
Development guidance document of CMDB
Four characteristics and isolation levels of database transactions
Debug:==42==ERROR: AddressSanitizer: heap-buffer-overflow on address
[Galaxy Kirin V10] [desktop] FTP common scene setup
随机推荐
MPLS: multi protocol label switching
Day06 list job
OSPF comprehensive experiment
The bamboo shadow sweeps the steps, the dust does not move, and the moon passes through the marsh without trace -- in-depth understanding of the pointer
[Galaxy Kirin V10] [server] grub default password
[Galaxy Kirin V10] [server] failed to start the network
/*Write a loop to output the elements of the list container in reverse order*/
Remove linked list elements
Introduction to extensible system architecture
Write a thread pool by hand, and take you to learn the implementation principle of ThreadPoolExecutor thread pool
Deepmind proposed a Zuan AI, which specially outputs network attack language
Const's constant member function after the function; Form, characteristics and use of inline function
Write a program to define an array with 10 int elements, and take its position in the array as the initial value of each element.
Linked list operation can never change without its roots
IPv6 comprehensive experiment
VI text editor and user rights management, group management and time management
Quick sort (C language)
Communication layer of csframework
Fundamentals of database operation
Software sharing: the best PDF document conversion tool and PDF Suite Enterprise version sharing | with sharing