builtins echo

Large Payload Integrity Check for NLP Pipelines

Scénario de test & Cas d'usage

Business Context

A Customer Support Analytics team processes extremely long chat transcripts for sentiment analysis. They suspect that the CAS server might be truncating input parameters larger than 4KB when passing data between custom actions. The team performs a stress test by sending a massive text string (simulating a long chat history) to the echo action to verify data integrity.
About the Set : builtins

Fundamental CAS server system commands.

Discover all actions of builtins
Data Preparation

Generation of a massive text string variable.

Copied!
1 
2DATA _null_;
3call symputx('long_text', repeat('Lorem ipsum dolor sit amet. ', 500));
4 
5RUN;
6 

Étapes de réalisation

1
Initialize the massive string variable within the CAS session.
Copied!
1PROC CAS;
2 SOURCE huge_text;
3 WARNING: This is a very long text to test the buffer limits of the echo ACTION.
4 ENDSOURCE;
5 huge_string = repeat("TestString_", 2000);
6 RUN;
2
Echo the massive payload to check for truncation.
Copied!
1PROC CAS;
2 huge_string = repeat("TestString_", 2000);
3 BUILTINS.echo / payload=huge_string LENGTH=LENGTH(huge_string);
4 RUN;

Expected Result


The log prints the full length of the string and the string itself without truncation, confirming the server can handle large parameter payloads.