HTTP Action Servers

The server page lets you configure, in one place, the hostname of the application tested. In the Virtual User tree, you can then affect a server to each HTTP Request.

To open the servers page, simply click on the Configuration > Servers button in the Virtual User page.

Server List

The left part of the page lists all the servers for the current project. Servers are common to all the VUs of a project. You can use the headers of this list to filter or sort it.

The right part displays the selected server configuration. It is only editable if a server is selected.

Update Server

The following procedure explains how to change a server configuration:

  1. Click on the server to update in the servers list,
  2. Edit the input fields on the right (Protocol, host, port and authorization),
  3. Close the server panel by clicking on the Close button positioned at the top right corner.

For each server, you can edit:

Property name Description
Protocol HTTP or HTTPS
Hostname Domain name or IP address associated to the server machine
Port Usually 80 for HTTP protocol and 443 for HTTPS
Connection Timeout Duration to wait for a connection to open.
Response Timeout Duration to wait for a response. Note that this applies to each wait for a response. If the server response is sent in several chunks, the overall elapsed time may be longer than the timeout.

Note

Edited servers are all updated when you close the server modal. But server addition / removal is done immediately.

Authorization

The Authorization table lets you specify one or more user credentials for web pages that are restricted using:

Basic authentication

You see this type of authentication when you use your browser to access a restricted page, and your browser displays a login dialog box. OctoPerf transmits the login information when it encounters this type of page, using the Authorization header.

Column name Description
Base path Secured path of your server. E.g. / if all pages are restricted or /secured if only this sub-path is secured.
Username Username, you can inject a variable using the ${...} syntax, e.g. ${username}
Password Password, you can inject a variable using the ${...} syntax, e.g. ${username}

NT Lan Manager

NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users

In order to use this protocol you need to upload a jaas.conf file using the files manager.

Column name Description
Domain NTLM credentials are based on data obtained during the interactive logon process and consist of a domain name,
Username A user name,
Password And a password.

Kerberos

In order to use this protocol you need to upload a jaas.conf file and a krb5.conf file using the files manager.

Column name Description
Domain Domain name.
Realm Real name.
Username Username, you can inject a variable using the ${...} syntax, e.g. ${username}
Password Password, you can inject a variable using the ${...} syntax, e.g. ${username}

Add Server

The following procedure explains how to add a server configuration:

  1. Click on the Add button,
  2. A new server http://localhost:80 is added to the list and selected,
  3. Edit the input fields on the right (Protocol, host, port and authorization),
  4. Close the server panel by clicking on the Close button positioned at the top right corner.

Remove Server

The following procedure explains how to remove a server configuration:

  1. Click on the server to remove in the servers list,
  2. Click on the Delete button.

Info

You can use SHIFT + click or CTRL + click to select multiple servers and delete them all at once.

Warning

If a server is deleted, all associated HTTP Request Actions are also removed from their Virtual User. As servers are commons to all VUs of a project, server removal and update may affect VUs that you are note currently editing.

The goal of this feature is to easily remove irrelevant HTTP Request Actions from your imported VUs. Indeed when you import HAR/JMX files to create a Virtual User, many external requests may have been recorded. E.g. in the above screenshot, you can see Google Analytics and Facebook servers in the list. And you probably do not want to load test their infrastructure, so it a good habit to remove servers that do not belong to you.