10 Miscellaneous - qTest Manager on Linux (non-Docker)

Start qTest Manager instance

Start qTest Manager as an OS service

Shutdown qTest Manager

Change qTest Manager server's configurations

Check network ports

Allow network ports to be connected through firewall - For CentOS

Allow network ports to be connected through firewall - For Ubuntu

Start qTest Manager Instance

  1. Make sure qTest Manager has been properly installed on your server
  2. Access to qTest Manager's installation directory
  3. Execute qtest_start.sh
    ./qtest_start.sh
    		

Start qTest Manager as an OS service

This will let qTest Manager automatically starts up after your server is rebooted

  1. Access to qTest Manager's installation directory
  2. Execute config_qtest_as_service.sh
    ./config_qtest_as_service.sh
    		

Shutdown qTest Manager

  1. Make sure qTest Manager has been properly installed on your server
  2. Access to qTest Manager's installation directory
  3. Execute qtest_shutdown.sh
    ./qtest_shutdown.sh 
    		

Change qTest Manager server's configurations

  1. Access to qTest Manager's installation directory
  2. Shut it down
    ./qtest_shutdown.sh 
    		
  3. Open and modify the configurations in file qtest_env.sh as instructed in the installation guide
  4. Execute qtest_update_properties.sh to apply the changes
    ./qtest_update_properties.sh 
    		

Check network ports

You can check for which ports are being used by the following command

# netstat -npult

Allow network ports to be connected through firewall - For CentOS

  1. Add a new rule for the port in iptables
    # iptables -I INPUT -p tcp --dport [PORT] --syn -j ACCEPT
    # service iptables save	//save iptables
    # service iptables restart	// restart iptables
    		
  2. List out rules in iptables to verify if the port is allowed to be connected through firewall
    # iptables -L -n
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3306 flags:0x17/0x02
    ACCEPT tcp -- 0.0.0.0/0 202.54.1.20 tcp spts:1024:65535 dpt:5432 state NEW,ESTABLISHED
    ACCEPT tcp -- 0.0.0.0/0 192.168.74.67 tcp spts:1024:65535 dpt:5432 state NEW,ESTABLISHED
    
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    ACCEPT tcp -- 202.54.1.20 0.0.0.0/0 tcp spt:5432 dpts:1024:65535 state ESTABLISHED
    ACCEPT tcp -- 192.168.74.67 0.0.0.0/0 tcp spt:5432 dpts:1024:65535 state ESTABLISHED
    		

Allow network ports to be connected through firewall - For Ubuntu

  1. List out current rules in iptables to verify if your port is enabled
    # ufw status
    Status: active
    To Action From
    -- ------ ----
    3443/tcp ALLOW Anywhere
    3443/tcp ALLOW Anywhere (v6)
    		
  2. If the port is currently not allowed, add it by the following command
    # ufw allow [PORT]
    		
  3. List out rules in iptables again to verify the port is allowed to be connected through firewall
    # ufw status
    Status: active
    
    To Action From
    -- ------ ----
    3306/tcp ALLOW Anywhere
    3443/tcp ALLOW Anywhere
    3306/tcp ALLOW Anywhere (v6)
    3443/tcp ALLOW Anywhere (v6)