Yes!
Yes!
We pride ourselves that you can run our software almost anywhere. It can be a server, laptop, docker or VM. The tool is very lightweight, so it can be run on existing hardware or VMs as well, no need to order new server VMs. You do need to install or use any thick-client software (workstation) on your laptops; you use a web browser instead.
Yes!
We focus on providing a tool for in-depth exploratory testing. We simulate common error messages as well as very specialized ones like slow dripping connections that can take down your application (depending on your environment). As far as we know, no other tool can simulate some of the error scenarios we simulate.
Yes!
Do you have an example scenario you would like to test? It would help us understand better how to answer your question. Please, send the details to support@trafficparrot.com.
Have a look at filtering recording.
No, but we work with tools in your existing environment that schedule tests.
Traffic Parrot does not run tests. We integrate with open source solutions like Selenium, Cucumber, JMeter, Postman and similar that do that. They are usually run in Jenkins or Team City, which is the industry standard. Those tools would run on a schedule with no issues. We would need to know more about your environment to understand better what problem you are trying to solve when asking this question. Please, send the details to support@trafficparrot.com.
Have a look at the Capabilities.
Have a look at the extensions.
Have a look at the loading CSV file data.
We listen to our customers wherever possible. Where do you think we should go?
If you would like more details, please email us at support@trafficparrot.com.
We provide many advanced service virtualization features. Have a look at the User guide and Extensions.
Just remember, the general rule is: keep them as simple as possible, whenever possible. For more details read Focus on keeping it simple.
Have a look at the User guide and the Quick start
Have look at the Supported platforms and the Proof of concept guide
We recently had a remote WebEx engagement with a Fortune 300 company where they had tools running tests on-site in 30 minutes.
One of our main differentiators to our competition is we make our tool as easy to use as possible requiring no to minimal amounts of training.
Similar to other commercial offerings. You can find the details on the home page. Please email us for more details support@trafficparrot.com.
Enterprise licensing is based on a particular configuration. We would need to come to a much better understanding of your needs before we could offer a price that would be accurate. Other people who have compared a quote from us with quotes from other commercial offerings have found us to be at least half the price. To get more details, please email support@trafficparrot.com
You need to add your private key to Traffic Parrot JKS, for example:
$ cd trafficparrot-x.y.z/certificates
$ keytool -importkeystore -srckeystore /path/authclient.jks -srcalias authclient -destkeystore trafficparrot-keystore-and-truststore.jks -destalias authclient
$ keytool -keypasswd -alias authclient -keystore trafficparrot-keystore-and-truststore.jks
If running on Windows download and install OpenSSL. You will also need Java 8 JDK (JDK 7 keytool will not work).
You will need the server public key (to verify the server identity) and the client private key (to authenticate on the server). Then you can test the connection with OpenSSL.
Notice: if running on Windows you get messages like “unknown option ¡key” or similar, the copy and paste from this PDF might not have worked. Retype the commands instead of copying and pasting them.
$ openssl s_client -servername localhost -connect localhost:3000 2>errors.txt | openssl x509 -text > server.pem
$ keytool -importkeystore -srckeystore authclient_key.jks -destkeystore authclient_key.p12 -deststoretype pkcs12
Convert p12 to pem:
$ openssl pkcs12 -in authclient_key.p12 -out authclient.key.pem -nocerts -nodes
$ openssl pkcs12 -in authclient_key.p12 -out authclient.crt.pem -clcerts -nokeys
$ openssl s_client -key authclient.key.pem -keyform PEM -cert authclient.crt.pem -certform PEM -CAfile server.pem -connect localhost:3000
GET HTTP/1.1
This documentation is for an old version of Traffic Parrot. There is a more recent Traffic Parrot version available for download at trafficparrot.com