ALM Octane: Installation Guide For Linux
ALM Octane: Installation Guide For Linux
Octane
Software Version: 16.0.100
Document Release Date: October 12, 2021 | Software Release Date: September 2021
Legal Notices
Disclaimer
Certain versions of software and/or documents (“Material”) accessible here may contain branding from Hewlett-Packard Company (now
HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately
owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP
and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional
warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein
is subject to change without notice.
Copyright Notice
© Copyright 2016-2021 Micro Focus or one of its affiliates.
Contents
ALM Octane 1
Architecture 6
Basic configuration 6
Enterprise configuration 7
Components 8
Installation types 11
Licensing flow 12
Overview 12
Request a trial 12
Using Pro Edition 12
Installing a license 13
Installation flow 14
Prerequisites 14
Deploy 14
Configure 15
Start the server 15
Log in 15
Configure cluster (optional) 15
Prerequisites 19
Checklist 19
File system permissions 23
Oracle database permissions 23
SQL database permissions 24
Configure Elasticsearch 27
Installation 30
Deploy ALM Octane 31
Overview 31
Prerequisites 31
Deploy 31
Deploy in cluster environment 33
Configure site settings 34
Workflow 35
Database server settings 36
Oracle server settings 39
SQL server settings 40
Site actions 40
Space settings 41
Elasticsearch settings 41
Site admin credentials 42
Cluster settings 43
Heap size 43
Proxy settings (optional) 43
Public URL and Server Ports 44
License settings 46
Authentication Type 46
LDAP authentication settings (optional) 46
SSO authentication settings (optional) 50
Configuration tips 54
Start the ALM Octane server 54
Management 57
Start the ALM Octane server manually 58
Handle database-related issues 58
Change site schema settings and reinitialize 58
Update database password in ALM Octane site schema and configuration files 59
Configure trust on the ALM Octane server 61
Configure trust 61
Advanced ALM Octane server configuration 62
Redirect http to https 62
Configure number of allowed open files (Linux) 63
Configure secure database access 64
Configure SSL offloading 65
Dedicate a cluster node for background jobs – 12.60 CP8 and later 67
Using exception files for manual database changes 68
Overview 68
Define exception files 68
Set up use of the exception file 70
Troubleshooting 72
Checking logs 76
Log files 76
Uninstall 77
Send Us Feedback 79
Architecture
You can set up ALM Octane as a single node, or in a cluster configuration. The following diagrams
illustrate the system architecture for both options.
These are followed by descriptions of each of the components.
l "Basic configuration" below
l "Enterprise configuration" on the next page
l "Components" on page 8
Basic configuration
The following diagram illustrates the system architecture of a single-node configuration. Components
in grey are Micro Focus products.
Note: The ALM Octane, database, and Elasticsearch servers should each reside on separate
machines.
Enterprise configuration
The following diagram illustrates the system architecture of an enterprise, cluster configuration.
Components in grey are Micro Focus products.
Components
Components Description
ALM Octane clients The clients communicate with the ALM Octane server over HTTP/S.
ALM Octane Server application Client requests from ALM Octane are dispatched to the deployed application.
nodes
Note: The ALM Octane, database, and Elasticsearch servers should each
reside on separate machines.
ALM Octane application Cluster configuration: A cluster is a group of application servers that run as a single
additional cluster (sync) nodes system. Each application server in a cluster is referred to as a "node."
l All nodes must have access to the database server on which the site database
schema resides.
l All nodes must have access to the repository.
Generally, the repository will be located on an NFS or SAN server.
If the repository is not located on a remote, dedicated machine, the repository
location cannot be /opt/octane.
l All nodes must have access to each other.
Synchronizer service nodes The service nodes handle synchronization between ALM Octane and ALM or Jira.
Repository / File system Stores all files to be used by all the projects in the system, such as templates and
attachments.
Database server A relational database management system, either Oracle RAC or Microsoft SQL Server.
l Site schema. Stores all site-related information, such as database servers, cluster
nodes, the SMTP servers, and configuration.
l Space schema. All space information, such as workspaces, users, and roles.
This server can be shared with other applications with the following constraints:
l The database must be able to sustain the load of all the applications.
l Future versions of ALM Octane might require a database upgrade. This may
necessitate migration of data if other applications sharing the same database will not
support the database version that ALM Octane requires.
Note: The ALM Octane, database, and Elasticsearch servers should each
reside on separate machines.
Components Description
Elasticsearch server (or cluster) A Java-based, open-source search engine. This component is used for various aspects of
the application, such as global search and trends.
This server can be shared with other applications with the following constraints:
l The Elasticsearch engine must be able to sustain the load of all the applications.
l Future versions of ALM Octane might require an Elasticsearch upgrade. This may
necessitate migration of data if other applications sharing the same Elasticsearch will
not support the Elasticsearch version that ALM Octane requires.
Note: The ALM Octane, database, and Elasticsearch servers should each
reside on separate machines.
A working Elasticsearch server is a requirement for working with ALM Octane. Make
sure you are using a version supported by ALM Octane:
For the supported version, see Database and Elasticsearch in the ALM Octane Help
Center.
Load balancer Cluster configuration: When working with a load balancer, client requests are
transmitted to the load balancer and distributed according to server availability within
the cluster.
If you are using a load balancer, we recommend you utilize SSL offloading.
High availability load balancers Cluster configuration: These can be "VIPs" (virtual IP addresses) of one physical
load balancer.
High availability reverse proxies Cluster configuration: Optional configuration for load balancing using a software
and SSL offloading solution (for example, NGINX).
Jenkins (with ALM Octane Enterprise configuration: You can integrate ALM Octane with a Jenkins CI server
plugin) using the Application Automation Tools Plugin on your CI server.
TFS, TeamCity, or Bamboo Enterprise configuration: You can integrate ALM Octane with a TFS, TeamCity, or
server (with ALM Octane plugin) Bamboo CI server using the ALM Octane CI Plugin on your CI server.
Slack Integration with Slack, which enables all stakeholders of a backlog item to collaborate
and communicate. You can integrate with Slack by adding it as a collaboration tool
associating it with a workspace.
Micro Focus testing tools: UFT You can integrate ALM Octane with Micro Focus testing tools. For details, see ALM
Developer, UFT One, Octane DevOps integrations in the ALM Octane Help Center.
LoadRunner Professional,
LoadRunner Cloud, LoadRunner
Enterprise
See also:
l "Installation types" on the next page
l "Installation flow" on page 14
l "Prerequisites" on page 19
l "Installation" on page 30
l "Deploy ALM Octane" on page 31
Installation types
This topic describes the necessary requirements and procedures for the installation of ALM Octane
server, and initial setup steps.
Type Description
See also:
l "Prerequisites" on page 19
l "Deploy ALM Octane" on page 31
l "Configure site settings" on page 34
Licensing flow
This topic provides a high-level flow for setting up your trial license.
In this topic:
l "Overview" below
l "Request a trial" below
l "Using Pro Edition" below
l "Installing a license" on the next page
Overview
To get started with ALM Octane, you begin with a 90-day on-premises free trial for 100 users. You
can then install an ALM Octane license file, or allocate licenses from ALM or Quality Center.
Before you begin a trial, you should be familiar with the different editions of ALM Octane. ALM
Octane is available in Enterprise and Pro Editions. For details, see ALM Octane editions in the ALM
Octane Help Center.
Request a trial
Submit a request for a free trial here: https://software.microfocus.com/en-us/products/alm-
octane/free-trial.
When you first start using ALM Octane, you automatically receive a Trial license which gives you a
90-day trial for 100 users.
By default, your trial is Enterprise Edition, which allows one shared space. If you create a shared space
in an Enterprise Edition trial and then install a license for Pro Edition, the sharing capabilities are no
longer supported.
Installing a license
After you install and configure your trial instance of ALM Octane, you can purchase licenses for
Enterprise or Pro Edition. You then install your license key (.dat file) in ALM Octane.
Alternatively, you can allocate your current licenses from ALM or Quality Center and share them with
ALM Octane. Licenses can be allocated from ALM (ALM.Net) Edition to ALM Octane Enterprise
Edition, or from Quality Center (QC) Enterprise Edition to ALM Octane Pro Edition.
Note: You can share up to 15% of your licenses from ALM or Quality Center, or up to 150
licenses, the lower of the two.
To learn more, see Manage licenses (on-premises) in the ALM Octane Help Center.
Next steps:
l "Installation flow" on the next page
Installation flow
This document describes the overall flow for installing the ALM Octane server on Linux.
In this topic:
l "Prerequisites " below
l "Deploy " below
l "Configure " on the next page
l "Start the server" on the next page
l "Log in " on the next page
l "Configure cluster (optional) " on the next page
Prerequisites
Verify your system meets hardware and software requirements.
This includes setting up permissions, opening ports, database configuration, and more.
You need three separate server machines.
l ALM Octane server
l Database server
l Elasticsearch server
For details see "Prerequisites" on page 19, and Best practices in the ALM Octane Help Center.
Note: We recommend you review security considerations in ALM Octane 15.x Secure
Deployment and Configuration Guidelines. This contains instructions on how to set up a
secure configuration for ALM Octane.
Deploy
Deploy ALM Octane on a machine dedicated for the ALM Octane server on Linux.
ALM Octane is deployed using the RPM Package Manager (as an .rpm file).
The deployment path is /opt/octane.
For details see "Deploy ALM Octane" on page 31, and Best practices for deploying ALM Octane in the
ALM Octane Help Center.
Configure
This section describes how to configure.
To configure:
1. Edit the octane.conf file with your site's settings for initial configuration.
2. (Optional) Depending on your needs, configure optional configuration files:
l elasticsearch-security.conf to configure secure Elasticsearch.
Log in
Verify that ALM Octane was properly installed. For details, see "Checking logs" on page 76.
Log into ALM Octane. For details, see "Log in to ALM Octane" on page 56.
Next steps:
l "Prerequisites" on page 19
l "Deploy ALM Octane" on page 31
l "Configure site settings" on page 34
Check Verify that the all cluster nodes, including the first, meet all requirements
requirements and prerequisites. For details, see "Prerequisites" on page 19.
Check All cluster nodes, including the first, must have access to the database
database server on which the site database schema resides.
server access
Check access All nodes must have access to each other. Verify ports are open in your
between nodes firewall.
ALM Octane needs to communicate between the nodes in the cluster on
port 5701. Therefore, make sure that your firewall enables communication
between the nodes of the cluster on the specified port..
By default, outbound ports are open. Check inbound ports.
2. Install ALM Octane on the first cluster node, as described in "Installation" on page 30.
a. Verify that you have created an environment variable OCTANE_REPOSITORY_DIR, as
described above. If this variable is missing, the installation will fail.
b. Deploy the ALM Octane installation files on to the first node.
c. Configure initial site settings in octane.conf and optional configuration files.
o Make sure to set the database server name to a value that all cluster nodes can access.
ALM Octane validates these settings when starting. If they are not valid, the ALM Octane
server does not start.
d. On the first node only, start the ALM Octane server by running systemctl start octane. See
"Start the ALM Octane server" on page 54.
3. (Optional) If you want to set up a secure configuration for ALM Octane, follow the instructions in
ALM Octane Secure Deployment and Configuration Guidelines.
4. Log in to the first node in the cluster. For details, see "Log in to ALM Octane" on page 56.
5. Download and deploy the ALM Octane package on each cluster node. For details, see "Deploy
ALM Octane" on page 31 and "Deploy in cluster environment" on page 33.
Caution:
l Do not configure octane.conf or other configuration files on the nodes.
l Do not run connectnode.sh scripts.
6. On each other node, start ALM Octane by running systemctl start octane.
Each node is automatically configured using the configuration files located in the repository, as
defined when you configured the first node.
7. (Optional) If you want to set up a secure configuration for ALM Octane in a cluster configuration,
follow these instructions on each other node: ALM Octane Secure Deployment and Configuration
Guidelines.
8. Log in to make sure ALM Octane is running on each other node. For details, see "Log in to ALM
Octane" on page 56. Use the load balancer URL when you log in.
Tip: For best performance, configure your load balancer with round-robin (stateless)
configuration.
9. If you need to make changes in configuration settings later, edit the <Repository
folder>/conf\octane.conf file, and not octane.conf.new, which is a temporary file that is for internal
use only. After modifying these settings, restart the ALM Octane server on each node to pull the
configuration changes from the repository.
Troubleshooting:
If the cluster was not properly defined, you may receive an error message when you start the
ALM Octane server:
Cluster is unhealthy...
During installation, values in the hazelcast.xml file change according to the octane.conf configuration.
The configuration of the hazelcast.xml file is the one that controls the cluster behavior.
Therefore, make sure that the octane.conf file is configured exactly the same in all nodes, and the
hazelcast.xml file is identical on all nodes. In addition, make sure that the member element of the
hazelcast.xml file contains the same values that were defined in the nodes section of the octane.conf
file.
Next steps:
l "Prerequisites" on the next page
l "Deploy ALM Octane" on page 31
l "Configure site settings" on page 34
Prerequisites
Verify that your system meets the requirements listed below, and the detailed Support matrix in the
ALM Octane Help Center.
For security requirements, see the ALM Octane Secure Deployment and Configuration Guidelines.
In this topic:
l "Checklist" below
l "File system permissions" on page 23
l "Oracle database permissions" on page 23
l "SQL database permissions" on page 24
l "Configure Elasticsearch" on page 27
Checklist
Use the following questions to make sure you are ready to install.
What is the user name and password you will use for the
installation user?
Did the DBA add any objects to the schemas? If so, create
an exception file before installing. For details, see "Using
exception files for manual database changes" on page 68.
Note: These permissions are for the user you will specify in the admin-user > name setting in
the octane.conf file.
When defining your site action in the octane.conf file, you will specify CREATE_NEW. For
details, see "CREATE_NEW" on page 40.
This power user can also be created temporarily, for installation purposes only. You can remove this
user if:
l The installation is complete, and login to ALM Octane is successful.
l The ALM Octane site admin intends to create spaces using an existing schema, which can be
selected when creating a space in the ALM Octane Settings area for the site. For details, see
Manage the site (on-premises) in the ALM Octane Help Center.
Note: During installation when you define the octane.conf file, you will enter the name of the
site schema in schemas > site, the space schema in schemas > initial-shared-space, and the
password in schema-password.
When defining your site action in the octane.conf file, you will specify FILL_EXISTING. For
details, see "FILL_EXISTING" on page 41.
Note: These permissions are for the user you will specify in the admin-user > name setting in
the octane.conf file.
When defining your site action in the octane.conf file, you will specify CREATE_NEW. For
details, see "CREATE_NEW" on page 40.
It is important that the ALM Octane database administrative user is not the same as the ALM Octane
admin user. The SQL Server database admin could name this power user octane_install_power_user,
for example. For details on removing this temporary power user, see "Handle database-related issues"
on page 58.
Run the previous commands separately for each database (site schema and space schema).
Note: During installation when you define the octane.conf file, you will enter the name of the
site schema in schemas > site, the space schema in schemas > initial-shared-space, and the
password in schema-password.
When defining your site action in the octane.conf file, you will specify FILL_EXISTING. For
details, see "FILL_EXISTING" on page 41.
Configure Elasticsearch
Before installing ALM Octane, there are a number of settings you must configure in Elasticsearch.
15.1.90 7.9.1
Note: Elasticsearch supports indexes that were created in the current Elasticsearch main
version, or one earlier version. Each time ALM Octane extends support for a new Elasticsearch
main version, the ALM Octane upgrade includes a reindex process for the older indexes.
Elasticsearch configuration
Before installing ALM Octane, configure Elasticsearch settings:
1. In the elasticsearch.yml file, configure the following:
l cluster.name. Assign a unique name which will be used when you configure ALM Octane to
connect to the cluster. Note that even a single-server installation is considered a cluster.
l node.name. If you do not assign the node a name, Elasticsearch generates a random name on
every reboot.
l network.host. The node binds to this hostname or IP address and publishes this host to other
nodes in the cluster. You can enter an IP address, hostname, a special value, or an array of any
combination of these. Defaults to _local_.
l action.auto_create_index. In each of your Elasticsearch cluster nodes, you must have the
action.auto_create_index: "-mqm_*,*"
Note: If you already have an action.auto_create_index line in the yml file, add the -mqm_
* phrase to the beginning of its specified value. For example, if you have the following
line:
action.auto_create_index: "-index*,*"
action.auto_create_index: "-mqm_*,-index*,*"
2. You can configure Elasticsearch securely using TLS. For details, see
https://softwaresupport.softwaregrp.com/doc/KM03712315.
3. In the jvm.options file, set the following parameters: -Xms<value>g and -Xmx<value>g.
Define value as half of memory available on the machine – 1, but no more than 31GB.
Note: The cluster nodes should be able to communicate with each other, meaning, the ports
should be open in the firewall.
Restart Elasticsearch
After changing Elasticsearch setting files (for example elasticsearch.yml or jvm.options), you must
restart the Elasticsearch service.
For details on restarting an Elasticsearch cluster, see
https://www.elastic.co/guide/en/elasticsearch/guide/master/_rolling_restarts.html.
Backing up Elasticsearch
For details on backing up Elasticsearch, see
https://www.elastic.co/guide/en/elasticsearch/reference/master/snapshot-restore.html.
We recommend performing ELS snapshot at the same time as database backup and file repository
backup.
ALM Octane does not need to be stopped for this operation.
You can use curl to issue relevant snapshot commands. Also, consider creating a shell script to back
up Elasticsearch data on a regular basis.
Next steps:
l "Deploy ALM Octane" on page 31
Installation
This section describes how to install an on-premises ALM Octane server using Linux.
Before installing:
l Verify that your server fulfills all prerequisites. See Support matrix in the ALM Octane Help Center.
l Review the ALM Octane Secure Deployment and Configuration Guidelines.
Cluster configuration: If you intend to install ALM Octane in a cluster configuration, review the end-to-
end process under "Cluster installation flow" on page 16 before starting.
Language support: On-premises installation of ALM Octane supports only English. This means
only English characters can be specified for the names of schemas, operating systems, users,
and so on.
Overview
Installing the ALM Octane RPM package does the following:
l Creates the correct directory structure.
l Copies all the files to the right locations.
l Creates a user and group for running the ALM Octane service that starts the ALM Octane server.
By default, both the user and group are named octane. However, you can use a pre-defined user
instead by defining the following environment variables: OCTANE_USER and OCTANE_GROUP.
l Installs the octane service so that the operating system recognizes it.
Prerequisites
Before installing:
l Verify that your server fulfills all prerequisites. See Support matrix in the ALM Octane Help Center.
l Review the ALM Octane Secure Deployment and Configuration Guidelines.
Deploy
This section describes how to deploy.
To deploy:
1. Download the ALM Octane RPM package:
https://sld.microfocus.com/mysoftware/download/downloadCenter
Tip: To verify the digital signature of the RPM package, see "Installation Security" in the
ALM Octane Secure Deployment and Configuration Guidelines.
Note: If you install RPM to a different directory, make sure to replace "/opt/octane" with
the relevant path when following these instructions.
/opt/octane ALM Octane installation directory and all its sub-directories and files. Full read, write,
These files are used for configuring the server. and execute
5. If planning to install ALM Octane on additional cluster nodes, perform the steps described under
"Deploy in cluster environment" on the next page.
Workflow
1. Configure basic settings by editing the octane.conf file. In addition, depending on your
environment, configure the optional files described in the following sections.
Configuration files must be readable and editable by the user installing ALM Octane, which is
generally the octane user. If you copy or edit a configuration file as the root or sudoer user that
does not have the necessary installation permissions, the install fails.
2. If you are installing ALM Octane, after editing your configuration files proceed with "Start the
ALM Octane server" on page 54.
3. If you need to make changes in configuration files later, make sure you edit the <Repository
folder>\conf\octane.conf file, and not octane.conf.new, which is a temporary file that is for internal
use only.
After modifying these settings, restart the ALM Octane server on each node to pull the
configuration changes from the repository. For details, see Restart the server in the ALM Octane
Help Center.
For example, you might initially install ALM Octane to use native user management, and at a later
time, decide to implement LDAP authentication for user management instead.
Tip: We recommend that you save a local copy of the octane.conf file before making changes
to it. Also, for security purposes, octane.conf should be stored in a secure, off-site location.
connection-string The Java Database Connectivity (JDBC) database connection string. It includes the
following details: database type, database server name, database server port number,
service name.
Oracle connection-string
The instructions below demonstrate how to set up the string with non-secured database
access. To configure secure access to the database, see "Using SSL/SSO in Oracle
(optional)" on the next page.
jdbc:oracle:thin:@//DB_SERVER_NAME:DB_SERVER_PORT/DB_SERVICE_
NAME
Examples:
l jdbc:oracle:thin:@//dbserver1.net:1521/orcl
l jdbc:oracle:thin:@(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=
(PROTOCOL=TCP)(HOST=dbserver1.net)(PORT=1521)))(CONNECT_
DATA=(SERVICE_NAME=orcl)))
Note:
For the syntax using TNS, see "Using TNS alias names in Oracle" on page 38.
To connect to Oracle RAC, use the Single Client Access Name (SCAN) instead
of the database server name.
SQL connection-string
l Syntax using port:
jdbc:sqlserver://DB_SERVER_NAME:DB_SERVER_PORT
Example:
jdbc:sqlserver://dbserver1:1433
l Syntax using instance:
jdbc:sqlserver://DB_SERVER_NAME;instanceName=INSTANCE_NAME
Example:
jdbc:sqlserver://dbserver1;instanceName=my_instance
Setting Description
admin-user > name ALM Octane uses the admin-user both to create objects during installation and also to
check that the database server is accessible.
Do not include a pound sign (#) or accented characters (such as, ä, ç, ñ).
schemas > The name of the site schema that will be created by the admin-user during the
site installation, or supplied by the organization's DBA. Enter the supplied name.
schemas > This parameter is relevant only for the FILL_EXISTING site action.
initial-shared-space
If you are using FILL_EXISTING, set the initial-shared-space to the name of the
schema that is designated for the space.
Example:
# jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, DH
keySize < 1024, \
EC keySize < 224, 3DES_EDE_CBC, anon, NULL
security.provider.1=sun.security.provider.Sun
security.provider.2=sun.security.rsa.SunRsaSign
security.provider.3=sun.security.ec.SunEC
security.provider.4=oracle.security.pki.OraclePKIProvider
security.provider.5=com.sun.net.ssl.internal.ssl.Provider
security.provider.6=com.sun.crypto.provider.SunJCE
2. Place the Oracle client wallet file in a location on the server into a directory accessible to all, such
as /opt/octane/conf/ewallet.p12. ALM Octane will need Read permissions to this file.
3. Copy the following to octane.conf, after the connection-string parameter:
connection-properties : [
{
"key" : "javax.net.ssl.trustStore",
"value" : "/opt/octane/conf/ewallet.p12"
}
,
{
"key" : "javax.net.ssl.trustStoreType",
"value" : "PKCS12"
}
,
{
"key" : "javax.net.ssl.trustStorePassword",
"value" : "********"
}
]
l trustStorePassword. (For SSL only) Enter the password to use to open the keystore file.
orcl =
(DESCRIPTION =
(ADDRESS = (PROTOCOL = TCP)(HOST = myhost.net)(PORT = 1521))
(CONNECT_DATA =
(SERVER = DEDICATED)
(SERVICE_NAME = orcl)
)
)
connection-properties : [
{
"key" : "oracle.net.tns_admin",
"value" : "/opt/octane/conf/tnsnames.ora"
}
]
4. In connection-properties, define the value with the location of your tnsnames.ora file.
Oracle
settings Description
user- Defines whether the standard Oracle binary sort (NLS_SORT="BINARY_CI") should be overridden for
default- non-Latin language support.
sort
Valid values: yes, no, or blank
Default: blank (yes)
app-user > name MSSQL database login authentication user for ALM Octane. This is the user for day-to-day ALM
Octane use.
This login is associated with the ALM Octane site and space databases.
Note: This should be different from the admin-user > name. However if you are using
FILL_EXISTING, this must be the same as the admin-user name.
authentication- Enter the authentication method used: Windows or DB (SQL Server Authentication).
method
Site actions
The site-action setting determines how the installation should handle databases.
FILL_ Use this site action for new installations, in cases where the database administrator does not give
EXISTING permissions to create a schema (for Oracle) or a database (for SQL Server).
In this case, the organization's DBA must create a new site and space schema/database and users before
installation.
Space settings
initial-space- The mode in which the initial space will be created when the ALM Octane server starts. Valid values
mode are:
l isolated. Workspaces associated with the initial space will not share entities or customization
settings.
l shared. Workspaces associated with the initial space can share entities or customization settings.
Elasticsearch settings
A working Elasticsearch server is a requirement for working with ALM Octane. For details on
Elasticsearch prerequisites, see "Configure Elasticsearch" on page 27.
If running an Elasticsearch cluster, all node host names should be separated by commas, as follows:
["host1","host2","host3"]
http-port Port configured in Elasticsearch for incoming HTTP requests. Default in Elasticsearch is 9200.
1. Make sure you have the following line in your octane.conf file:
include "elasticsearch-security.conf"
2. Set up the elasticsearch-security.conf file as follows:
user l name: The username to use when authenticating against Elasticsearch.
l password: The password of the Elasticsearch user.
key-store l file: The name of the PKCS12 keystore file. The file should be placed in the configuration folder.
l password (optional, encrypted): The password to use to open the keystore file if the store is
password protected.
l keystore type: Certificate files should be in the PKCS12 format and should be put in the
configuration folder.
trust-store l file: The name of the PKCS12 truststore file. The file should be placed in the configuration folder.
l password (optional, encrypted): The password to use to open the truststore file if the store is
password protected.
l keystore type: Certificate files should be in the PKCS12 format and should be put in the
configuration folder.
verification- Determine the level used when verifying the certificate. We recommend using the default setting.
mode
l none: No certificate verification checks are made. This means that any certificate will be accessed and
should only be sued to debug issues.
l certificate: Only checks that the certificate is signed by a trusted CA. Should be used when hosts are
dynamic.
l full: In addition to certificate, also checks that the host name reported by the certificate matches the
host the request is coming from. Should be used whenever possible and is the default.
When using external user authentication, such as LDAP or SSO, this admin should be an existing user in
the external system (LDAP or the IdP, respectively).
site- The site admin's password. The password must be at least 8 characters long, and contain at least one
administrator uppercase letter, one lowercase letter, and one number or symbol.
> password
Do not include a pound sign (#) or accented characters (such as, ä, ç, ñ).
When using external user authentication, such as LDAP or SSO, this password should be defined as a
"dummy" password. It will not be used once ALM Octane is configured for external authentication.
Cluster settings
Here are some settings you must use to establish if you are installing a standalone ALM Octane
server or a cluster configuration. For details on cluster configurations, see "Cluster installation flow" on
page 16.
l For a standalone server, set this value to true and do not enter any host names using the nodes
setting.
l For a cluster configuration, set this value to false. You must enter node host names in the nodes
setting.
nodes Configure the IP addresses or fully qualified domain names for each cluster node.
Enter a comma-separated list of node host names or IPs, in the cluster, for example:
["host1","host2","host3"]
Heap size
heap- Before starting the ALM Octane server the first time, change the heap memory values on all active cluster
size nodes.
For example, you may need to increase the heap size if there is an increase in the number of active workspaces
in ALM Octane, or an increase in the number of concurrent user sessions.
Set heap-size to half of available server memory on a dedicated server, regardless of load.
Default: 4096
include "proxy.conf"
2. Set up the proxy.conf file as follows:
app-url The fully-qualified domain name and port for the ALM Octane server. This is used for SSO configuration,
reverse proxy configuration, SSL offloading configuration, and so on.
This URL is also inserted as a link in emails that ALM Octane sends. Email recipients can click the link to
access the relevant entity directly in ALM Octane.
Note: If you have a URL with a top-level domain (TLD) that is not listed in
https://www.iana.org/domains/root/db (for example http://a.b.corp, where corp is not listed), see
"Troubleshooting non-standard top-level-domains" on the next page.
http-port The value of a Jetty port for HTTP, or a Jetty secure port for HTTPS.
https-port After you install ALM Octane, you may need to change the ALM Octane server port number.
Because the installation uses a non-root user, common ports (below 1024) cannot be used with ALM
Octane.
By default, the installation uses port 8080 for HTTP or port 8443 for HTTPS (SSL).
httpPort: 8080
httpsPort: 8443
Leaving any of these ports empty disables the access using the specified http schema server.
It is possible that the default application server port is used by another application that is running on the
same machine. In this case, you can either locate the application that is using the port and stop it, or you
can change the ALM Octane server port.
allow-http- By default, if you define your app-url as using HTTPS protocol, users cannot access ALM Octane via
requests-if- HTTP.
ssl-enabled
If you need to enable HTTP access (for example for internal tools inside your network), you can set this
parameter to true. This will allow HTTP access to ALM Octane even though your protocol is set to
HTTPS.
java-default- By default, the Java trust store password is changeit. If you changed this password, enter the Java trust
trust-store- store password here. When ALM Octane starts, it encrypts this password.
password
This is useful when ALM Octane server trust is configured.
file Enter the absolute path to the keystore file, or the file name if the keystore is in ALM Octane's
configuration folder.
password Password used to protect the keystore file. When ALM Octane starts, it encrypts this password.
License settings
trial-edition The trial edition is always enterprise. For details, see the information about ALM Octane editions
in the ALM Octane Help Center.
license-mode l If you are using a standalone ALM Octane license, enter standalone. You can then skip the
remaining fields in the License section. Default.
l If you are allocating licenses from ALM to ALM Octane, enter ALM_SHARING. You then need
to fill in the following fields as described below.
For details, see Manage licenses (on-premises) in the ALM Octane Help Center.
url Enter the full path that you use to access ALM. Typically, this includes the suffix qcbin.
integration-user > Enter the user name for accessing ALM. This user was defined in ALM for integration purposes.
name
Authentication Type
Specify whether the ALM Octane installation should use native user management (default), LDAP, or
SSO authentication for user management.
sso. Use SSO authentication. Define SSO settings as described in "SSO authentication settings
(optional) " on page 50.
LDAP in the Settings UI, your settings are automatically validated and updated in the ldap.conf file.
For details, see Configure LDAP in the ALM Octane Help Center.
If you prefer to work directly in the configuration files rather than in the Settings UI:
1. Make sure you have the following line in your octane.conf file:
include "ldap.conf"
2. In the ldap.conf file, configure the LDAP settings as described below.
3. Later, after ALM Octane installation, import users from LDAP into ALM Octane.
Tip: LDAP settings are validated when you start ALM Octane. If there are errors in your LDAP
configuration which prevent the ALM Octane server from starting, have a site admin check the
wrapper, site, and app logs.
General LDAP settings
connection- Connection timeout in seconds. Optional.
timeout
Default: 30 seconds
admin-dn The user that will log on to ALM Octane after initially setting up LDAP authentication. Its purpose is to
make sure that one workable user exists to start configuring LDAP user authentication.
When the ALM Octane server starts, it checks LDAP configuration settings, verifies that this user exists,
and validates this user against the LDAP data. If this attribute is not defined correctly, the server will not
start. Correct the user details and restart the server.
This user can be same user as the user entered in the octane.conf file, or a different user. After entering
the value for this user, and then restarting the ALM Octane server, the admin user entered in the
octane.conf file is overwritten. This becomes the ALM Octane site admin user that can be used to log
into ALM Octane the first time.
Note: If the admin-dn is changed and the server is restarted, both the original admin-dn and the new
admin-dn exist as site admins. Modifying the admin-dn does not remove the original one.
LDAP server settings
Enter the following settings for each LDAP server separately.
Caution: Back up all passwords set below because they are encrypted after the ALM Octane
server is initialized.
servers Header row to delineate that the information below is for each LDAP server. Do not enter a value.
Enter Y or N.
If Y, establish trust to the certificate authority that issued the LDAP server certificate. For details, see
"Configure trust on the server" in the ALM Octane Installation Guide.
base-directories Root of the LDAP path to use to search for users when including new LDAP users in ALM Octane
spaces. This can be a list of common names and domain components (cns and dns), a list of
organizational units (ou), and so on.
Optional. Default: Blank.
Example:
"base-directories" : [
"dc=maxcrc,dc=com",
"ou=Administrative,dc=maxcrc,dc=com"
],
base-filters Filters to use to refine the search for users when including new LDAP users in ALM Octane spaces.
This is generally a semi-colon delimited list of LDAP objectClasses.
Optional. Default: (objectClass=*)
authentication: Header row to delineate that the information below is for authentication. Do not enter a value.
method The LDAP authentication method supported by the LDAP server. Authentication method used by the
LDAP server. The following methods are supported:
l anonymous. In this case, skip the next two parameters, name and password.
l simple. name and password are mandatory.
user name Only required if you set the authentication parameter to simple.
User name for accessing the LDAP server. This user must have at least read permissions for the LDAP
server.
ALM
Octane Sample
attribute in LDAP attribute that
ldap.conf can be used Values and descriptions
mapping Header row to delineate that the information below is for mapping of
LDAP attributes. Do not enter a value.
(for Active This attribute is typically in a format that contains the common name and
Directory) organization details, such as:
cn=<common_name>,ou=<organizational_unit>,dc=<part_of_domain>
The dn is a unique string that typically contains other LDAP attributes, such as cn,
ou, and dc.
entryDN Example
l For Active Directory: To work with ALM Octane with Active Directory, we use
objectGUID.
l For other LDAP systems: To work with ALM Octane, we generally use
entryUUID entryUUID for OpenLDAP. However, depending on your LDAP, this attribute
might be different, such as GUID or orclguid.
(for other LDAP
systems) This is an attribute by which ALM Octane identifies each user internally for
synchronization between ALM Octane and LDAP, including when importing users
into ALM Octane.
You can configure other values, such as GUID or orclguid, or any other unique value.
first-name givenName LDAP attribute for first name, such as givenName. Mandatory.
ALM
Octane Sample
attribute in LDAP attribute that
ldap.conf can be used Values and descriptions
logon- mail This is the unique identifier between all ALM Octane users, and this attribute is
name used to log onto ALM Octane.
In some cases, ALM Octane may use this attribute to identify each user internally
for synchronization between ALM Octane and LDAP, including when importing
users into ALM Octane.
You can change the logon-name attribute mapping at any time, but make sure
the logon-name is unique across all ALM Octane users.
email mail The LDAP attribute for email address, such as mail. Mandatory.
phone1 telephoneNumber The LDAP attribute for the primary phone number, such as telephoneNumber.
Optional.
include "sso.conf"
2. Set up the sso.conf file as follows:
Setting Description and usage
Key-pair settings:
alias Unique identifier for the SSO public/private key pair used by the ALM Octane service provider for
signing and encrypting authentication information.
Mandatory.
Example: sso-osp-keypair
password Password for protecting and encrypting the key pair defined with key-pair alias.
Mandatory.
Example: my-secret
Key-store settings:
file The absolute path to the keystore file identified with key-pair alias.
The path should be under ALM Octane's configuration folder to avoid permission issues.
Mandatory.
password Password used to protect the keystore file defined with keystore file.
Mandatory.
Example: my-password
keystore-type This defines the keystore type. The default format for this file is PKCS12. You can change the format
to Java KeyStore (JKS) by specifying this type here.
OAuth settings:
client-id Client ID used for internal OAuth2 configuration and by which the integration that will be accessing
ALM Octane will identify itself.
Mandatory.
Example: my-client-ID
client-secret The OAuth client secret for the integration's client ID defined with oauth client-id.
Can be any value. We recommend that the secret be complex and hard to guess.
Mandatory.
Example: secret
SAML settings:
IdP section
metadata-url The IdP's URI for publishing IdP metadata. Part of the pairing process. If this is set, there is no need to
set metadata. Using this option, the URL must be available and respond with a valid XML or ALM
Octane will not start.
You can define the SAML metadata descriptor resource with either this setting, or the saml idp
metadata setting.
Example: http://my-server.company-infra.net:8080/auth/realms/Dev/protocol/saml/descriptor
metadata Base 64 encoded XML of the SAML metadata descriptor from the IdP. This should be used if the
IdP metadata URL cannot be accessed from the ALM Octane server. If metadata is provided using this
setting, the URL defined in saml idp metadata-url is ignored.
You can define the SAML metadata descriptor resource with either this setting, or the saml idp
metadata-url setting.
Mandatory, if saml idp metadata-url is not defined.
Mapping section
user-name The parameter in the SAML response which maps to the user name.
uuid The attribute in the SAML response's attribute statement that maps to the user's UUID.
Optional.
Default: uuid
mail The attribute in the SAML response's attribute statement that maps to the user's email address.
Optional.
Default: mail
first-name The attribute in the SAML response's attribute statement that maps to the user's first name.
Optional.
Default: firstName
last-name The attribute in the SAML response's attribute statement that maps to the user's last name.
Optional.
Default: lastName
full-name The attribute in the SAML response's attribute statement that maps to the user's full name.
Optional.
Default: fullName
Logging settings
Optional. If the value is empty then the default logging directory will be used.
l SEVERE
l INFO
l WARNING
l ALL
Optional.
Default: WARNING
Configuration tips
l When you install a single node configuration for the Jetty server, you need to use the full address
to access it. Meaning, if the Jetty server was installed on a machine named
myserver.mydomain.com, then you access it via: http[s]://myserver.mydomain.com:<port> and not
via http[s]://myserver:<port> if there are client-side DNS shortcuts installed.
l When you install a cluster Jetty server environment, the load balancer and all Jetty nodes should all
be accessible from one another. The same rules for accessing the server via the load balancer from
the client side apply. Meaning, the full address of the load balancer should be used for access.
The installation is complete only when the "Server is ready!" message is shown in the
/opt/octane/log/wrapper.log file. If you do not see the "Server is ready!" message, correct the errors
shown in the log.
Tip: When you first start using ALM Octane, you automatically receive a Trial license which
gives you a 90-day trial for 100 users. For details, see Trial license in the ALM Octane Help
Center.
Next steps:
l "Log in to ALM Octane" on the next page
l Cluster configuration: If you successfully installed and logged into ALM Octane on the first cluster
node, continue installing on additional cluster nodes.
l If connecting to a database server or an LDAP server over a secure channel (SSL/TLS), or for
license sharing with ALM, configure trust. For details, see "Configure trust on the ALM Octane
server" on page 61.
Tip: When you first start using ALM Octane, you automatically receive a Trial license which
gives you a 90-day trial for 100 users. For details, see Trial license in the ALM Octane Help
Center.
Note: Errors might be listed even if the ALM Octane server initializes and starts. If you
encounter problems initializing ALM Octane, check for errors in the log files. For details, see
"Troubleshooting" on page 72.
Next steps:
l Cluster configuration: If you successfully installed and logged into ALM Octane on the first cluster
node, continue installing on additional cluster nodes. See "Cluster installation flow" on page 16.
l Set configuration parameters, such as FORGET_USER_ON_DELETE and SMTP_NOTIFICATION_
SENDER_EMAIL. See Configuration parameters in the ALM Octane Help Center.
l Create spaces. See Create spaces for a site in the ALM Octane Help Center.
l Once you have logged on as the space admin, you can create other users and workspaces. See
Ways to add users and Create workspaces in the ALM Octane Help Center.
Management
Here are some management tasks you may have to perform during or after installation.
Note: In addition to these management tasks, you can also set configuration parameters to
define how your site operates. Configuration parameters for the site are set using Settings.
See Configuration parameters in the ALM Octane Help Center.
tail -f /opt/octane/log/wrapper.log
Note: The tool operates offline. Credential outputs are disabled for security.
/opt/octane/install/updatedbcreds.sh
3. Enter values as described in the sections below.
4. When you are done, start the ALM Octane server.
Usage
The tool can operate in 2 modes: file, or interactive.
File. If mode is set to file, use -f to specify the path to the password definition file. Credentials will be
taken from the provided file.
Interactive. If mode is set to interactive, use -t to specify the target whose password you want to
change - either admin or user. You will enter credentials interactively. Note that either the admin or
user definition can be omitted. In this case the other user's password is taken and its password will not
change.
File mode
You can use the CLI in file mode, which allows granular definitions for admin, user, or space
passwords.
Using a tool in file mode looks like this:
```json
{
"admin" : {
"password" : "PasswordForAdminUser"
},
"appUser" : {
"password" : "PasswordForAppUser"
},
"spaces": {
"default_shared_space": {
"password": "PasswordForSpecificSpace"
}
}
}
You can delete the spaces section. In this case all spaces will get the appUser password.
Caution: Before the tool runs, your file contains passwords in clear text. It is your responsibility
as administrator to secure the file according to your organization's policies. The tool encrypts
the file when running. The tool can read the encrypted password if you want to rerun the tool.
Interactive mode
In interactive mode you update only the admin or user password. This is useful when you do not need
extensive password definition and just want to change a password for a single user.
Using a tool in interactive mode looks like this:
l New password for ADMIN: Enter a new password for admin user. Output is disabled.
l DB authentication username: Enter a user for CLI database connection. Output is disabled.
l DB authentication password: Enter a password for CLI database connection. Output is disabled.
See also:
l "Management" on page 57
Note: When connecting to a database server with SSL, or an LDAP server, over a secure
channel, you must configure trust before starting the ALM Octane server by running systemctl
start octane.
In this topic:
l "Configure trust" below
Configure trust
This section describes how to configure trust.
To configure trust:
1. Obtain the certificate of the root and any intermediate Certificate Authority that issued the
remote server certificate.
2. Import each certificate into the ALM Octane java truststore using a keytool command.
l Locate your <java_home> directory. It is usually under the user/lib directory but may be
different for your environment. One way to check the location of the <java_home> directory
is to check the environment information settings in the /octane/log/wrapper.log file.
Example: /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.131-11.b12.el7.x86_64/jre
l Locate your keystore cacerts file, which is usually here: <java_
home>/jre/lib/security/cacerts
l Import each certificate.
Example:
cd <java_home>/bin
<security-constraint>
<web-resource-collection>
<web-resource-name>Everything</web-resource-name>
<url-pattern>/*</url-pattern>
</web-resource-collection>
<user-data-constraint>
<transport-guarantee>CONFIDENTIAL</transport-guarantee>
</user-data-constraint>
</security-constraint>
2. Restart .
3. Access ALM OctaneALM Octane via http://<ALM Octane>:8080/ui. Port 8080 is the default port.
You should be redirected to https://<ALM Octane>:8443/ui. If not, ensure that SecurePort in
jetty.xml matches your secure port.
SQL Server
Scenario Instructions
SSL/TLS is Add the encryption method to the end of the ConnectionString value.
required
jdbc:sqlserver://<server>:<port>;encrypt=true;trustServerCertificate=true
SSL without When using SSL, disable validation of the certificate sent by the database server.
certificate Add the encryption method to the end of the ConnectionString value, and apply the
validation certificate into the java certs file located under <JAVA_
HOME>\jre\lib\security\certs.
jdbc:sqlserver://<server>:<port>;encrypt=true;trustServerCertificate=false;trustStor
e=<Java Certs file>;trustStorePassword=<JKS password>
Oracle
Oracle
scenario Instructions
SSL/TLS To configure a secure connection from the ALM Octane server to the database server
required using SSL or SSO, refer to the section "Using SSL/SSO (optional)" in the ALM Octane
Installation Guide..
site-action=CONNECT_TO_EXISTING
b. Edit the line with connection-string. For details, see "Advanced ALM Octane server
configuration" on page 62.
2. If SSL/TLS is required, make sure the trust on the ALM Octane server has been established. For
details, see "Configure trust on the ALM Octane server" on page 61.
3. Run the service to start the ALM Octane server.
2. In the Database Server step, select the connection-string option and set the values for your
database. For details, see "Advanced ALM Octane server configuration" on page 62.
3. Make sure the trust on ALM Octane the ALM Octane server has been established. For details, see
"Configure trust on the ALM Octane server" on page 61.
<Call name="addCustomizer">
<Arg><New
class="org.eclipse.jetty.server.ForwardedRequestCustomizer"/></A
rg>
</Call>
Overview
Cluster nodes can be one of the following types:
l Worker nodes. Cluster nodes that handle background asynchronous jobs, such as synchronization.
l Web nodes. All other nodes. Web nodes generally handle direct requests from ALM Octane, but can
also handle background jobs if the worker nodes are not available. The load balancer distributes
the requests as usual among the web nodes.
PUT https://<server>:<port>/admin/servers
{ "data": [
{
"role":"WORKER",
"id":"<serverID>"
}
]
}
For details on authenticating and working with the REST API, see Overview for developer in the
ALM Octane Help Center.
5. Start the ALM Octane server.
See also:
l "Management" on page 57
Overview
Exception files instruct ALM Octane to ignore any errors issued because of manual additions to the
database schema. These errors would typically stop the installation or upgrade process.
You can use exception files to ignore errors for extra tables, views, columns, and sequences. For any
other problem, consult with your database administrator.
Caution: Using the exception file to ignore errors for objects that are added manually to the
schema may compromise stability and the validity of the database user schema.
You can use the exception files during a new ALM Octane installation, when upgrading, and when
creating a space.
<MQM_EXCEPTIONS>
<exceptions>
<declaration>
<!--<object pattern="TABLE_1_EXAMPLE" type="missing"
/>-->
<!--<object pattern=" TABLE_1_EXAMPLE" type="extra"
/>-->
</declaration>
</exceptions>
</MQM_EXCEPTIONS>
3. Change the <declaration> to one of the following. Add as many declarations as you need.
l TableMissing
l ViewMissing
l ColumnMissing
l ConstraintMissing
l IndexMissing
l PartitionFunctionMissing
l PartitionSchemeMissing
l ProcedureMissing
l SequenceMissing
l TriggerMissing
4. For each object pattern, you can specify one of the following types:
extra The object is extra because it was created after ALM Octane installation or before
upgrading.
Examples
l For an extra table:
<TableMissing>
<object pattern="MY_Table" type="extra"/>
</TableMissing>
<ViewMissing>
<object pattern="MY_VIEW" type="extra"/>
</ViewMissing>
<ColumnMissing>
<object pattern="MY_COLUMN" type="extra"/>
</ColumnMissing>
<SequenceMissing>
<object pattern="MY_SEQUENCE" type="extra"/>
</SequenceMissing>
See also:
l "Configure site settings" on page 34
l Troubleshooting: ""My FILL_EXISTING installation failed, indicating that I have extra tables, view,
indexes, and so on."" on page 74
Troubleshooting
This section contains troubleshooting suggestions for issues relating to the ALM Octane installation.
You can also check the log here: /opt/octane/log
For an up-to-date list of installation troubleshooters, see Micro Focus Software Self-solve knowledge
base article KM02703217.
"ALM Octane displays an error indicating that the ALM Octane server is not responding. I
cannot work in ALM Octane."
If ALM Octane is under a very heavy load, it might try to use too many Linux resources. In this case,
Linux kills the server process. Do the following to increase the number of allowed open files to 65536:
1. Open the /etc/security/limits.conf file.
2. Add the following line:
"I rebooted the ALM Octane server machine. The octane service did not start up
automatically."
When you reboot the machine, you need to manually restart the ALM Octane server:
"I cannot log into ALM Octane because ports are closed."
By default, the ALM Octane server uses port 8080 or port 8443 (secure). The port must be opened in
the firewall for incoming traffic.
Example: http://myserver-123545.domain.com:8080/
To identify the important parameters of the system that may affect the installation, run the following
commands:
To get... Command
"When initializing, the ALM Octane installation failed with a site schema problem."
If you receive a site schema error, such as "Cannot upgrade SA. SA schema version must be lower than
the current server version," do the following:
1. Open a backup copy of the site schema.
2. Fix the problem.
3. Restart the server (meaning, run systemctl restart octane again).
Example: For non-dynamic IPs, you can add the server in this format:
2. Restart the ALM Octane Server. For details, see "Start the ALM Octane server manually" on
page 58.
"My FILL_EXISTING installation failed, indicating that I have extra tables, view, indexes, and
so on."
Check if your DBA made manual additions to the database schema, such as adding tables, indexes,
and so on. If the installation encounters objects that it does not expect in the database schema, the
installation can fail.
To avoid this, create exception files. For details, see "Using exception files for manual database
changes" on page 68.
"Either ALM Octane cannot fetch Jetty files or Internet Explorer 11 does not connect to
SSL"
The conscript library allows you to enable HTTP/2 in Jetty. Sometimes, however, using the conscript
library causes issues. To resolve these issues, disable the conscript library and switch back to native
Java SSL. For instructions, see Micro Focus Software Self-solve knowledge base article KM03310408.
See also:
l "Management" on page 57
Checking logs
ALM Octane's log files are stored in the /opt/octane/log directory, or the directory that you specified
when you deployed.
In this topic:
l "Log files" below
l "Monitor the deployment procedure" below
Log files
Log Path
tail -f /opt/octane/log/wrapper.log
See also:
l "Management" on page 57
Uninstall
This section describes how to uninstall the ALM Octane server.
rpm –q octane
3. The uninstall process does not delete the repository, log, and configuration directories, in case
you want to reinstall. Delete them if necessary:
rm -rf /opt/octane
See also:
l "Installation" on page 30
Send Us Feedback
Let us know how we can improve your experience with the Installation Guide for Linux.
Send your email to: docteam@microfocus.com