You are browsing the documentation of version 1.14, go to
current documentation
Configuration
First time configuration of Gatling Enterprise and content of the default configuration file
Configuring Gatling Enterprise
The first step before using Gatling Enterprise is to configure your license key.

Once you’ve filled your license and clicked on the “Next” button you will get the credentials to connect to the superAdmin account. You can change this password in the frontline.conf file.

Click on the “Next” button to finish the configuration step and restart Gatling Enterprise.
Default Configuration File
Find below the default frontline.conf
file:
frontline {
#licenseKey = DO_NOT_EDIT_FRONTLINE_WILL_REPLACE_THIS
http {
port = 10542
cookieMaxAge = 604800
ssl {
#certificate = "/path/to/domain.crt"
#privateKey = "/path/to/domain.key"
}
proxy {
#host = ""
#port = 80
}
}
injector {
httpPort = 9999
enableLocalPool = false
kubernetes {
disableTrustManager = true
}
}
security {
#superAdminPassword = DO_NOT_EDIT_FRONTLINE_WILL_REPLACE_THIS
#secretKey = DO_NOT_EDIT_FRONTLINE_WILL_REPLACE_THIS
}
cassandra {
localDataCenter = datacenter1
contactPoints = [{
host = localhost
host = ${?FRONTLINE_CASSANDRA_HOST}
port = 9042
port = ${?FRONTLINE_CASSANDRA_PORT}
}]
keyspace = gatling
replication = "{'class':'SimpleStrategy', 'replication_factor': 1}"
credentials {
#username = "hello"
#password = "world"
}
runsCleanup {
#maxRunsBySimulation = 30
#maxRunAge = 100
#timeOfDay = "15:10"
}
}
grafana {
#url = "http://localhost:3008/dashboard/db/frontline-requests"
}
ldap {
#host = localhost
#port = 389
#baseDn = "dc=example,dc=com"
#distinguishedName = "cn=John Doe,ou=Users,dc=example,dc=com"
#password = "secret"
usernameAttribute = uid
firstNameAttribute = givenName
surnameAttribute = sn
mailAttribute = mail
connectTimeoutMs = 5000
responseTimeoutMs = 10000
#personObjectClass = person
ssl {
#format = "PEM | JKS" PEM will trigger the pem part of the configuration and JKS the jks part
pem {
#serverCertificate = "/path/to/domain.pem"
#clientCertificate = "/path/to/domain.pem"
#privateKey = "/path/to/domain.key"
}
jks {
#trustStore = "path/to/truststore.jks"
#trustStorePassword = "secret"
#keystore = "path/to/keystore.jks"
#keystorePassword = "secret"
}
}
}
oidc {
# discoveryUrl = "https://provider/.well-known/openid-configuration"
client {
# id = "xxxxx-xxxxx-xxxxx-xxxxx-xxxxx"
# secret = "*******"
}
# responseMode = "fragment" | "okta_post_message"
# scopes = ["openid", "email", "profile"]
# jwksRefreshFrequency = 1440
mapping {
# username: "unique_name"
# firstname: "given_name"
# lastname: "family_name"
# email: "email"
}
}
}