Testing and authenticating connectors
Connectors with on-prem supportCopy
Following connectors are available across all three regions (US, EU and AP) for use in an on-prem setup:
Name | Versions |
---|---|
1.4 | |
2.3 | |
3.1 | |
5.3 | |
2.3 | |
5.6 | |
2.1 | |
3.0 | |
3.5, 3.4, 3.0 | |
1.1 | |
4.3 | |
3.0 | |
2.2 | |
4.0 | |
1.3 | |
1.0 |
Notes about multi-region availabilityCopy
Kafka v1.0 is not on the above list but it is available to be used in the US.
Creating connector authenticationsCopy
Now you have your agent set up and connected to Tray you can set up authentications that will be routed to the on premise location where the agent is located (rather than the internet).
This can be done in all places where you can currently create authentications in Tray.
So if you are creating an MS Dynamics GP auth you can select the on-prem group to route this authentication through:
Once you’ve selected the on premise group you can proceed to create an authentication as normal.
Once an on-prem authentication for a connector has been created, it can be used in any workflows which use that connector.
DNS supportCopy
The agent supports proxying DNS requests.
This allows connectors to use private DNS servers accessible by the agent.
This feature can be disabled using the --disable-dns
flag (when DNS is disabled any addresses must be publicly resolvable from the internet, or an IP address will have to be used instead).
'Advanced' DNS config on the host running the agent (for example, the search
list in a unix resolv.conf) will be ignored.
Similarly we are not able to use multiple DNS servers if the host running the agent has multiple configured. We will use the highest priority server, but will not fail over to subsequent servers if the first one fails.
Port configurationCopy
The port which the agent runs on is is not relevant when making a connection.
The only ports of concern are those that your on-prem services are running on.
Test setupCopy
While you can of course attempt to connect to your on-prem services straight away, a simple way to test your agent is to:
1. Configure a simple test API service (using node express, nginx etc.) on your network which accepts token-based auth and run on e.g. port 3000
2. Create a custom token-based service in your tray workspace
3. Create a manually-triggered test workflow which uses the HTTP client to make a simple GET request to your API service (using your network's private IP address):
You can create an on-prem authentication using the custom service:
Then run the workflow and check the logs for a successful execution
You might see the following error message if the connector is not yet supported for an on-premise connection:
Unable to invoke connector <connector-name>-<connector-version> in an on-prem agent group as it is not currently supported.
Please refer the table above for the list of supported connectors.