Testing and authenticating connectors

Connectors with on-prem support
Copy

Following connectors are available across all three regions (US, EU and AP) for use in an on-prem setup:

Name

Versions

AWS Redshift

1.4

AWS S3

2.3

Azure Active Directory

3.1

FTP Client

5.3

GitHub

2.3

HTTP Client

5.6

JDBC Client

2.1

Jira

3.0

Microsoft Dynamics 365

3.5, 3.4, 3.0

Microsoft Dynamics GP

1.1

Microsoft SQL Database

4.3

MySQL

3.0

PostgreSQL

2.2

SAP

4.0

SAP S/4HANA Cloud

1.3

SOAP Client

1.0

Notes about multi-region availability
Copy

Kafka v1.0 is not on the above list but it is available to be used in the US.

Creating connector authentications
Copy

Now you have your agent set up and connected to Tray you can set up authentications that will be routed to the on premise location where the agent is located (rather than the internet).

This can be done in all places where you can currently create authentications in Tray.

So if you are creating an MS Dynamics GP auth you can select the on-prem group to route this authentication through:

Once you’ve selected the on premise group you can proceed to create an authentication as normal.

Once an on-prem authentication for a connector has been created, it can be used in any workflows which use that connector.

DNS support
Copy

The agent supports proxying DNS requests.

This allows connectors to use private DNS servers accessible by the agent.

This feature can be disabled using the --disable-dns flag (when DNS is disabled any addresses must be publicly resolvable from the internet, or an IP address will have to be used instead).

'Advanced' DNS config on the host running the agent (for example, the search list in a unix resolv.conf) will be ignored.

Similarly we are not able to use multiple DNS servers if the host running the agent has multiple configured. We will use the highest priority server, but will not fail over to subsequent servers if the first one fails.

Port configuration
Copy

The port which the agent runs on is is not relevant when making a connection.

The only ports of concern are those that your on-prem services are running on.

Test setup
Copy

While you can of course attempt to connect to your on-prem services straight away, a simple way to test your agent is to:

1. Configure a simple test API service (using node express, nginx etc.) on your network which accepts token-based auth and run on e.g. port 3000

2. Create a custom token-based service in your tray workspace

3. Create a manually-triggered test workflow which uses the HTTP client to make a simple GET request to your API service (using your network's private IP address):

You can create an on-prem authentication using the custom service:

Then run the workflow and check the logs for a successful execution

You might see the following error message if the connector is not yet supported for an on-premise connection:

Unable to invoke connector <connector-name>-<connector-version> in an on-prem agent group as it is not currently supported.

Please refer the table above for the list of supported connectors.