Databricks and Tray

Databricks combines the lakehouse architecture, Unity Catalog for governance, SQL Warehouses for analytics, and Jobs and Workflows for orchestration. On its own, it doesn’t coordinate cross-application actions or human approvals. Tray fills that gap with integrations, automations, and agents that source knowledge from Databricks, apply rules and approvals, call external systems, and write results back to the right assets and applications.

With Tray, you build
Automations
Integrations
and
Agents
that connect Databricks across your enterprise systems and workflows.

Automations

Automations with Databricks and Tray

Tray turns Databricks activity into action. Job status, SQL results, scheduled checks, and catalog changes can all trigger flows that apply business rules and approvals, then write outcomes back to Databricks or connected systems with full audit trails. Status updates reach the right teams with links to runs, queries, and assets. These automations run on the integrations below and can also power agent tools for interactive workflows.

Integrations

Integrations with Databricks and Tray

Tray connects Databricks with the rest of your enterprise stack so signals from jobs, queries, and catalog changes drive coordinated actions across analytics, operations, and AI workflows. These integrations turn Databricks into a system of action, powering the automations above and the tools your agents use.

Databricks integration capabilities

Integrate Databricks with 700+ applications, plus any system with an API using Tray’s HTTP connector. Capabilities align with Databricks’ APIs and how teams actually work.

Manage governed data objects and access

  • Manage catalogs and schemas: Align table and view grants with IDP groups
  • Control permissions: Grant or revoke access for analytics and BI tools
  • Sync ownership: Reflect ACL and role changes to downstream systems
  • Register and share assets: Publish tables and views across workspaces or to external consumers

Agents

Build agents with Databricks and Tray

Tray agents turn Databricks insights into action. They analyze live data, apply your business logic, and drive updates across Databricks and connected systems, so decisions move as fast as your data. By pairing Databricks’ unified platform with Tray’s orchestration, agents give teams a real-time bridge between analytics, operations, and AI workflows.

Give agents the Databricks context they need to act intelligently

  • Scope: Unity Catalog objects you approve (catalogs, schemas, tables), plus Job metadata, run status, and outputs
  • Freshness: Fetch on demand or refresh on a schedule; pull SQL results live when needed
  • Access controls: Limit access by workspace, role, or project

FAQs

Yes. Within the permissions of your Databricks token, Tray can list and manage catalogs, schemas, tables, and grants through the Unity Catalog API. All operations respect existing governance policies and access controls.

What comes standard with Tray

Whether your systems, data, or models run in the cloud or on-premises, Tray connects them in one secure platform. Every connection, workflow, and agent operates under IT governance with encryption, audit logging, and access controls built in. Security teams can trust that all integrations comply with enterprise network and authentication policies.

Universal connectivity

  • Prebuilt connectors: 700+ connectors plus a universal HTTP connector for any REST API
  • Custom connectors: Build custom connectors that behave like native ones
  • Connect anywhere: Cloud or on-prem systems supported

Learn more about our connectivity options

On-premises connectivity

  • Connect securely: Access on-premises systems, whether first-party or third-party
  • Meet network requirements: Connect through approved configurations that align with enterprise security policies
  • Enterprise protocols: Support multiple on-premises security standards for safe integration

Learn more about on-premises connectivity

Authentication management

  • Secure credentials: Collect and store authentications with full encryption
  • Encrypted data: Protect all data at rest and in transit
  • Role-based control: Partition credentials by workspace and access level

Learn more about authentication management

Security and governance

  • Certified compliance: SOC 2 Type II, GDPR, CCPA, HIPAA
  • End-to-end protection: Encryption, detailed audit logs, scoped connections, and OAuth scopes

Learn more about security and governance