Skip to main content

Documentation Portal

Establishing a connection to Canary

You can connect to the Canary server using two options: via TM-Connect (TrendMiner Connect Agent) or without TM-Connect. Follow the respective steps for the method you choose:

Option 1: Connecting via TM-Connect

TM-Connect should be used for the communication between TrendMiner SAAS solution and the on-prem Canary server in a secure way, without the need to open incoming ports on the public facing Firewall at your data centers. Please make sure to:

  1. Install TM-Connect:

    • See Agents for more details. 

      Note

      If everything went well, you will see the TM Connect Agent service with status “Running” in Services.

      Canary_4_TmAgentRunning.png
  2. Configure the connection in TrendMiner:

    • Ensure you connect to the Canary server using the HTTP port (it needs to be configured in the Canary historian).

    • Host needs to be the dns name or the IP of the target server.

    • Port needs to be the port where the views of Canary historian are exposed on.

Option 2: Connecting without TM-Connect

You have two options if you decide not to use TM-Connect: connecting via HTTPS or HTTP (not recommended). To ensure secure connection, always choose HTTPS when not using TM-Connect.

Notice

This option is not available for our AWS SaaS customers since these installation do not allow to upload the Canary certificate in ConfigHub. AWS SaaS customers should always use TM-Connect instead.

Connecting via HTTPS

Notice

 Extra configuration rules for the firewall on the windows server needed:

  1. Rule "File and Printer Sharing (Echo Request - ICMPv4-In)" enabled, this allows the server to be pinged

  2. New Rule with the name "Canary", that allows TCP on port 55236

Canary_WindowsFirewallRules.png

If wishing to make a secure connection (55236), the Views service must be configured to use a valid certificate in Canary.

  1. Configure Canary port

    • Before the API is reachable, the port needs to be opened under the Views section of the Canary admin.  In Canary Administrator go to Views (Configuration tab) → Endpoints

      Canary_Connectin_Ports.png
  2. Add Canary certificate in ConfigHub

    • Canary certificate needs to be added to the truststore on the client (TrendMiner). You can add it in ConfigHub -> Security → Certificates → Trusted certificates → Upload certificate (button)

    • To export the certificate in Canary Administrator go to Views (Configuration tab) → Endpoints → CERTIFICATE [INFO…] (button)

      • Make sure the Subject Name matches the DNS name, otherwise you will get runtime exceptions when using the certificate later on

      • Do not export private key

      • Select Base-64 encoded X.509 format

        Canary_Connecting_Certificates.png
  3. Add your API user to Canary Access tab

    • To add an API user in Canary Administrator go to Views (Configuration tab) → Access → ALLOW tile → ADD… (button)

      Canary_Connecting_AddUser.png
  4. Configure the connection in TM