Configure a Custom Connector
Custom connectors require various configurations to function correctly within a Kubernetes environment. These configurations define how the connector interacts with external services, manages security-sensitive data, and optimizes runtime behavior.Key Configuration Areas
Secrets Management
Securely store sensitive data using SOPS encryption
Connector Properties
Define external service details and feature toggles
Traits
Control deployment-specific parameters
Resources
Specify transformation files and custom logic
Prerequisites
Before configuring a custom connector, ensure you have:- Built a connector successfully
- Access to the
gc-applications-liverepository - Understanding of your target deployment environment
Secrets Management with SOPS
To securely store sensitive data in Kubernetes secrets, use SOPS for encryption. ArgoCD automatically applies encrypted secrets placed in thesecrets folder as part of the secrets-app application.
Managing Secrets
-
Follow the guide in your installation for the specific runtime at:
-
Configure a secret in the connector by adding the secret name in
values.yaml:
Connector Properties
Define connector configuration values in the Helmvalues.yaml file in the gc-applications-live repository.
Example Properties Configuration
Common Properties
| Property | Description | Example |
|---|---|---|
connector.baseUrl | Base URL for external service | https://api.example.com |
connector.id | Vendor-specific identifier | vendor-123 |
connector.security-token-type | Authentication type | Oauth2, Bearer |
enableValidation | Enable request validation | true, false |
isEncryptionRequired | Require encryption | true, false |
Traits Configuration
Traits control deployment-specific parameters such as auto-scaling, logging, health monitoring, and telemetry.Supported Traits
Grand Central supports the following Camel traits:affinity- Pod scheduling preferencescontainer- Container resource limitshealth- Health check configurationknativeservice- Knative-specific settingslogging- Logging configurationprometheus- Metrics collectiontelemetry- Distributed tracing
Example Traits Configuration
Health Check Configuration
Configure health, liveness, and readiness probes:- Liveness Probe: Detects if the connector is alive
- Readiness Probe: Determines if the connector can accept traffic
- Startup Probe: Checks if the application has started successfully
Resource Configurations
Specify additional resources such as transformation files, validation rules, and custom processing logic.Supported Transformation Libraries
Grand Central supports the following transformation libraries for processing request and response payloads:Example: Jolt Transformation
Map a user’s first and last name into a singlefullName field:
Example: XSLT Transformation
Convert an XML<user> element into a <customer> element:
Configuration Best Practices
Security
Security
- Always use SOPS for sensitive data
- Never commit secrets to version control
- Rotate credentials regularly
Resource Management
Resource Management
- Set appropriate resource limits
- Configure auto-scaling based on load
- Monitor resource utilization
Health Checks
Health Checks
- Enable all probe types
- Set realistic timeout values
- Test probe configurations thoroughly
Logging
Logging
- Use appropriate log levels
- Enable structured logging
- Configure log retention policies
Next Steps
Once you have completed your connectors configuration, you are ready to:- Test and validate your connector
- Deploy the connector to your environment
- Verify logs to ensure it’s running correctly