LogoLogo
  • GETTING STARTED
    • Violet Documentation
    • What is Violet?
    • Platform Overview
  • Integrations
    • Connect self-hosted software
  • FEATURES
    • Dashboards
      • Customization
      • FAQ
    • Data Explorer
      • FAQ
    • Automations
      • Jira to Smartsheet
        • Auto-update Jira data using formulas
      • Solidworks PDM to Fusion
      • Teamcenter to Datum
      • Teamcenter to ION
      • Teamcenter to Netsuite
      • FAQ
    • Reports
      • Multisource
        • Custom Columns
        • FAQ
      • Clear To Build
      • Build Velocity
    • Requirements
      • View: Table vs. Graph
      • Structure: Hierarchy vs. System
      • Systems
      • Import via CSV
      • Custom Fields
      • Verifications
      • Satisfaction
    • Parameters
    • Scripts
      • Creating and running scripts
      • Violet Variables
      • Live scripts
      • History and notifications
      • FAQ and Examples
    • SysML
    • Change Orders [Beta]
    • Schedules [Beta]
    • Workflows [Beta]
  • RESOURCES
    • Administrative
      • Invite your team
      • Permissions
      • Single Sign-On
      • On-Premises Deployment
        • Azure Deployment
        • AWS Deployment
        • Nutanix AHV Deployment
    • Security & Compliance
      • ITAR/EAR Compliance
      • SOC 2 Certification
      • NIST/CMMC Compliance
      • Data Retention, Backup and Recovery
      • Legal Stuff
    • Videos and Tutorials
    • FAQ
    • Pricing
  • APPS
    • A
      • Acumatica (Coming Soon)
      • AllSpice (Coming Soon)
      • Altium 365
        • Connect Altium 365 in Violet
      • Altium Designer
      • Aras
      • Arena
      • Asana
        • [Optional] Connect using a PAT
      • AutoPCB (Coming Soon)
    • B
      • Basecamp (Coming Soon)
      • Bild (Coming Soon)
      • BILL
        • [Advanced] Retrieve your Organization ID
        • [Optional] Import BILL data
      • Bitbucket
        • [Optional] Connect Bitbucket with API Token
      • Box
      • Brex
        • [Optional] Connect to Brex using an API Token
    • C
      • Cameo
      • Capella (Coming Soon)
      • ChatGPT (Coming Soon)
      • ClickUp
      • Cofactr
      • Confluence
      • Costpoint (Coming Soon)
      • Coupa (Coming Soon)
      • Creo (Coming Soon)
    • D
      • DOORS (Coming Soon)
      • Datum
      • Docusign (Coming Soon)
      • Dropbox (Coming Soon)
      • Duro
    • E
      • Enterprise Architect (Coming Soon)
      • Epicor (Coming Soon)
      • Epsilon3
    • F
      • Factor
      • FactoryLogix (Coming Soon)
      • Flow
      • Fleetio (Coming Soon)
      • Fulcrum
      • Fusion360 (Coming Soon)
      • Fusion
    • G
      • Gitea
      • GitHub
        • [Optional] Connect with an API Token
      • GitLab
        • Generate a GitLab API Token
        • Connect self-hosted GitLab
      • GENESYS
      • Google Drive
      • Google Sheets
    • I
      • Innoslate (Coming Soon)
      • InvenTree
      • ION
        • Connect ION in Violet
    • J
      • Jama
        • Connect self-hosted Jama
        • [Optional] Connect with Jama Client ID & Secret
      • Jira
        • Self-hosted Jira
        • [Optional] Connect via Jira API Token
      • Julia
      • JITX (Coming Soon)
    • K
      • Kiwi TCMS (Coming Soon)
    • L
      • LeoTrack (Coming Soon)
      • Linear
      • Lucidchart
      • Lucidscale
      • Lucidspark
      • Luminary Cloud (Coming Soon)
    • M
      • Manufacturo
      • Mathcad (Coming Soon)
      • MATLAB
      • Microsoft 365
      • Microsoft Teams (Coming Soon)
      • Microsoft Project (Coming Soon)
      • Monday.com
        • [Optional] Connect to Monday.com with an API Token
    • N
      • NetSuite
        • Configure NetSuite to connect
        • Connect NetSuite in Violet
        • Configuring NetSuite data syncs
      • Nuclino
      • Notion (Coming Soon)
      • NX (Coming Soon)
    • O
      • Octopart
        • Connect Octopart in Violet
      • Odoo (Coming Soon)
      • Onshape
      • Opcenter (Coming Soon)
      • OpenBOM
    • P
      • Parasoft (Coming Soon)
      • Pathfinder
      • Polarion (Coming Soon)
      • Precoro
      • Procurify
      • Puzzle
      • Python
    • Q
      • QuickBooks
    • R
      • Ramp
    • S
      • SAP ME (Coming Soon)
      • SAP S/4 HANA (Coming Soon)
      • SatCatalog
      • Sedaro
        • Using Violet data in Sedaro
      • SimScale
      • Simulink (Coming Soon)
      • Slack
      • Smartsheet
        • Smartsheet Gov
      • Solidworks PDM
      • Solumina (Coming Soon)
      • StartProto (Coming Soon)
      • Syndeia (Coming Soon)
      • SysML
      • Syteline (Coming Soon)
    • T
      • Teamcenter
        • Configure Teamcenter to connect
        • Connect Teamcenter in Violet
        • Set up Teamcenter integration
        • Data fetched from Teamcenter
        • Teamcenter FAQ
      • Teamcenter X (Coming Soon)
      • TestRail
      • Trello
      • Tulip (Coming Soon)
    • V
      • Valispace
      • Visure (Coming Soon)
      • VOLTA (Coming Soon)
    • W
      • Wasp (Coming Soon)
      • Wayfinder
      • Windchill
      • Wrike
    • X
      • Xero
      • Xray (Coming Soon)
  • Z
    • Zuken E3 (Coming Soon)
Powered by GitBook
On this page
  • Via Whitelist
  • via VPN Tunnel

Was this helpful?

  1. Integrations

Connect self-hosted software

PreviousIntegrationsNextDashboards

Last updated 7 days ago

Was this helpful?

You can also easily connect with self-hosted tools in Violet by or by establishing a .

Via Whitelist

The server hosting your software will need to whitelist (ie. allow access) to Violet's IP address.

Use the NAT Gateway IP address for your Violet environment:

  • Violet:

  • VioletGov:

via VPN Tunnel

The instructions below are specific to , our recommended VPN solution. We are happy to consider any other provider - just let us know.

How to Set Up a Tailscale VPN

is a VPN solution that simplifies the setup of secure networks for accessing your on-premises applications. It uses WireGuard for its network traffic encryption and supports various devices like Linux, macOS, Windows, and even cloud servers.

Here’s how to set up Tailscale to connect on-premise applications to Violet securely.

Prerequisites

  1. A server or machine that can act as your Tailscale VPN gateway for your on-premises applications (AWS EC2, Azure VM, Google Compute Engine, etc.)

  2. Administrator privileges on all devices that will be part of the VPN network

  3. Internet access for installing Tailscale on the target machine


Step 1: Sign Up and Set Up Your Tailscale Account

  1. After signing up, you’ll be able to access the Tailscale admin console at https://login.tailscale.com/admin.


Step 2: Install Tailscale on Your Gateway Server

  1. Choose a machine inside your network to act as a gateway (e.g. a server or dedicated VM).

  2. Install Tailscale on your Linux gateway machine:

    curl -fsSL <https://tailscale.com/install.sh> | sh
  3. Authenticate the machine by running the following command:

    sudo tailscale up
    • This will open a browser for you to log in and authenticate the device to your Tailscale account.

    • Once authenticated, the machine will appear in your Tailscale admin console under Machines.


Step 3: Enable Subnet Routing on the Gateway

Subnet routing allows devices outside your on-premise network to access internal resources via the gateway machine.

  1. Identify the subnet you want to route (e.g., <subnet-to-route>).

  2. On the gateway machine, run the following command:

    sudo tailscale up --advertise-routes=<subnet-to-route>

    Replace <subnet-to-route> with the appropriate subnet of your network.

  3. After enabling subnet routing, go to the Tailscale admin console and approve the route:

    • Navigate to the Machines page.

    • Find the gateway machine and click on the gear icon next to it.

    • Under Route settings, approve the advertised route.


Step 4: Install Tailscale on Your Client Devices

  1. Install Tailscale on any device that will connect to your VPN (e.g., laptops, remote servers).

  2. Authenticate each client device to your Tailscale account using:

    sudo tailscale up
  3. Once the client devices are authenticated, they’ll appear in your admin console as part of your Tailscale network.


Step 5: Access Applications

Now that the Tailscale VPN is set up, any device on your Tailscale network can access the on-premises resources through the gateway machine.

  1. Ping test: From a client device, you can try pinging an internal IP address within your on-premises network to ensure connectivity:

    ping <internal-ip-addr>
  2. Access your applications: If you have a web application running on a server within your on-premise network, simply access it using the internal IP (e.g., http:/<internal-ip-addr>:8080).


Troubleshooting Tips

  • Check device connectivity: Ensure that your devices are visible on the Tailscale admin console and are connected to the same network.

  • Firewall issues: Ensure that your on-premise server's firewall allows incoming connections from the Tailscale subnet.

  • Routes not appearing: Ensure the gateway machine advertises routes correctly using sudo tailscale up --advertise-routes=<your-subnet>.


Next Steps

DANGER: Reusable Tailscale auth keys are sensitive. Please do not share over insecure forms of communication (slack, email, etc.). ONLY use reliable password sharing methods (1Password, Microsoft Entra, LastPass, etc.).

If Violet receives a key over an insecure form of communication, we will ask you to invalidate the existing API key and send us a new one.

  • Please also share an IP address or domain on your private network that we should be able to ping while connected to the VPN for testing.

Additional Reading

Sign up for a Tailscale account at using your preferred method (Google, Microsoft, or GitHub authentication).

Follow the for your specific platform (Linux, Windows, macOS).

Violet needs a to connect to your new VPN. Once your VPN is set up, please provide a reusable auth key to Violet at your earliest convenience.

If your security policy allows, you can to reduce maintenance overhead. If you choose to do this, consider adding for continuous monitoring and retroactive access logs.

tailscale.com
installation guide
Reusable Tailscale Auth Key
disable the key expiry
network flow logs
Tailscale Quickstart
50.19.87.143
3.31.169.141
Tailscale
Tailscale
whitelisting our IP gateway
VPN tunnel