Connectivity tests from SAP Cloud Platform Integration
In this blog, we shall see the steps to test the connectivity when communicating from SAP Cloud Platform Integration(f.k.a HCI). This blog is part of the series on Understanding Authentication & Testing Connectivity in SAP Cloud Platform Integration. You can access all the blogs here.
On the SAP Cloud Platform Integration side, it is quite simple to configure the settings. You have to configure the integration artifact (refer to the blog here). For certificate-based communication, you have to upload the receiving system’s public certificate in the SAP Cloud Platform Integration keystore. One way to send messages from SAP Cloud Platform Integration (without a sender component) is to configure a timer and a content modifier step in the Integration flow. You can create payload messages by manually specifying them in the body of the content modifier. The scheduler step can be configured to run once or at multiple intervals.
Let’s say you have an SAP ERP system, then create an HTTP destination that can receive the messages. You can check incoming logs at the SAP ERP system. The same procedure can apply for any receiving system.
Note: We are currently developing a feature that allows you to ping destinations from SAP Cloud Platform Integration. Once that is available, I shall update this blog.
- Ensure that the firewall in the customer landscape can accept messages originating from SAP Cloud Platform Integration. The IP address range for different data centres of SAP Cloud Platform Integration are maintained in the documentation. (Documentation link: https://cloudintegration.hana.ondemand.com/PI/help -> Operating and Monitoring SAP Cloud Platform Integration -> Understanding the Basic Concepts -> Virtual System Landscapes)
- For outbound HTTP/HTTPS connections, always use port 443
Connectivity tests from SAP Cloud Platform Integration are easier to execute. Check out the firewall settings on the on-premise systems. You can test using basic authentication and then move to certificate-based authentication.