Bindu Edge Client
The Bindu Edge Client enables you to make your locally running agent accessible on the internet without deploying it to any cloud infrastructure. It creates a secure tunnel from your local machine to the internet using WebSocket connections, giving your development agent a publicly accessible URL.Perfect for Development - Test your agent in a production-like environment without the complexity of deployment, containerization, or cloud infrastructure setup.
Why Use Bindu Edge?
1. Zero-Deployment Development
Focus on building, not deploying:- Instant public access: Get a public URL for your local agent in seconds
- No Docker required: Skip containerization during development
- No cloud setup: Avoid complex cloud deployments while iterating
- Keep working locally: Use your familiar development environment and tools
- Live reload: Changes to your local code are immediately accessible via the public URL
2. Rapid Testing & Iteration
Speed up your development workflow:- Test webhooks locally: Receive callbacks from external services directly to your local agent
- Integration testing: Test with third-party APIs that require public endpoints
- Real-world scenarios: Simulate production conditions without production deployment
- Quick debugging: Debug issues in a public-facing context while keeping full IDE access
- Instant sharing: Share your work-in-progress with team members or stakeholders
3. Secure Tunneling
Enterprise-grade security for development tunnels:- Token-based authentication: Every tunnel requires a secure authentication token
- Encrypted connections: All traffic flows through secure WebSocket (WSS) connections
- Request validation: Only authorized requests are forwarded to your local agent
- Private by default: Tunnels are only accessible with the correct URL and token
- Temporary access: Create and destroy tunnels on-demand for specific testing sessions
4. A2A Protocol Compatible
Seamlessly integrate with the agent-to-agent ecosystem:- DID support: Your local agent maintains its Decentralized Identity
- Protocol compliance: Full A2A protocol support through the tunnel
- Message routing: Receive tasks and messages from other agents on the internet
- Discovery: Make your local agent discoverable in the Bindu Directory
- Agent networking: Test multi-agent interactions without deploying all agents
5. Perfect for Demos
Showcase your agent to clients and stakeholders:- No deployment wait: Present your latest changes without CI/CD delays
- Live demonstrations: Run demos directly from your development machine
- Quick iterations: Make changes based on feedback and show results immediately
- Cost-effective: Avoid spinning up cloud resources for every demo
- Full control: Keep complete control over your demo environment
Use Cases
🧪 Development & Testing
Local Development with Public Endpoints- Develop and test webhooks without ngrok or similar tools
- Test OAuth callbacks that require public redirect URLs
- Validate API integrations that need to reach your agent
- Debug in real-time with full IDE support
🤝 Team Collaboration
Share Your Work-in-Progress- Let team members interact with your local agent
- Gather feedback without pushing to staging
- Collaborate on features before committing code
- Test integrations with other team members’ agents
🎯 Client Demonstrations
Show, Don’t Tell- Demo new features directly from your development environment
- Make real-time adjustments during presentations
- Showcase work-in-progress without formal deployments
- Get immediate client feedback and iterate quickly
🔗 Webhook Development
Test Inbound Webhooks Locally Common scenarios:- Payment provider webhooks (Stripe, PayPal)
- Communication platform callbacks (Slack, Discord)
- External service notifications (GitHub, Jira)
- Third-party API events
🌐 Multi-Agent Testing
Test Agent-to-Agent Communication- Run one agent locally while others are in production
- Test new agent interactions without deploying everything
- Debug communication issues in a hybrid environment
- Validate protocol changes before deployment
Quick Start Guide
Prerequisites
Before starting, ensure you have:- A Bindu agent running locally
- Access to bindus.directory
- Python environment with Bindu installed
Step 1: Create a Tunnel
Visit bindus.directory and set up your tunnel:
After creation, you’ll receive three critical pieces of information:
ws_url: WebSocket URL for the tunnel connection (e.g.,wss://tunnel.bindus.directory/ws)token: Authentication token for secure access (e.g.,bnd_tk_abc123...)public_url: Your agent’s public internet URL (e.g.,https://agent-abc.bindus.directory)
Step 2: Configure Your Local Agent
Create anedge.config.json file in your project directory:
edge.config.json
| Field | Description | Default | Required |
|---|---|---|---|
ws_url | WebSocket URL provided by bindus.directory | - | ✅ Yes |
token | Authentication token for your tunnel | - | ✅ Yes |
local_port | Port where your local agent is running | 3773 | ❌ No |
Step 3: Start Your Local Agent
Ensure your Bindu agent is running on the configured port:Step 4: Start the Edge Client
With your agent running, start the edge client in a new terminal:Step 5: Test the Connection
Your agent is now publicly accessible! Test it:Advanced Configuration
Environment Variables
Instead of usingedge.config.json, you can set environment variables:
Custom Port Configuration
If your agent runs on a non-standard port:edge.config.json
Multiple Agents
Run multiple agents with separate tunnels: Terminal 1 - Agent A on port 3773:Programmatic Usage
Integrate Edge Client into your code:How It Works
Architecture Overview
- Incoming Request: External client sends request to
https://agent-abc.bindus.directory - Edge Server: Bindu Edge server receives and validates the request
- Authentication: Server verifies the request against tunnel configuration
- WebSocket Forward: Request is forwarded through the WebSocket tunnel
- Local Processing: Edge client receives request and forwards to
localhost:3773 - Agent Response: Your local agent processes and returns response
- Return Path: Response flows back through tunnel to Edge server
- Client Response: Original client receives response from your local agent
Connection Lifecycle
Security Model
Multi-Layer Security:- Token Authentication: Every tunnel requires a unique token
- WSS Encryption: WebSocket connections use TLS encryption
- Request Validation: Edge server validates all incoming requests
- Local Firewall: Your local machine’s firewall remains intact
- No Port Forwarding: No need to open ports or configure routers
Troubleshooting
Connection Issues
Problem: “Cannot connect to tunnel”- Verify your
ws_urlis correct and includes the tunnel ID - Check your internet connection
- Ensure the tunnel still exists at bindus.directory
- Verify no firewall is blocking WebSocket connections
Authentication Failures
Problem: “Authentication failed”- Double-check your
tokenvalue inedge.config.json - Ensure the token hasn’t expired (check bindus.directory dashboard)
- Verify you haven’t regenerated the token since creating the config
- Check for extra spaces or quotes in the token string
Local Agent Not Found
Problem: “Cannot reach local agent”- Ensure your Bindu agent is actually running
- Verify it’s listening on the correct port (
local_portin config) - Check if another process is using the port:
lsof -i :3773 - Try accessing
http://localhost:3773/healthdirectly
Request Timeout
Problem: Requests timeout through the tunnel Solutions:- Check if your local agent is responding slowly
- Increase timeout settings in your agent configuration
- Verify your internet connection stability
- Check Edge client logs for error messages
Port Already in Use
Problem: Edge client can’t bind- Another Edge client might already be running
- Kill existing process:
pkill -f bindu.edge_client - Find and stop the conflicting process:
lsof -i :3773
Best Practices
Development Workflow
- Start with local testing before enabling the tunnel
- Use tunnels temporarily - close them when not needed
- Rotate tokens regularly for security
- Monitor logs from both agent and edge client
- Test locally first before exposing via tunnel
Security Guidelines
- ✅ DO: Store tokens in
edge.config.json(add to.gitignore) - ✅ DO: Use environment variables in shared environments
- ✅ DO: Rotate tokens after demos or testing sessions
- ✅ DO: Delete unused tunnels from bindus.directory
- ❌ DON’T: Commit
edge.config.jsonto version control - ❌ DON’T: Share tunnel URLs without authentication
- ❌ DON’T: Leave tunnels running when not in use
- ❌ DON’T: Use production credentials in tunneled agents
Performance Tips
- Close idle tunnels: Each tunnel consumes resources
- Use local testing first: Only tunnel when you need public access
- Monitor bandwidth: Large file transfers may be slow
- Check latency: Tunnel adds ~50-200ms latency depending on location
- Limit concurrent requests: Local machine may not handle production load
Git Configuration
Add to your.gitignore:
Comparison with Alternatives
| Feature | Bindu Edge | ngrok | localtunnel | SSH Tunnel |
|---|---|---|---|---|
| A2A Protocol Support | ✅ Native | ❌ No | ❌ No | ❌ No |
| Setup Complexity | ⭐ Simple | ⭐⭐ Medium | ⭐ Simple | ⭐⭐⭐ Complex |
| Authentication | ✅ Token | ✅ API Key | ❌ Public | 🔑 SSH Keys |
| DID Integration | ✅ Yes | ❌ No | ❌ No | ❌ No |
| Free Tier | ✅ Yes | ✅ Limited | ✅ Yes | ✅ Yes |
| Bindu Directory | ✅ Integrated | ❌ No | ❌ No | ❌ No |
| Custom Domains | ✅ Yes | 💰 Paid | ❌ No | ⚙️ Manual |
| WebSocket Support | ✅ Native | ✅ Yes | ✅ Yes | ✅ Yes |
Limitations
Current Limitations
- Development Only: Not recommended for production traffic
- Single Machine: One tunnel per local agent instance
- Bandwidth: Limited by your local internet connection
- Latency: Additional ~50-200ms compared to direct deployment
- Uptime: Depends on your local machine staying powered on
- Scalability: Cannot auto-scale like cloud deployments
Not Suitable For
❌ Production deployments - Use proper cloud hosting instead❌ High-traffic applications - Local bandwidth limitations
❌ Mission-critical services - No redundancy or failover
❌ 24/7 availability - Requires your machine to stay on
❌ Load balancing - Single instance only
When to Move to Production
Consider deploying to the cloud when you need:- ✅ High availability and uptime guarantees
- ✅ Auto-scaling based on traffic
- ✅ Load balancing across multiple instances
- ✅ Professional monitoring and alerting
- ✅ Disaster recovery and backups
- ✅ SLA commitments to users
FAQ
Is Bindu Edge free to use?
Is Bindu Edge free to use?
Yes! Bindu Edge is free for development and testing purposes. Check bindus.directory for current pricing and limits.
Can I use Bindu Edge for production?
Can I use Bindu Edge for production?
No, Bindu Edge is designed for development, testing, and demos only. For production deployments, use proper cloud hosting with Kubernetes, Docker, or serverless platforms.
How many tunnels can I create?
How many tunnels can I create?
Limits depend on your bindus.directory account tier. Free tier typically allows 1-3 concurrent tunnels. Check your dashboard for specifics.
What happens if my internet disconnects?
What happens if my internet disconnects?
The Edge client will automatically attempt to reconnect to the tunnel. If your local machine goes offline, the tunnel becomes inaccessible until reconnected.
Can I use a custom domain?
Can I use a custom domain?
Yes! Premium plans on bindus.directory support custom domain mapping. Contact support for configuration details.
Is my data secure through the tunnel?
Is my data secure through the tunnel?
Yes. All connections use WSS (WebSocket Secure) with TLS encryption, and authentication tokens prevent unauthorized access. However, never send sensitive production data through development tunnels.
Can multiple people access my tunneled agent?
Can multiple people access my tunneled agent?
Yes, anyone with the
public_url can access your agent. Use authentication at the agent level if you need access control.Does Edge Client work with Docker?
Does Edge Client work with Docker?
Yes! Just ensure Docker port mapping matches your
local_port configuration, and run the Edge client on the host machine or in a separate container with network access to your agent container.Next Steps
Now that you have Bindu Edge set up:Test Webhooks
Configure webhook integrations that require public URLs
Multi-Agent Testing
Test agent-to-agent communication with your local agent
Deploy to Production
Ready to go live? Learn how to deploy your agent properly
Join Community
Get help and share your Edge Client experiences
Related Resources
- Bindu Directory - Create and manage your tunnels
- A2A Protocol - Learn about agent-to-agent communication
- Agent Deployment - Production deployment guide
- Getting Help - Community support channels