Table of Contents

Search

  1. Preface
  2. Advanced clusters
  3. Setting up AWS
  4. Setting up Google Cloud
  5. Setting up Microsoft Azure
  6. Setting up a self-service cluster
  7. Setting up a local cluster
  8. Advanced configurations
  9. Troubleshooting
  10. Appendix A: Command reference

Advanced Clusters

Advanced Clusters

Step 4. Configure a proxy for the cluster (optional)

Step 4. Configure a proxy for the cluster (optional)

Use a proxy server to create an indirect connection to network services for security and performance reasons. For example, you can use a proxy server to get through a firewall, and some proxies provide caching mechanisms.
To use a proxy server for the cluster, edit the proxy server for the Secure Agent. Exclude the IP addresses that you plan to assign to the cluster.
You can edit the proxy server details in the following file:
<Secure Agent installation directory>/apps/agentcore/conf/proxy.ini
Configure the property InfaAgent.NonProxyHost to exclude IP addresses.
Perform the following steps:
  1. Open the proxy.ini file.
  2. Update the value for InfaAgent.NonProxyHost to exclude the cluster IP addresses.
    For example, the following value uses two formats to exclude cluster IP addresses in the CIDR block 172.16.0.0/16:
    InfaAgent.NonProxyHost=localhost|127.|[\:\:1]|123.432.|172.16.*|172.16.0.0/16
    To use managed identity authentication to connect to a source or target, exclude the IP address for the metadata service, 169.254.169.254.
    The pipe character (|) is a delimiter that combines a list of host names and IP addresses. You can enter a wildcard to the left for host names or to the right for IP addresses.
  3. Restart the Secure Agent for the changes to take effect.
    The proxy details appear on the Secure Agent Manager settings page for the proxy server.
After the changes take effect, the Secure Agent communicates with the cluster without passing through the proxy, while commands to communicate with the cluster are required to pass through the proxy.
For more information about configuring a proxy to exclude non-proxy hosts, see
Runtime Environments
.

0 COMMENTS

We’d like to hear from you!