Step 6. Configure a proxy for the cluster (optional)
Step 6. Configure a proxy for the cluster (optional)
Use a proxy server to create an indirect connection to network services for security and performance reasons. For example, you can use a proxy server to get through a firewall, and some proxies provide caching mechanisms.
To use a proxy server for the cluster, edit the proxy server for the Secure Agent. Exclude the IP addresses that you plan to assign to the cluster.
You can edit the proxy server details in the following file:
To use managed identity authentication to connect to a source or target, exclude the IP address for the metadata service, 169.254.169.254.
The pipe character (|) is a delimiter that combines a list of host names and IP addresses. You can enter a wildcard to the left for host names or to the right for IP addresses.
Restart the Secure Agent for the changes to take effect.
The proxy details appear on the Secure Agent Manager settings page for the proxy server.
After the changes take effect, the Secure Agent communicates with the cluster without passing through the proxy, while commands to communicate with the cluster are required to pass through the proxy.
For more information about configuring a proxy to exclude non-proxy hosts, see