Step 6. Configure a proxy for the cluster (optional)
Step 6. Configure a proxy for the cluster (optional)
Use a proxy server to create an indirect connection to network services for security and performance reasons. For example, you can use a proxy server to get through a firewall, and some proxies provide caching mechanisms.
To use a proxy server for the cluster, edit the proxy server for the Secure Agent. Exclude the
IP addresses that you plan to assign to the cluster. To use managed identity
authentication to connect to a source or target in a mapping in advanced mode,
verify that you exclude the IP address of the instance metadata service.
After the changes take effect, the Secure Agent communicates with the cluster without passing through the proxy, while commands to communicate with the cluster are required to pass through the proxy.
For more information about configuring
proxy settings, see