Qpoint Proxy can be deployed and managed either through the cloud control plane or locally via a YAML configuration file, depending on your operational preferences. This flexibility allows users to choose the setup that best suits their network and security requirements. The installation process is streamlined across multiple platforms with support for both binary and containerized deployments.

Installation Methods:

  1. Linux Binary Installation: Directly download and run the Qpoint Proxy binary for Linux and Darwin architectures. This method is suited for users who prefer manual setup and configuration via command-line flags or environment variables.

  2. Docker Container: Utilize Docker for a containerized deployment, which simplifies the process of setting up and scaling the proxy across multiple environments.

  3. Helm Chart: For orchestration at scale, deploy Qpoint Proxy using Helm charts on a Kubernetes cluster, ideal for enterprise-grade deployments.

Each installation method offers specific flags and environment variables to fine-tune the proxy’s behavior, logging, and network configurations to meet diverse operational needs. The proxy can be managed via a cloud-based control plane for ease of use and centralized management, or it can operate independently with configurations provided by a local YAML file.

Last updated