You finally get your performance tests humming at scale, then corporate security swoops in and routes all outbound traffic through Zscaler. Half your LoadRunner scripts start failing. Welcome to the real world, where performance and zero trust collide.
LoadRunner excels at simulating thousands of virtual users to test real load conditions. Zscaler, on the other hand, acts as your organization’s secure gateway to the internet, enforcing identity, DLP, and policy control. The challenge is that the two tools see the world differently. LoadRunner expects transparent network paths. Zscaler insists on user identity and compliance checks. Integrating the pair means teaching your test traffic to identify itself like a legitimate user, without throttling performance.
The key is to align LoadRunner’s runtime settings with Zscaler’s authentication and proxy models. Start by registering the Load Generator machines in your identity provider, such as Okta or Azure AD, using service or non-interactive accounts that Zscaler can validate. Then configure these generators to pass through Zscaler’s SSL or PAC-based proxy transparently. The idea is to make performance test traffic visible, not suspicious.
How do I connect LoadRunner and Zscaler?
Define proxy details in LoadRunner’s Runtime Settings under Network → Proxy, pointing to your local Zscaler connector. Use the same authentication mode your corporate clients employ, ideally via identity tokens rather than static credentials. Verify with a simple single-user test before scaling up.
If your environment routes everything through Zscaler Client Connector, isolate test machines and bind them to Zscaler policies that recognize LoadRunner test accounts. Disable SSL inspection selectively for known test endpoints to reduce handshake overhead. Zscaler logs will then mirror legitimate load behavior instead of flooding alerts.