Picture this: your Looker instance needs to reach a private database inside a locked-down cloud network. You could open up the firewall and live dangerously, or you could route traffic through a proper TCP proxy that respects identity and security controls. That’s where Looker TCP Proxies shine—quietly bridging analytics and infrastructure without leaking credentials or breaking compliance.
At its core, Looker uses TCP proxies to connect to remote data sources while keeping Looker itself out of restricted networks. The proxy becomes a narrow, auditable path for queries. It works especially well when teams pair it with an identity-aware access model, using Okta, AWS IAM, or OIDC to define who can connect and when. Instead of relying on static secrets, proxies verify trust every time traffic flows.
Here’s the workflow in practice. The Looker application sends SQL traffic through the TCP proxy, which validates identity and then relays queries into the protected network. The database responds, wrapped inside that same encrypted tunnel, keeping audit logs crisp and security teams happy. Permissions map through the proxy, not directly into Looker, which makes compliance reviews far less painful. Every hop is known, verified, and logged.
If you’ve run into issues like stale credentials or timeout chaos, check these basics first. Rotate proxy certificates often. Avoid overlapping DNS routes when running multiple environments. Align your proxy identity mapping with your central RBAC policies. A one-line mismatch in a role assumption policy can cause hours of confusion, and nobody enjoys debugging blind SQL tunnels.
Featured snippet answer: Looker TCP Proxies let your Looker instance access data housed in private or restricted networks by routing queries through a secure, identity-aware tunnel. They protect credentials, simplify audits, and maintain compliance without exposing the underlying systems.