Your workflow just failed because the agent cannot reach its flow runner. You double-check VPNs, security groups, and firewall rules. Everything looks fine. The issue? A missing or misconfigured Prefect TCP Proxy. This tiny component determines whether your data pipelines move smoothly or grind to a halt behind a closed port.
Prefect TCP Proxies govern communication between Prefect agents and flow runners, especially in hybrid or air‑gapped setups. They route traffic securely over defined TCP channels so that workloads can run anywhere while maintaining strict network boundaries. When deployed correctly, proxies eliminate the need for sprawling inbound rules or manual SSH tunnels that turn secure networks into sieves.
At its core, the proxy acts as a managed bridge. It authenticates identity, keeps sessions encrypted, and scopes what’s reachable. Prefect agents initiate the connection outward, while the proxy opens a controlled path for Prefect Cloud or Orchestration servers to coordinate jobs. No random lateral movement, no surprise open ports, and no late-night “why is this on port 4200?” mysteries.
To set one up, focus on three flows: identity, permission, and automation. Tie authentication to an existing identity provider such as Okta or AWS IAM using OIDC. Map permissions using role-based control so only approved services can create or join proxy sessions. Then automate rotation of credentials and ephemeral ports to keep operations invisible to attackers and transparent to auditors.
Quick answer: Prefect TCP Proxies provide secure, outbound-only connectivity for Prefect agents and flow runners, removing the need for inbound firewall exceptions or static tunnels. They let internal workloads talk to managed orchestration services using encrypted, identity-aware connections.