All posts

What TCP Proxies TeamCity Actually Does and When to Use It

Teams hit an invisible wall the moment private build agents or internal repositories enter their pipeline. The code works, the tests pass, but network boundaries don’t care. That is where TCP proxies come in, and in the case of TeamCity, they decide whether your CI jobs talk freely or choke on connection errors. TCP Proxies TeamCity is about controlled connectivity. TeamCity orchestrates builds and deployments, often across segmented networks. A TCP proxy provides that middle layer of trust bet

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Teams hit an invisible wall the moment private build agents or internal repositories enter their pipeline. The code works, the tests pass, but network boundaries don’t care. That is where TCP proxies come in, and in the case of TeamCity, they decide whether your CI jobs talk freely or choke on connection errors.

TCP Proxies TeamCity is about controlled connectivity. TeamCity orchestrates builds and deployments, often across segmented networks. A TCP proxy provides that middle layer of trust between your CI server and those restricted services. It’s the quiet diplomat that lets your build agent securely reach a database, artifact store, or internal API without turning your VPC into Swiss cheese.

At a high level, TeamCity routes job requests through a configured proxy host and port. The proxy intercepts outbound TCP connections, authenticates them, and then relays traffic to approved destinations. This enables consistency: every agent follows the same policy, logs are centralized, and credentials stay out of the build steps. No one ever wants credentials written to Docker layers again.

When configured properly, the workflow looks like this: you define your proxy endpoint in TeamCity’s connection settings, your agents use that route for outbound builds, and your security stack logs every session. The actual routing can be identity-aware, mapping user groups from Okta or OIDC claims to specific policies. Think AWS IAM meets the network layer, but without the overhead of managing ephemeral tunnels for each job.

If your pipeline hangs on “Connection refused,” it’s usually a policy or DNS issue. Before blaming the proxy, check how your agents resolve internal hostnames, and confirm that the proxy supports both IPv4 and IPv6 if your infrastructure mixes them. Rotate proxy credentials the same way you rotate API keys, ideally through an automated secret manager. This keeps the channel alive, not stale.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Here’s the simple truth you could lift for a featured snippet: A TCP proxy in TeamCity provides controlled, auditable access from build agents to private resources by routing all network calls through a managed intermediary.

Key Benefits

  • Unified control: One entry point for all outbound traffic.
  • Audit-first logging: Every build’s network footprint is recorded for compliance.
  • Reduced risk: No direct credentials or open ports inside builds.
  • Network reliability: Fewer failed connections across hybrid environments.
  • Fast recovery: Swap proxy targets or rules without changing build steps.

Developers notice the change right away. Less time chasing access tickets, more time merging code. The right setup improves developer velocity, trims CI wait times, and simplifies remote debugging. That’s real operational speed, not theory.

Platforms like hoop.dev turn those proxy policies into codified guardrails. Instead of manually updating every agent, you define once and apply everywhere, so CI traffic always honors your security posture while staying fast enough to keep the build queue moving.

How do I connect TeamCity to a TCP proxy?

Point your TeamCity server or build agents to the proxy host and port, define allowed destinations, and authenticate using the same identity provider that guards your production systems. The proxy then mediates every session under consistent policies, giving you full visibility and control.

TeamCity plus TCP proxies equals freedom under policy. It is the rare combo that gives both speed and security without compromise.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts