Scaling for Edge Encryption Proxies – Sizing Your Edge Encryption Environment

Choosing the number of proxy servers for your environment is an important task. Because every environment is different, the advice in this article is stated as a guideline for choosing the configuration of your Edge Proxy environment.


Redundancy is important in case of hardware failure. Proxy Servers should be located behind a Load Balancer to provide a functional path for all users should a Proxy Server be unreachable due to hardware issues. For this reason, at least two Proxy Servers should be available at all times.


Sizing refers to the number of Proxy Servers required to avoid additional latency that the encryption of data produces. As with any added component in a system, running through the Proxy Server itself will provide additional latency. The idea is to minimize the amount of latency. The environment in which the Proxy Servers run will affect your individual configuration. For example, if regular Mass Encryptions are run, adding additional Proxy Servers to handle that load might be a good idea, or run the Mass Encryptions when the user load is light. The hardware on which the Proxy Server runs will also influence the performance of the Proxy Server. Proxy Servers running on hardware with faster CPUs, more CPUs, and more RAM will have higher throughput than slower limited systems. The sizing information in this section assumes that the Proxy Server is running on at least the minimum set of hardware.

As a standard rule-of-thumb, try to have one Proxy Server for every two App Nodes on the instance. For redundancy's sake, there should be a minimum of two Proxy Servers behind a Load Balancer. Beyond that rule-of-thumb, you can make a more accurate calculation by using the following formula:

Proxies = Max(Max Users / 500, 2)

Breaking this down, once you approach 500 users / Proxy Server, latencies are likely to start increasing. It is best to determine ahead of time when you will approach a threshold of an additional 500 users and to place another Proxy Server in the Load Balancer pool.

CPU Utilization

The CPU will spike while encrypting data, which is normal behavior. Data encryption and tokenization are CPU-intensive operations that will spike the CPU. When the CPU utilization is over 80% for several minutes at a time, it likely means that the Proxy Server has too much work to do (for example a Mass Encryption or some very complex work). When this happens, latency will increase for the period that the CPU utilization is high. If these persist, adding another proxy server might help decrease the latency.

Memory Utilization

The Proxy Server must have a minimum of 4GB of free RAM available to use (6GB is recommended). For this reason, best practice is to modify the <install dir>/conf/wrapper.conf configuration file.

The line:


Should be replaced by:


An upper bound is typically not set for memory utilization. This means that over time, the Proxy Server may utilize nearly all the remaining memory on the system. This is expected behavior if you do not have other services running on the Server. If this is the case, you may want to set the upper bound as well by modifying the following entry:


Article Information

Last Updated:2017-03-27 13:15:25