Two solutions—Onsite Proxy and On-Prem Load Injector—allow you to simulate real user load on internal environments behind firewalls or restricted networks.
When to Choose What
Onsite Proxy
A lightweight proxy server resides inside your network, forwarding traffic from Dotcom‑Monitor’s cloud injectors to your internal app.
Choose Onsite Proxy if:
- You want to test internal applications with cloud-based scalability.
- Your app is behind a firewall but reachable via a proxy tunnel.
- You prefer minimal local infrastructure setup.
To install and start load testing internal applications with Onsite Proxy, please follow the guideline provided in the LoadView Onsite Proxy Agent Installation article.
On‑Prem Load Injector
You install a self‑managed injector server directly inside your network, generating test traffic locally.
Choose On-Prem LoadView Injector if:
- You cannot allow any external traffic to reach your app.
- You need complete control over test traffic inside a secured environment.
- Your test requires simulating ONLY local users from multiple internal endpoints.
Learn how to install and configure On-Prem Injector from the LoadView On-Prem Load Injector Installation & Configuration article.
Onsite Proxy vs. On-Prem LoadView Injector
Feature / Capability | Onsite Proxy | On-Prem Injector |
---|---|---|
Primary Use Case | Load test internal apps using LoadView’s cloud injectors | Load test internal apps using locally installed injectors |
Load Traffic Origin | Cloud-based injectors → Onsite Proxy → target app | Locally installed injector →target app |
Public Network Dependency during testing | Yes – LoadView cloud-based injectors initiate the test | No – test stays fully within internal network |
Typical Deployment | Proxy server inside LAN | Load injector server(s) inside LAN |
Firewall Changes | Allow proxy to establish outbound connection to LoadView | Allow injectors to establish outbound connection to LoadView |
Scaling Load Generation | Cloud handles scaling | Scaling by installing more local injectors |
Best For | Internal applications where load should still originate from the cloud, but needs to pass through the firewall | Internal-only or isolated networks where traffic must remain 100% inside |