Secured and Non-secured Clusters
The following table explains the scenarios supported based on whether the clusters or secured or non- secured:
Source Cluster | Destination Cluster | Running on Source | Running on Destination |
---|---|---|---|
Non-secured | Non-secured | Supported | Supported |
Non-secured | Secured | Not Supported | Supported |
Secured | Non-secured | Supported | Not Supported |
Secured | Secured | Supported | Supported |