Secured and Non-secured Clusters
The following table explains the scenarios supported based on whether the clusters or secured or non- secured:
| Source Cluster | Destination Cluster | Running on Source | Running on Destination |
|---|---|---|---|
| Non-secured | Non-secured | Supported | Supported |
| Non-secured | Secured | Not Supported | Supported |
| Secured | Non-secured | Supported | Not Supported |
| Secured | Secured | Supported | Supported |