Skip to content

DOCS-2202 SSL termination - final version#1933

Open
egoverdovskaya-wallarm wants to merge 1 commit intomasterfrom
feature/docs-2204-SSL-termination-3
Open

DOCS-2202 SSL termination - final version#1933
egoverdovskaya-wallarm wants to merge 1 commit intomasterfrom
feature/docs-2204-SSL-termination-3

Conversation

@egoverdovskaya-wallarm
Copy link
Copy Markdown
Contributor

No description provided.

@netlify
Copy link
Copy Markdown

netlify bot commented Feb 23, 2026

Deploy Preview for pensive-dubinsky-5f7a00 ready!

Name Link
🔨 Latest commit c6a5aa0
🔍 Latest deploy log https://app.netlify.com/projects/pensive-dubinsky-5f7a00/deploys/699c06c45f46b9000897bd48
😎 Deploy Preview https://deploy-preview-1933--pensive-dubinsky-5f7a00.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.


# SSL/TLS Termination and Certificate Management (Self-Hosted Nodes)

This article describes how SSL/TLS termination and certificate management work in self-hosted Wallarm nodes (including NGINX and Native Nodes), and how HTTPS traffic is processed for analysis.
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"NGINX and Native Nodes" - add the link to https://docs.wallarm.com/installation/nginx-native-node-internals/

[security-edge]: ../installation/security-edge/overview.md
[aws-ami]: ../installation/cloud-platforms/aws/ami.md
[gcp]: ../installation/cloud-platforms/gcp/machine-image.md

Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the question which is not covered by the article - how do a customer choose where SSL/TLS termination should happen?

[aws-ami]: ../installation/cloud-platforms/aws/ami.md
[gcp]: ../installation/cloud-platforms/gcp/machine-image.md


Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the article is currently missing the details on mTLS. it is probably a separate task but we need to describe the way the Node proxies traffic further - plan HTTPS/HTTPS and how to configure it


You need to:

1. Issue a certificate from a trusted Certificate Authority (CA) for a Wallarm Node instance.
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

for a Wallarm Node instance? usually, the certificate is requested for protected endpoints, not the Node instance. for example, in the article for sidecar, we ask a user to request certificates for "the server for which the Sidecar will terminate SSL/TLS" https://deploy-preview-1933--pensive-dubinsky-5f7a00.netlify.app/installation/kubernetes/sidecar-proxy/customization/#ssltls-termination


To automate these actions, you can use external tools, e.g., [Certbot](https://certbot.eff.org/), [HashiCorp Vault](https://developer.hashicorp.com/vault), [Kubernetes cert-manager](https://cert-manager.io/), [Ansible playbooks](https://docs.ansible.com/projects/ansible/devel/playbook_guide/playbooks_intro.html), or others.

![SSL/TLS termination in the NGINX Nosw](../images/admin-guides/ssl-tls-termination.png)
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
![SSL/TLS termination in the NGINX Nosw](../images/admin-guides/ssl-tls-termination.png)
![SSL/TLS termination in the NGINX Node](../images/admin-guides/ssl-tls-termination.png)



# SSL/TLS Termination and Certificate Management (Self-Hosted Nodes)

Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Avoid narrowing the scope to “HTTPS” in conceptual sections: since Wallarm also analyzes WebSocket, gRPC, etc., use broader wording like “SSL/TLS-protected application traffic” or “application-layer traffic” instead of “HTTPS traffic” where possible.

```

1. Monitor the certificate's validity and renew it before expiration.

Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

after the NGINX config steps, include basic verification steps like config test, confirm Wallarm receives traffic

proxy_pass https://10.100.100.30; # Replace with the IP address of the origin server
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why is proxy_set_header specified twice?


To automate these actions, you can use external tools, e.g., [Certbot](https://certbot.eff.org/), [HashiCorp Vault](https://developer.hashicorp.com/vault), [Kubernetes cert-manager](https://cert-manager.io/), [Ansible playbooks](https://docs.ansible.com/projects/ansible/devel/playbook_guide/playbooks_intro.html), or others.

![SSL/TLS termination in the NGINX Nosw](../images/admin-guides/ssl-tls-termination.png)
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

comments for the diagram:

  1. or Firewall or WAF - just keep "Firewall" because WAF is a firewall. inctead of "WAF" here can be "Ingress Controller" for example. and it is good to add "etc." to the list of upstream components
  2. the concept of the diagram is unclear. for example, see the diagram for mTLS in SE inline https://docs.wallarm.com/installation/security-edge/inline/mtls/ - it clearly describes the stages of decryption. I would say that the current diagram also should reflect that
  3. I would create 2 diagrams: one is for decryption on the upstream level and another is for decryption on the Node

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants