Enabling secure traffic for Customizer
This guide describes the configuration changes and step-by-step procedures to enable TLS (HTTPS) traffic for Customizer (mw-proxy) in HCL Connections Component Pack environments. It complements the official documentation by providing a consolidated reference for enabling secure traffic.
Prerequisites
Before you begin, check the following prerequisites:
- Component Pack deployed. (see Set up Customizer)
- Existing TLS secret created for ingress controller (for example,
ingress-nginx-tls-secret). - Administrative access to Kubernetes cluster and NGINX/HAProxy configuration files.
How to enable TLS for Customizer
Perform the following steps to enable TLS (HTTPS) traffic for Customizer in HCL Connections Component Pack environments.
-
TLS certificate setup
Using existing ingress TLS secret: The
mw-proxyTLS implementation uses an existing ingress TLS secret. Follow these steps:-
Enter the following command to verify existing TLS secret:
kubectl get secret ingress-nginx-tls-secret -n <<namespace>> -
Enable TLS for ingress controller:
-
Follow the official guide: Enabling secure traffic to the ingress controller
-
Generate or obtain TLS certificates, if they are not already available. Refer to the previous step for the required steps to enable secure traffic to the ingress controller.
-
-
-
TLS enforcement configuration for Customizer (mw-proxy)
Reference: Configuring the Customizer component.
Follow these steps:
-
Update NGINX for secure proxying:
-
Configure NGINX to route Customizer traffic to
mw-proxyusing HTTPS (30443). Modify the file at<<NGINX_DIR>>/nginx.conf:Before TLS enablement (HTTP):
nginx location ~ ^/(files/customizer|files/app|communities/service/html|forums/html|search/web|homepage/web|social/home|mycontacts|wikis/home|blogs|news|activities/service/html|profiles/html|viewer) { proxy_pass http://proxy-server.com:30301; }After TLS enablement (HTTPS):
nginx location ~ ^/(files/customizer|files/app|communities/service/html|forums/html|search/web|homepage/web|social/home|mycontacts|wikis/home|blogs|news|activities/service/html|profiles/html|viewer) { proxy_pass https://proxy-server.com:30443; } -
Reload or restart the NGINX to apply the change.
sudo systemctl restart nginxVerification:
cat /etc/nginx/nginx.conf | grep -A 2 "location.*files/customizer"
-
-
-
(Optional) Update HAProxy for secure routing:
-
If applicable, configure the load balancer (for example, HAProxy) to route traffic to
mw-proxyon port30443. Modify the file at<<HAPROXY_DIR>>/haproxy.cfg:frontend haproxy_mwproxy_https bind *:30443 mode tcp option tcplog maxconn 100000 timeout client 10800s default_backend masters_mwproxy_https backend masters_mwproxy_https mode tcp option tcplog option tcp-check balance roundrobin default-server inter 10s downinter 5s rise 2 fall 2 slowstart 60s maxconn 1000 maxqueue 1024 weight 100 server <k8s-worker-1> <k8s-worker-1-hostname>:30443 check server <k8s-worker-2> <k8s-worker-2-hostname>:30443 check -
Reload or restart the HAProxy to apply the change.
sudo systemctl restart haproxyVerification:
cat /etc/haproxy/haproxy.cfg | grep -A 15 "frontend haproxy_mwproxy_https"
-
Parent topic: Configuring HTTPS Communication for the Component Pack