Docs Self-Managed Manage Security Redpanda Console Security TLS Termination This is documentation for Self-Managed v23.3, which is no longer supported. To view the latest available version of the docs, see v24.3. TLS Termination To secure Redpanda Console using TLS (Transport Layer Security) in a self-hosted deployment, you can either let Redpanda Console handle TLS termination or you can offload it to an upstream component, such as a reverse proxy or a cloud HTTPS load balancer. TLS termination refers to the process of decrypting incoming TLS-encrypted traffic. Choosing the right approach depends on various factors, such as your application’s traffic load, the complexity of your infrastructure, security requirements, and resource availability: Redpanda Console handles TLS termination Advantages Drawbacks Simplicity: You don’t need an additional component to handle the TLS termination. Performance: TLS termination can be computationally expensive, especially for high-traffic applications. Control: Because the TLS termination happens within Redpanda Console, you have direct control over the process, which can be beneficial for troubleshooting and custom configurations. An upstream component handles TLS termination Advantages Drawbacks Performance: Offloading the task of TLS termination to another component can help improve the performance of Redpanda Console by reducing its computational load. Complexity: Using another component for TLS termination can increase the overall complexity of your system. Flexibility: You can use different types of upstream components (like various reverse proxies or load balancers) depending on your infrastructure needs and preferences. Simplicity: Reverse proxies like NGINX Ingress can integrate with other components such as cert-manager, which automatically renews certificates from LetsEncrypt. Use Redpanda Console for TLS termination When you use Redpanda Console to terminate the TLS connection, Redpanda Console starts two HTTP servers: An HTTPS server on the configured HTTPS port. An HTTP server on the configured HTTP port which redirects HTTP requests to the HTTPS port. Use this example YAML configuration to let Redpanda Console handle TLS: server: # httpsListenPort defines the port on which Redpanda Console is listening for TLS connections, while advertisedHttpsListenPort defines the port that is advertised to clients, which may be different due to network configurations such as load balancers or proxies. advertisedHttpsListenPort is needed when redirecting a HTTP request to an HTTPS URL. httpsListenPort: 443 advertisedHttpsListenPort: 443 listenPort: 8080 tls: enabled: true certFilepath: <path-to-cert> keyFilepath: <path-to-key> # AllowedOrigins is a list of origins that can send requests from a browser to the Redpanda Console # API. By default, a same-site policy is enforced to prevent CSRF-attacks. # Only in very specific deployment models you may need to change the secure default. # For example, during development, it's common to have the API server and the client running on different ports of localhost, which are treated as different origins by browsers. In this case, you would need to set `allowedOrigins` to include the origin of your client's development server. # allowedOrigins: [] Replace <path-to-cert> and <path-to-key> with the paths of your TLS certificate and key, respectively. In this example, Redpanda Console is serving HTTPS traffic on port 443, where both httpsListenPort and advertisedHttpsListenPort are set to the same value. Any requests to the listenPort 8080 are redirected to the advertisedHttpsListenPort. If you want Redpanda Console to serve HTTPS on a non-standard port like 8081, but you want to present the URL to users as though it’s serving on the standard HTTPS port 443, you can set httpsListenPort to 8081 and advertisedHttpsListenPort to 443. This configuration might be useful in development or testing scenarios. For example, if Redpanda Console’s internal address is https://192.168.1.100:8081 but externally it’s accessed through https://public-address.com:443, set httpsListenPort to 8081 and advertisedHttpsListenPort to 443. Despite listening internally on 8081, Redpanda Console will generate URLs for clients using port 443. If you host Redpanda Console under a sub-path of your domain, such as https://my-company.com/redpanda/console, configure HTTP path rewrites in Redpanda Console. Use an upstream component for TLS termination When you use an upstream component for TLS termination, the upstream component handles the secure TLS connection, and Redpanda Console receives unencrypted HTTP traffic from this component. You can use various upstream components, including reverse proxies, such as NGINX and HAProxy, as well as cloud HTTPS load balancers. To use this option, you must: Configure the upstream component to handle TLS termination. Ensure that the upstream component routes traffic to the address and port of Redpanda Console. Ensure that the upstream component is configured to pass along the original host header so that Redpanda Console can generate correct URLs, even when it’s behind a reverse proxy or load balancer. Disable TLS in Redpanda Console: server: listenPort: 8080 tls: enabled: false TLS is disabled by default. Although Redpanda Console isn’t using TLS, the traffic remains secure because the upstream component handles TLS. If you host Redpanda Console under a sub-path of your domain, such as https://my-company.com/redpanda/console, configure HTTP path rewrites in Redpanda Console. Suggested reading server configuration options. NGINX NGINX Beginner’s Guide NGINX SSL Termination HAProxy HAProxy Documentation HAProxy SSL Termination AWS Elastic Load Balancing Documentation Cloud Load Balancing Documentation OpenSSL Documentation Suggested labs Enable Plain Login Authentication for Redpanda ConsoleSearch all labs Back to top × Simple online edits For simple changes, such as fixing a typo, you can edit the content directly on GitHub. Edit on GitHub Or, open an issue to let us know about something that you want us to change. Open an issue Contribution guide For extensive content updates, or if you prefer to work locally, read our contribution guide . Was this helpful? thumb_up thumb_down group Ask in the community mail Share your feedback group_add Make a contribution Plain IAM Roles