Skip to content

Enable HTTPS for exposed endpoints Proposal#666

Open
mayuka-c wants to merge 8 commits intoIBM:mainfrom
mayuka-c:podman-https
Open

Enable HTTPS for exposed endpoints Proposal#666
mayuka-c wants to merge 8 commits intoIBM:mainfrom
mayuka-c:podman-https

Conversation

@mayuka-c
Copy link
Copy Markdown
Member

@mayuka-c mayuka-c commented Apr 24, 2026

  • Proposal for enabling HTTPS
  • Comparing diff ways to configure SSL
  • Complete Implementation steps on how to use Caddy
  • Logic to do self signed certs or read the user defined certs

Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
@mayuka-c mayuka-c marked this pull request as ready for review April 24, 2026 07:28
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
Signed-off-by: mayuka-c <Mayuka.C@ibm.com>
@shwetha-s-poojary
Copy link
Copy Markdown
Member

Just one concern here - caddy becomes a shared point for TLS, certs, and routing, which means it’s a single point of failure. If it goes down or is misconfigured, we could lose access to everything even if the services are fine.
Should we think about a per-service sidecar proxy instead? It adds some overhead, but failures would be limited to one service.
Caddy is simpler, but the tradeoff here is simplicity vs better isolation and reliability.

cc: @mayuka-c @mkumatag @yussufsh

@mayuka-c
Copy link
Copy Markdown
Member Author

mayuka-c commented Apr 29, 2026

Just one concern here - caddy becomes a shared point for TLS, certs, and routing, which means it’s a single point of failure. If it goes down or is misconfigured, we could lose access to everything even if the services are fine. Should we think about a per-service sidecar proxy instead? It adds some overhead, but failures would be limited to one service. Caddy is simpler, but the tradeoff here is simplicity vs better isolation and reliability.

cc: @mayuka-c @mkumatag @yussufsh

Yeah SPOF is there since we run it as a single pod. But if misconfiguration is done it can be done to all other services that we are running as everything is running as single pod :)

Even if it goes down we do have the restartPolicy set to always restart the pod. In the worst case since the underlying data is present in the LPAR, it can be redeployed too.

Also, Please feel free to come up with the other approaches that you have in mind and we can evaluate the pros and cons. Also do consider all the scenarios so that everything is covered and how easy will it be to integrate as customers will bring in their own catalog and we need to make it seemeless for them to integrate with AI-Services.

Also what exactly is this side car proxy container and what does it do?

@mkumatag
Copy link
Copy Markdown
Member

which means it’s a single point of failure.

We need to check if they support multi-instance caddy, same problem do exist with NGINX or any global proxy like solution, customers using Podman should consider migrating to OpenShift if they require a more reliable and scalable architecture.

@mkumatag
Copy link
Copy Markdown
Member

Even if it goes down we do have the restartPolicy set to always restart the pod. In the worst case since the underlying data is present in the LPAR, it can be redeployed too.

instead of restart we need consider exploring how to recover only the proxy instead of an entire product reinstallation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants