Skip to content

Document TLS termination tradeoffs in Azure HA/autoscale READMEs#5

Merged
dmchaledev merged 1 commit into
mainfrom
claude/review-terraform-modules-mN9Ur
May 21, 2026
Merged

Document TLS termination tradeoffs in Azure HA/autoscale READMEs#5
dmchaledev merged 1 commit into
mainfrom
claude/review-terraform-modules-mN9Ur

Conversation

@dmchaledev
Copy link
Copy Markdown
Contributor

Summary

Added documentation to the Azure ha-hot-hot and unlimited-scale module READMEs explaining TLS termination behavior and production deployment recommendations. This clarifies an existing behavior that was previously undocumented.

Changes

  • Azure ha-hot-hot README: Added "TLS termination" section explaining that the default Standard Load Balancer uses TCP passthrough on 443, causing browser warnings since the VM's self-signed certificate CN (per-VM hostname) doesn't match the LB public IP or DNS records. Documented two production options: enabling Application Gateway with a valid PFX certificate (recommended), or fronting with an upstream L7 LB/reverse proxy.

  • Azure unlimited-scale README: Added equivalent "TLS termination" section with similar guidance, noting the additional complexity that VMSS instances rotate on autoscale and rolling refresh, making certificate churn more visible to operators.

  • CHANGELOG.md: Added documentation entry under new "Documentation" section noting this clarification of existing behavior and the recommended production deployment patterns.

Implementation Details

  • No code changes; this documents existing behavior that was previously silent
  • Guidance aligns with the corresponding hailbytes-asm / hailbytes-sat changes that now use per-VM IMDS hostnames for certificate CNs
  • Provides clear decision tree for operators: dev/PoC can use default mode, production should use Application Gateway (recommended) or upstream L7 LB
  • Highlights that Application Gateway also unlocks waf_policy_id for WAF parity with AWS ALB deployments

https://claude.ai/code/session_018piCyGQ4rHxkdBdYXa5zGf

The default frontend on ha-hot-hot/azure and unlimited-scale/azure is the
Standard Load Balancer (TCP passthrough on 443), so the browser terminates
TLS against the VM's self-signed cert. The marketplace AMI's setup.sh now
generates that cert with the per-VM IMDS hostname as the CN, which never
matches the LB public IP or any DNS record customers point at it.

Existing behavior, previously undocumented. Steer production customers at
enable_application_gateway = true with a real PFX (or a BYO upstream L7).

https://claude.ai/code/session_018piCyGQ4rHxkdBdYXa5zGf
@dmchaledev dmchaledev merged commit 831cad4 into main May 21, 2026
78 of 79 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants