<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>IBM HTTPServer on </title>
    <link>https://stoeps.de/tags/ibm-httpserver/</link>
    <description>Recent content in IBM HTTPServer on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>christoph.stoettner@stoeps.de (Christoph Stoettner)</managingEditor>
    <webMaster>christoph.stoettner@stoeps.de (Christoph Stoettner)</webMaster>
    <copyright>© 2026 Christoph Stoettner</copyright>
    <lastBuildDate>Thu, 16 Oct 2025 15:00:00 +0200</lastBuildDate><atom:link href="https://stoeps.de/tags/ibm-httpserver/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Encrypt Customizer Traffic in HCL Connections Component Pack</title>
      <link>https://stoeps.de/posts/2025/secure_customizer_traffic/</link>
      <pubDate>Thu, 16 Oct 2025 15:00:00 +0200</pubDate>
      <author>christoph.stoettner@stoeps.de (Christoph Stoettner)</author>
      <guid>https://stoeps.de/posts/2025/secure_customizer_traffic/</guid>
      <description>&lt;div class=&#34;admonition relative overflow-hidden rounded-lg border-l-4 my-3 px-4 py-3 shadow-sm&#34; data-type=&#34;warning&#34;&gt;&#xA;      &lt;div class=&#34;flex items-center gap-2 font-semibold text-inherit&#34;&gt;&#xA;        &lt;div class=&#34;flex shrink-0 h-5 w-5 items-center justify-center text-lg&#34;&gt;&lt;span class=&#34;relative block icon&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 512 512&#34;&gt;&lt;path fill=&#34;currentColor&#34; d=&#34;M506.3 417l-213.3-364c-16.33-28-57.54-28-73.98 0l-213.2 364C-10.59 444.9 9.849 480 42.74 480h426.6C502.1 480 522.6 445 506.3 417zM232 168c0-13.25 10.75-24 24-24S280 154.8 280 168v128c0 13.25-10.75 24-23.1 24S232 309.3 232 296V168zM256 416c-17.36 0-31.44-14.08-31.44-31.44c0-17.36 14.07-31.44 31.44-31.44s31.44 14.08 31.44 31.44C287.4 401.9 273.4 416 256 416z&#34;/&gt;&lt;/svg&gt;&#xA;&lt;/span&gt;&lt;/div&gt;&#xA;        &lt;div class=&#34;grow&#34;&gt;&#xA;          Warning&#xA;        &lt;/div&gt;&#xA;      &lt;/div&gt;&lt;div class=&#34;admonition-content mt-3 text-base leading-relaxed text-inherit&#34;&gt;&lt;p&gt;The is just a proof of concept and shouldn&amp;rsquo;t be used in production! I still have some issues with redirects to the new hostname.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;In the series of encrypting network traffic within HCL Connections and Component Pack:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://stoeps.de/posts/2025/encrypt_ihs_proxypass_to_cp/&#34; &gt;Encrypt IHS Proxypass Traffic To Component Pack&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://stoeps.de/posts/2025/securing_redis_traffic_in_hcl_connections/&#34; &gt;Securing Redis Traffic in HCL Connections with SSH Tunnels&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;the customizer part is missing. In a default configuration (or when you install as documented), the traffic from IHS and NGINX that is forwarded to the customizer (mw-proxy) and Ingress is unencrypted.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://stoeps.de/posts/2025/secure_customizer_traffic/feature.jpg" />
    </item>
    
    <item>
      <title>Encrypt IHS proxypass traffic to Component Pack</title>
      <link>https://stoeps.de/posts/2025/encrypt_ihs_proxypass_to_cp/</link>
      <pubDate>Fri, 23 May 2025 21:30:00 +0200</pubDate>
      <author>christoph.stoettner@stoeps.de (Christoph Stoettner)</author>
      <guid>https://stoeps.de/posts/2025/encrypt_ihs_proxypass_to_cp/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m still working on encrypting all network traffic between Connections and Component Pack servers. This time I checked the &lt;a href=&#34;https://kubernetes.github.io/ingress-nginx/user-guide/tls/&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;Ingress-Nginx Controller - TLS/HTTPS&lt;/a&gt; documentation.&lt;/p&gt;&#xA;&lt;p&gt;The default configuration for connecting IHS with Component Pack uses the plain HTTP port 32080. All traffic like &lt;code&gt;/social&lt;/code&gt; or the Tailored Experience wizard is routed from IHS to Kubernetes on port 32080.&lt;/p&gt;&#xA;&lt;p&gt;Our target is to encrypt the traffic on port 32443.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://stoeps.de/posts/2025/encrypt_ihs_proxypass_to_cp/feature.jpg" />
    </item>
    
  </channel>
</rss>
