Supported configurations
Gcore Load Balancers support two types of TLS configurations:- Client to Load Balancer (TLS): Standard TLS termination using
TERMINATED_HTTPSprotocol. The Load Balancer presents a server certificate to clients. - Load Balancer to backend servers (mTLS): Mutual TLS where both the Load Balancer and backend servers exchange and verify certificates.
mTLS between clients and the Load Balancer is not supported. For client-facing connections, use standard TLS with the
TERMINATED_HTTPS protocol.Certificate parameters
Listener parameters (TLS termination):secret_id: PKCS12 certificate bundle forTERMINATED_HTTPSprotocolsni_secret_id: (Optional) Additional SNI PKCS12 certificate bundles for multi-domain support
secret_id: PKCS12 or PEM certificate bundle that the Load Balancer presents to backend servers for verificationca_secret_id: PEM CA certificate used by the Load Balancer to verify backend server certificatescrl_secret_id: (Optional) Certificate Revocation List to check if backend certificates are revoked
Prerequisites
- Active Gcore account with Load Balancer access
- TLS certificates in PKCS12 format for listener configuration
- CA certificates in PEM format for backend verification
- (Optional) Client certificate in PKCS12 or PEM format for Load Balancer authentication to backends
Configure TLS termination (Client to Load Balancer)
1. Create server certificate secret
Create a PKCS12 certificate bundle using the/v2/secrets endpoint:
2. Create listener with TLS termination
Create a listener withTERMINATED_HTTPS protocol:
Configure mTLS (Load Balancer to backend servers)
1. Create CA certificate secret
Create a PEM CA certificate using the/v1/secrets endpoint:
2. (Optional) Create Load Balancer client certificate
If backend servers require client authentication, create a certificate that the Load Balancer presents to backends:3. Create pool with mTLS configuration
Create a pool withHTTPS protocol and mTLS parameters:
ca_secret_id parameter enables the Load Balancer to verify backend server certificates. The secret_id parameter provides the client certificate for mutual authentication.
Add mTLS to existing Load Balancer
1. Create required secrets
Follow the steps above to create certificate secrets.2. Update pool with mTLS configuration
Secret creation endpoints
| Certificate type | Endpoint | Format |
|---|---|---|
| Listener server certificate | /v2/secrets | PKCS12 |
| Listener SNI certificates | /v2/secrets | PKCS12 |
| Pool client certificate | /v2/secrets | PKCS12 or PEM |
| Pool CA certificate | /v1/secrets | PEM |
| Pool CRL | /v1/secrets | PEM |
Each API call returns a
task_id. Wait for task completion before proceeding to the next step.