Securing Weaviate with SSL/TLS
Why security matters: Understanding the risks
When your Weaviate database is exposed to the internet, unencrypted connections create serious vulnerabilities. Network packets can be intercepted at various points along their journey, exposing:
- Sensitive queries and search terms revealing what data you're working with
 - Vector embeddings and data payloads containing your proprietary information
 - Authentication credentials if transmitted without encryption
 - API keys and tokens that could grant unauthorized access to your systems
 
That's exactly why it's important to secure your database using SSL/TLS (Secure Sockets Layer/Transport Layer Security) — encryption protocols that create a secure, encrypted connection between your clients and your database. SSL/TLS ensures that even if network traffic is intercepted, the data remains unreadable to unauthorized parties.
If you're using Weaviate Cloud or other managed Weaviate services, SSL/TLS is already configured and managed for you. This guide is primarily for self-hosted deployments on virtual private servers (VPS), hyperscaler infrastructure (AWS, GCP, Azure), or on-premises environments where you need to expose Weaviate to external networks.
This guide will take you through three different options for securing your self-hosted database. Whether you're a small startup or an enterprise giant - there's a solution for you!
When is SSL/TLS required?
Although testing and local deployments might not necessitate network encryption, enabling SSL/TLS is considered a best practice for any production deployment, internal or external.
Understanding Weaviate's dual-port architecture
Before we dive into implementation, it's important to understand that Weaviate requires two separate endpoints, both of which need SSL/TLS protection:
| Default port | Purpose | Protocol | 
|---|---|---|
| 8080 | REST API and query interface (queries also available via gRPC) | HTTP | 
| 50051 | High-performance data operations and queries | gRPC | 
Port 6060 is used for Go profiling. In production deployments, this port should typically remain internal and not be exposed to the internet. If you need external access, apply the same SSL/TLS principles but ensure proper authentication is also in place.
This dual-port requirement adds complexity compared to traditional single-port applications, as each endpoint needs its own domain/subdomain and SSL certificate.
Choosing your security approach
While the possibilities are endless for securing your vector database, this guide walks you through 3 approaches with varying levels of complexity, cost, and scalability. Here's how to choose:
| Approach | Complexity | Best for | Infrastructure | Key benefits | 
|---|---|---|---|---|
| Option 1: Nginx Proxy Manager | Novice | Personal projects, GUI preference | Docker-based deployments | Easy GUI configuration, visual certificate management | 
| Option 2: Traefik | Intermediate | Growing companies, IaC workflows | Docker Compose environments | Automated configuration, Infrastructure as Code, container-native | 
| Option 3: Kubernetes + Cert-Manager | Advanced | Enterprise, production scale | Kubernetes clusters | Auto-renewal, high availability, enterprise-grade orchestration | 
- Options 1 & 2 are designed for Docker and Docker Compose deployments
 - Option 3 is exclusively for Kubernetes environments
 
Option 1: Using Nginx Proxy Manager
- Complexity level: Novice
 - Perfect for: Small business, teams who prefer ClickOps (GUI-based operations), or personal projects.
 - Infrastructure: Docker and Docker Compose required. This approach is specifically for Docker-based deployments and is not compatible with Kubernetes.
 
What you'll need:
- A VPS or server with a public IP address
 - A registered domain name with DNS management access
 - Docker and Docker Compose installed
 - Basic command-line knowledge
 
Step 1: Configure your DNS
- Before requesting SSL certificates, configure your DNS records:
 
A Record:    weaviate.yourdomain.com    → Your-Server-IP
A Record:    grpc.yourdomain.com        → Your-Server-IP
Use a wildcard DNS record (*.yourdomain.com) for easier subdomain management.
Make sure to wait for DNS propagation before proceeding.
Step 2: Create your shared Docker network
- Create a network for secure container communication:
 
docker network create weaviate-network
Security Benefit: By using a shared Docker network and not exposing Weaviate ports to the host, Weaviate is only accessible through the SSL-secured proxy, never directly from the internet.
Step 3: Deploy Weaviate
- Create a directory for your project:
 
mkdir ~/weaviate-ssl
cd ~/weaviate-ssl
- Create a 
docker-compose.ymlfile for Weaviate. 
---
services:
  weaviate:
    image: cr.weaviate.io/semitechnologies/weaviate:1.33.3
    container_name: weaviate
    restart: unless-stopped
    networks:
      - weaviate-network
    environment:
      QUERY_DEFAULTS_LIMIT: 25
      AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED: "false"
      PERSISTENCE_DATA_PATH: "/var/lib/weaviate"
      DEFAULT_VECTORIZER_MODULE: "none"
      CLUSTER_HOSTNAME: "node1"
    volumes:
      - weaviate_data:/var/lib/weaviate
volumes:
  weaviate_data:
networks:
  weaviate-network:
    external: true
- Start Weaviate:
 
docker-compose up -d
- Verify that it's running:
 
# Test from within the Docker network (this should work)
docker exec weaviate curl http://localhost:8080/v1/meta
# Test from host (this should fail - connection refused)
curl http://localhost:8080/v1/meta
Expected Result: The internal test succeeds, but the host test fails.
This confirms Weaviate is only accessible within the Docker network, not from the host or internet.
Step 4: Install Nginx Proxy Manager
- Create a separate directory:
 
mkdir ~/nginx-proxy-manager
cd ~/nginx-proxy-manager
- Create a 
docker-compose.ymlfile: 
services:
  app:
    image: "jc21/nginx-proxy-manager:latest"
    container_name: nginx-proxy-manager
    restart: unless-stopped
    networks:
      - weaviate-network
    ports:
      - "8080:80" # HTTP
      - "81:81" # Admin UI
      - "443:443" # HTTPS
    environment:
      DB_SQLITE_FILE: "/data/database.sqlite"
    volumes:
      - ./data:/data
      - ./letsencrypt:/etc/letsencrypt
networks:
  weaviate-network:
    external: true
- Start Nginx Proxy Manager
 
docker-compose up -d
Step 5: Access the admin interface
- Navigate to 
http://your-server-ip:81 
Default credentials
Email:    admin@example.com
Password: changeme
Change these credentials immediately after first login!
Step 6: Secure the HTTP endpoint
- Click Hosts -> Proxy hosts -> Add proxy host
 
Details Tab
| Field | Value | 
|---|---|
| Domain names | weaviate.yourdomain.com | 
| Scheme | http | 
| Forward Hostname/IP | weaviate | 
| Forward Port | 8080 | 
| Cache Assets | ✅ Checked | 
| Block Common Exploits | ✅ Checked | 
| Websockets Support | ✅ Checked | 
Why "weaviate"? Docker's internal DNS resolves container names within the same network. Nginx Proxy Manager can reach Weaviate at http://weaviate:8080 internally through the shared weaviate-network.
SSL Tab
| Field | Value | 
|---|---|
| SSL Certificate | Request a new SSL Certificate | 
| Force SSL | ✅ Checked | 
| HTTP/2 Support | ✅ Checked | 
| HSTS Enabled | ✅ Checked | 
| Email Address | your-email@example.com | 
- Agree to the TOS.
 - Click Save and wait 30-60 seconds for certificate provisioning.
 
Step 7: Secure the gRPC endpoints
- Create a second proxy host for gRPC:
 
Details tab
| Field | Value | 
|---|---|
| Domain Names | grpc.yourdomain.com | 
| Scheme | http | 
| Forward Hostname/IP | weaviate | 
| Forward Port | 50051 | 
| Block Common Exploits | ✅ Checked | 
| Websockets Support | ✅ Checked | 
SSL Tab Configure SSL the same way as the HTTP endpoint
Advanced Tab (Critical for gRPC)
Add this custom Nginx configuration:
grpc_pass grpc://localhost:50051;
grpc_set_header Host $host;
Click Save.
Step 8: Test your secure connection
Test from command line
# Test HTTP endpoint (this should work)
curl https://weaviate.yourdomain.com/v1/meta
# Test direct access (this should fail with a connection refused message)
curl http://your-server-ip:8080/v1/meta
# Verify SSL certificate
openssl s_client -connect weaviate.yourdomain.com:443 -servername weaviate.yourdomain.com < /dev/null
Test with Python client
import weaviate
# Connect to SSL-secured Weaviate
client = weaviate.connect_to_custom(
    http_host="weaviate.yourdomain.com",
    http_port=443,
    http_secure=True,
    grpc_host="grpc.yourdomain.com",
    grpc_port=443,
    grpc_secure=True
)
# Verify connection
print(f"✅ Connected: {client.is_ready()}")
client.close()
Option 2: Using Traefik and Docker
- Complexity level: Intermediate
 - Perfect for: Growing companies, devs who love automation, and container-based infrastructure.
 - Infrastructure: Docker and Docker Compose required. This approach uses Infrastructure as Code (IaC) principles and is designed for Docker environments, not Kubernetes.
 
This method introduces Infrastructure as Code (IaC) principles while remaining manageable. Traefik was built specifically for containerized environments. This approach is the perfect intermediary between the GUI of Option 1 and the pure Kubernetes of Option 3. You can think of this as the progression of learning another language: Option 1 was like using Duolingo or using a translation app, Option 2 is learning to speak the language without the use of a translation app, and Option 3 is becoming fluent.
What you'll need:
- Docker and Docker compose installed
 - Domain name with DNS configured
 - Understanding of Docker networking
 - Familiarity with YAML configuration
 
Step 1: Prepare your environment
# Create Docker network
docker network create traefik-network
# Create project directory
mkdir -p ~/weaviate-traefik/{traefik,letsencrypt}
cd ~/weaviate-traefik
Step 2: Configure DNS records
Before deploying, configure your DNS records to point to your server:
A Record:    weaviate.yourdomain.com    → Your-Server-IP
A Record:    grpc.yourdomain.com        → Your-Server-IP
DNS propagation can take 5-60 minutes. Verify with:
dig weaviate.yourdomain.com
dig grpc.yourdomain.com
Wait for DNS propagation before starting the services to ensure Let's Encrypt can validate your domain.
Step 3: Configure Traefik
- Create 
traefik/traefik.yml: 
api:
  dashboard: true
  insecure: false
# Entry points (ports)
entryPoints:
  web:
    address: ":80"
    http:
      redirections:
        entryPoint:
          to: websecure
          scheme: https
  websecure:
    address: ":443"
    http:
      tls:
        certResolver: letsencrypt
# Let's Encrypt configuration
certificatesResolvers:
  letsencrypt:
    acme:
      email: your-email@example.com
      storage: /letsencrypt/acme.json
      httpChallenge:
        entryPoint: web
# Docker provider
providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false
    network: traefik-network
log:
  level: INFO
Step 4: Create Docker Compose configuration
- Create 
docker-compose.yml: 
networks:
  traefik-network:
    external: true
services:
  traefik:
    image: traefik:v2.10
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    ports:
      - "80:80"
      - "443:443"
    volumes:
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./traefik/traefik.yml:/traefik.yml:ro
      - ./letsencrypt:/letsencrypt
    networks:
      - traefik-network
    labels:
      - "traefik.enable=true"
  weaviate:
    image: cr.weaviate.io/semitechnologies/weaviate:1.33.3
    container_name: weaviate
    restart: unless-stopped
    environment:
      QUERY_DEFAULTS_LIMIT: 25
      AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED: "false"
      PERSISTENCE_DATA_PATH: "/var/lib/weaviate"
      DEFAULT_VECTORIZER_MODULE: "none"
      CLUSTER_HOSTNAME: "node1"
    volumes:
      - weaviate_data:/var/lib/weaviate
    networks:
      - traefik-network
    labels:
      - "traefik.enable=true"
      # HTTP/REST API endpoint
      - "traefik.http.routers.weaviate-http.rule=Host(`weaviate.yourdomain.com`)"
      - "traefik.http.routers.weaviate-http.entrypoints=websecure"
      - "traefik.http.routers.weaviate-http.tls.certresolver=letsencrypt"
      - "traefik.http.routers.weaviate-http.service=weaviate-http"
      - "traefik.http.services.weaviate-http.loadbalancer.server.port=8080"
      # gRPC endpoint
      - "traefik.http.routers.weaviate-grpc.rule=Host(`grpc.yourdomain.com`)"
      - "traefik.http.routers.weaviate-grpc.entrypoints=websecure"
      - "traefik.http.routers.weaviate-grpc.tls.certresolver=letsencrypt"
      - "traefik.http.routers.weaviate-grpc.service=weaviate-grpc"
      - "traefik.http.services.weaviate-grpc.loadbalancer.server.port=50051"
      - "traefik.http.services.weaviate-grpc.loadbalancer.server.scheme=h2c" # Enables HTTP/2 Cleartext for gRPC
volumes:
  weaviate_data:
Don't forget to replace yourdomain.com with your actual domain!
Step 5: Set permissions and deploy
Before deploying, configure your DNS records to point to your server:
A Record:    weaviate.yourdomain.com    → Your-Server-IP
A Record:    grpc.yourdomain.com        → Your-Server-IP
The DNS propagation can take from 5-60 minutes, verify with:
dig weaviate.yourdomain.com
dig grpc.yourdomain.com
Wait for the DNS propagation before starting the services to ensure that Let's Encrypt can validate your domain.
# Set correct permissions for Let's Encrypt storage
touch ./letsencrypt/acme.json
chmod 600 ./letsencrypt/acme.json
# Start services
docker-compose up -d
# Monitor certificate acquisition
docker-compose logs -f traefik
Be sure to check for messages indicating successful certificate issuance.
Step 6: Verify your deployment
# Check running containers
docker-compose ps
# View certificates in acme.json
cat ./letsencrypt/acme.json | jq '.letsencrypt.Certificates[].domain'
# Test HTTP endpoint
curl https://weaviate.yourdomain.com/v1/meta
# Verify SSL certificate
openssl s_client -connect weaviate.yourdomain.com:443 -servername weaviate.yourdomain.com < /dev/null 2>/dev/null | grep "Verify return code"
Step 7: Connect with your application
import weaviate
client = weaviate.connect_to_custom(
    http_host="weaviate.yourdomain.com",
    http_port=443,
    http_secure=True,
    grpc_host="grpc.yourdomain.com",
    grpc_port=443,
    grpc_secure=True
)
try:
    print(f"✅ Connected: {client.is_ready()}")
    # Test basic operation
    collections = client.collections.list_all()
    print(f"Collections: {collections}")
finally:
    client.close()
Option 3: Using Kubernetes and Cert-Manager
- Complexity level: Advanced
 - Perfect for: Scalable applications, production environments and production environments.
 - Infrastructure: Kubernetes cluster required. This approach is exclusively for Kubernetes deployments and cannot be used with standalone Docker or Docker Compose setups.
 
What you'll need:
- Running Kubernetes cluster
 - kubectl configured with cluster access
 - Helm 3 installed
 - Domain with ability to update DNS to LoadBalancer IP
 - Strong Kubernetes knowledge
 
Step 1: Verify cluster access
# Check cluster info
kubectl cluster-info
# Verify you have proper permissions
kubectl auth can-i create namespace
# Check cluster version
kubectl version
Step 2: Install Cert-Manager
# Install Cert-Manager CRDs and controller
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.0/cert-manager.yaml
# Verify installation
kubectl get pods --namespace cert-manager
# Wait for all pods to be ready (may take 1-2 minutes)
kubectl wait --for=condition=ready pod \
  -l app.kubernetes.io/instance=cert-manager \
  -n cert-manager \
  --timeout=300s
Step 3: Install Traefik Ingress Controller
- Install Traefik:
 
# Add Traefik Helm repository
helm repo add traefik https://traefik.github.io/charts
helm repo update
# Create namespace
kubectl create namespace traefik
# Install Traefik with HTTPS redirect enabled (v34+ syntax)
helm install traefik traefik/traefik \
  --namespace traefik \
  --set ports.websecure.tls.enabled=true \
  --set "additionalArguments={--entrypoints.web.http.redirections.entrypoint.to=websecure,--entrypoints.web.http.redirections.entrypoint.scheme=https}"
# Verify installation
kubectl get pods -n traefik
kubectl get svc -n traefik
# Get LoadBalancer IP (may take 1-5 minutes)
kubectl get svc -n traefik traefik -w
After the installation, configure your DNS records:
A Record:    weaviate.yourdomain.com    → [Pending LoadBalancer IP]
A Record:    grpc.yourdomain.com        → [Pending LoadBalancer IP]
You'll update these with the actual LoadBalancer IP. DNS propagation can take a while, so configure these on time.
Step 4: Create Let's Encrypt ClusterIssuer
- Create 
letsencrypt-issuer.yaml: 
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: letsencrypt-prod
spec:
  acme:
    # Let's Encrypt production server
    server: https://acme-v02.api.letsencrypt.org/directory
    # Email for renewal and security notices
    email: your-email@example.com
    # Secret to store ACME account private key
    privateKeySecretRef:
      name: letsencrypt-prod-account-key
    # HTTP-01 challenge
    solvers:
      - http01:
          ingress:
            class: traefik
- Apply the issuer
 
kubectl apply -f letsencrypt-issuer.yaml
# Verify issuer is ready
kubectl get clusterissuer
kubectl describe clusterissuer letsencrypt-prod
Step 5: Deploy Weaviate
- Create 
weaviate-deployment.yaml: 
apiVersion: v1
kind: Namespace
metadata:
  name: weaviate
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
  name: weaviate-data
  namespace: weaviate
spec:
  accessModes:
    - ReadWriteOnce
  resources:
    requests:
      storage: 10Gi
---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: weaviate
  namespace: weaviate
  labels:
    app: weaviate
spec:
  replicas: 1
  selector:
    matchLabels:
      app: weaviate
  template:
    metadata:
      labels:
        app: weaviate
    spec:
      containers:
        - name: weaviate
          image: cr.weaviate.io/semitechnologies/weaviate:1.33.3
          ports:
            - containerPort: 8080
              name: http
            - containerPort: 50051
              name: grpc
          env:
            - name: QUERY_DEFAULTS_LIMIT
              value: "25"
            - name: AUTHENTICATION_ANONYMOUS_ACCESS_ENABLED
              value: "false"
            - name: PERSISTENCE_DATA_PATH
              value: "/var/lib/weaviate"
            - name: DEFAULT_VECTORIZER_MODULE
              value: "none"
            - name: CLUSTER_HOSTNAME
              value: "node1"
          volumeMounts:
            - name: weaviate-data
              mountPath: /var/lib/weaviate
          resources:
            requests:
              memory: "2Gi"
              cpu: "1000m"
            limits:
              memory: "4Gi"
              cpu: "2000m"
          livenessProbe:
            httpGet:
              path: /v1/.well-known/live
              port: 8080
            initialDelaySeconds: 30
            periodSeconds: 10
          readinessProbe:
            httpGet:
              path: /v1/.well-known/ready
              port: 8080
            initialDelaySeconds: 10
            periodSeconds: 5
      volumes:
        - name: weaviate-data
          persistentVolumeClaim:
            claimName: weaviate-data
---
apiVersion: v1
kind: Service
metadata:
  name: weaviate
  namespace: weaviate
  labels:
    app: weaviate
spec:
  type: ClusterIP
  ports:
    - port: 8080
      targetPort: 8080
      name: http
    - port: 50051
      targetPort: 50051
      name: grpc
  selector:
    app: weaviate
- Deploy Weaviate:
 
kubectl apply -f weaviate-deployment.yaml
# Verify deployment
kubectl get pods -n weaviate
kubectl get svc -n weaviate
# Wait for pod to be ready
kubectl wait --for=condition=ready pod \
  -l app=weaviate \
  -n weaviate \
  --timeout=300s
# Check logs
kubectl logs -n weaviate -l app=weaviate --tail=50
Step 6: Create Ingress with TLS
Kubernetes standard Ingress has limited gRPC support, in production Traefik's IngressRoute CRD is recommended. It provides native gRPC support with proper HTTP/2 handling, so it's more reliable for production deployments than standard Kubernetes Ingress.
- Create 
weaviate-ingressroute.yaml: 
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: weaviate-http-cert
  namespace: weaviate
spec:
  secretName: weaviate-http-tls
  issuerRef:
    name: letsencrypt-prod
    kind: ClusterIssuer
  dnsNames:
    - weaviate.yourdomain.com
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: weaviate-grpc-cert
  namespace: weaviate
spec:
  secretName: weaviate-grpc-tls
  issuerRef:
    name: letsencrypt-prod
    kind: ClusterIssuer
  dnsNames:
    - grpc.yourdomain.com
---
apiVersion: traefik.io/v1alpha1 
kind: IngressRoute
metadata:
  name: weaviate-http
  namespace: weaviate
spec:
  entryPoints:
    - websecure
  routes:
    - match: Host(`weaviate.yourdomain.com`)
      kind: Rule
      services:
        - name: weaviate
          port: 8080
  tls:
    secretName: weaviate-http-tls
---
apiVersion: traefik.io/v1alpha1  
kind: IngressRoute
metadata:
  name: weaviate-grpc
  namespace: weaviate
spec:
  entryPoints:
    - websecure
  routes:
    - match: Host(`grpc.yourdomain.com`)
      kind: Rule
      services:
        - name: weaviate
          port: 50051
          scheme: h2c # HTTP/2 Cleartext for gRPC
  tls:
    secretName: weaviate-grpc-tls
- Apply the configuration:
 
kubectl apply -f weaviate-ingressroute.yaml
# Verify IngressRoute creation
kubectl get ingressroute -n weaviate
# Watch certificate status
kubectl get certificate -n weaviate -w
# Verify certificates are issued
kubectl describe certificate weaviate-http-cert -n weaviate
kubectl describe certificate weaviate-grpc-cert -n weaviate
Step 7: Verify your SSL certificates
# Check certificate details
kubectl describe certificate weaviate-http-tls -n weaviate
# View the actual certificate
kubectl get secret weaviate-http-tls -n weaviate -o jsonpath='{.data.tls\.crt}' | \
  base64 -d | \
  openssl x509 -text -noout
# Check expiration date
kubectl get secret weaviate-http-tls -n weaviate -o jsonpath='{.data.tls\.crt}' | \
  base64 -d | \
  openssl x509 -noout -enddate
Step 8: Test your secure Weaviate
import weaviate
# Connect to Kubernetes-hosted Weaviate
client = weaviate.connect_to_custom(
    http_host="weaviate.yourdomain.com",
    http_port=443,
    http_secure=True,
    grpc_host="grpc.yourdomain.com",
    grpc_port=443,
    grpc_secure=True
)
try:
    print(f"✅ Connected: {client.is_ready()}")
    # Get metadata
    meta = client.get_meta()
    print(f"Weaviate version: {meta.get('version')}")
finally:
    client.close()
Questions and feedback
If you have any questions or feedback, let us know in the user forum.
