HTTPS Collector
What Is the SeaLights HTTPS Collector
The SeaLights HTTPS Collector is an on‑premise service provided by SeaLights that acts as an HTTPS proxy and middleware layer between SeaLights agents and the SeaLights SaaS backend.
It is designed to support scenarios where SeaLights agents cannot or should not communicate directly with SeaLights cloud endpoints, such as where time and bandwidth are limited, restricted networks, or security‑sensitive deployments.
Benefits:
Receives data and requests from SeaLights agents
Provides a web interface and logging details to monitor communication
Handles agent communication
Lambda
Handles the handshake communication between the agent and the backend allowing the agent to only send footprints which greatly reduces overhead and cost
Frontend
Handles the handshake communication between the agent and the backend allowing the agent to only send footprints which greatly reduces overhead
Handles the mapping of the method ID’s from the bundled code to the original code
Optionally allows to not include the token in the instrumented code when it might be a security risk to do so
Other agents
Optionally performs as a proxy providing a single endpoint between the agents and Sealights
Facilitating communication without capturing data independently
Enhances performance, reduces latency issues, minimizes outbound connections to Sealights servers, and serves as a local cache
Note: All agent requests are stored in memory and do not persist on disk, enabling better security auditing for customers by routing all traffic to the Sealights backend via the collector.
Security
All communications must be encrypted via TLS v1.2/1.3 according to the latest SSL security policy to safeguard network traffic. Supported cipher suites include:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
The TLS configuration involves enabling TLS, and if enabled, specifying the certificate and key data or their file paths. Additionally, CA certificates and P12 files with their passwords can be configured. The server must be accessible by Fully Qualified Domain Name (FQDN), and a TLS certificate for the FQDN must be provided.
Architecture Overview

Last updated
Was this helpful?

