Upon installation, the Netdata Agent serves the local dashboard at port
19999. If the node is accessible to the
internet at large, anyone can access the dashboard and your node's metrics at
http://NODE:19999. We made this decision
so that the local dashboard was immediately accessible to users, and so that we don't dictate how professionals set up
and secure their infrastructures.
Despite this design decision, your data and your
systems are safe with Netdata. Netdata is read-only,
cannot do anything other than present metrics, and runs without special/
sudo privileges. Also, the local dashboard
only exposes chart metadata and metric values, not raw data.
While Netdata is secure by design, we believe you should protect your nodes. If left accessible to the internet at large, the local dashboard could reveal sensitive information about your infrastructure. For example, an attacker can view which applications you run (databases, webservers, and so on), or see every user account on a node.
Instead of dictating how to secure your infrastructure, we give you many options to establish security best practices that align with your goals and your organization's standards.
- Disable the local dashboard: Simplest and recommended method for those who have added nodes to Netdata Cloud and view dashboards and metrics there.
- Restrict access to the local dashboard: Allow local dashboard access from only certain IP addresses, such as a trusted static IP or connections from behind a management LAN. Full support for Netdata Cloud.
- Use a reverse proxy: Password-protect a local dashboard and enable TLS to secure it. Full support for Netdata Cloud.
This is the recommended method for those who have claimed their nodes to Netdata Cloud and prefer viewing real-time metrics using the War Room Overview, Nodes view, and Cloud dashboards.
You can disable the local dashboard (and API) but retain the encrypted Agent-Cloud link (ACLK) that allows you to stream metrics on demand from your nodes via the Netdata Cloud interface. This change mitigates all concerns about revealing metrics and system design to the internet at large, while keeping all the functionality you need to view metrics and troubleshoot issues with Netdata Cloud.
./edit-config netdata.conf. Scroll down to the
[web] section, and find the
static-threaded setting, and change it to
Save and close the editor, then restart your Agent using
restart netdata. If you try to visit the local dashboard to
http://NODE:19999 again, the connection will fail because
that node no longer serves its local dashboard.
See the configuration basics doc for details on how to find
If you want to keep using the local dashboard, but don't want it exposed to the internet, you can restrict access with access lists. This method also fully retains the ability to stream metrics on-demand through Netdata Cloud.
allow connections from setting helps you allow only certain IP addresses or FQDN/hostnames, such as a trusted
static IP, only
localhost, or connections from behind a management LAN.
By default, this setting is
localhost *. This setting allows connections from
localhost in addition to all
connections, using the
* wildcard. You can change this setting using Netdata's simple
allow connections from setting is global and restricts access to the dashboard, badges, streaming, API, and
netdata.conf, but you can also set each of those access lists more granularly if you choose:
See the web server docs for additional details about access lists. You can take access lists one step further by enabling SSL to encrypt data from local dashboard in transit. The connection to Netdata Cloud is always secured with TLS.
You can also put Netdata behind a reverse proxy for additional security while retaining the functionality of both the local dashboard and Netdata Cloud dashboards. You can use a reverse proxy to password-protect the local dashboard and enable HTTPS to encrypt metadata and metric values in transit.
Next up, learn about collectors to ensure you're gathering every essential metric about your node, its applications, and your infrastructure at large.