Skip to main content

Securing Netdata Agents

By default, your Netdata Agent exposes its local dashboard on port 19999. If your node has a public IP address, the dashboard and metrics are accessible to anyone at http://NODE:19999.

You can protect your Agents by implementing any of these security measures:

Security Approaches

Disable the Local Dashboard

Best for: Users who monitor their systems through Netdata Cloud dashboards

You can secure your nodes by disabling local dashboard access while maintaining Cloud monitoring capabilities. This eliminates public exposure of metrics and system information while maintaining secure metrics viewing through Netdata Cloud via ACLK.

Edit the [web] section in netdata.conf using the edit-config script:

[web]
mode = none

Restart your Agent to apply changes. After restart, the local dashboard (http://NODE:19999) will no longer be accessible, but all metrics remain available through Netdata Cloud.

tip

For Docker deployments, set NETDATA_HEALTHCHECK_TARGET=cli in your environment variables.

Use Netdata Parents as Web Application Firewalls

Best for: Production systems requiring layered security and centralized access control

You can enhance security by deploying Parent nodes as border gateways, eliminating the need for direct internet access from production Agents.

Parent nodes provide security by:

  • Acting as application firewalls
  • Receiving metrics from Child Agents securely
  • Serving dashboard requests using local data
  • Maintaining Netdata Cloud connectivity through encrypted connection
info

This approach isolates production systems from direct internet exposure, even when using Netdata Cloud.

For more information, see Observability Centralization Points.

Alternative Methods

Restrict Dashboard Access to Private Networks

Best for: Organizations with private management networks

You can enhance security by binding the Agent to your organization's private management network interface. This limits dashboard access to your administrative LAN only.

Configuration:

Edit the [web] section in netdata.conf using the edit-config script:

[web]
bind to = 10.1.1.1:19999 localhost:19999

The Agent supports binding to multiple IPs and ports. When using hostnames, all resolved IPs will be used (for example, localhost typically resolves to both 127.0.0.1 and ::1).

Cloud Environment Setup:

For cloud environments without private LAN capabilities or multi-cloud deployments, you can create a virtual management network using mesh VPN tools like tincd or gvpe. These tools enable secure, private communication between servers while allowing administration stations to access management functions across your cloud infrastructure.

For gvpe specifically, we maintain a deployment tool that includes pre-compiled binaries for Linux and FreeBSD, macOS compilation script, and configuration templates. We use this tool to manage our Netdata demo sites across multiple hosting providers.

Configure Granular Access Control

Best for: Specific IP address or hostname-based access requirements

You can restrict access to your local dashboard while maintaining Netdata Cloud connectivity by using access lists.

Basic Access Control:

Edit the [web] section in netdata.conf using the edit-config script.

Use the allow connections from setting to permit specific IP addresses or hostnames:

[web]
# Allow only localhost connections
allow connections from = localhost

# Allow only from management LAN running on `10.X.X.X`
allow connections from = 10.*

# Allow connections only from a specific FQDN/hostname
allow connections from = example*

The default setting localhost * allows both localhost and all external connections. You can customize this using Netdata's simple patterns.

Advanced Feature-Specific Controls:

While allow connections from globally controls access to all Netdata services, you can set specific permissions for individual features:

[web]
allow connections from = localhost *
allow dashboard from = localhost *
allow badges from = *
allow streaming from = *
allow netdata.conf from = localhost fd* 10.* 192.168.* 172.16.* 172.17.* 172.18.* 172.19.* 172.20.* 172.21.* 172.22.* 172.23.* 172.24.* 172.25.* 172.26.* 172.27.* 172.28.* 172.29.* 172.30.* 172.31.*
allow management from = localhost

Additional Security Options:

Deploy a Reverse Proxy

Best for: Multi-agent environments requiring unified authentication and SSL termination

You can secure multiple Agents using a single authenticating web server as a reverse proxy. This provides:

  • Unified access through URLs like http://{HOST}/netdata/{NETDATA_HOSTNAME}/
  • Single sign-on across all Agents
  • Optional TLS encryption

Supported Web Servers:

We provide detailed configuration guides for popular web servers:


Do you have any feedback for this page? If so, you can open a new issue on our netdata/learn repository.