Security

Overview

Key Sections

Non-root status check

This feature allows ClusterWare to check the Firewall and Security Policies status without the need to provide a root password. With Non-root status check enabled ClusterWare is able to verify the Firewall status and its compliance with Security Policies automatically.

Some operating system distributions have non-root status checking enabled by default.

With non-root status checking enabled, modifications of the firewall configuration such as enabling/disabling or applying Security Policies still require root privileges.

Non-root status check enabled

Non-root status check disabled

Syncing firewall status without non-root status check

If non-root status checking is disabled, the Firewall status and Security Policies status will remain unknown until you manually sync Firewall insights in ClusterWare Console. Syncing Firewall insights in this case will require providing the root password.

How to enable non-root status check

Enabling Non-Root Firewall Status Checking

Firewall Status

This section provides information if the Firewall is active or inactive and provides options to change the Firewall status.

Options (three-dot menu)

  • Activate UFW

  • Deactivate UFW

  • Reset UFW

Firewall Active

Firewall Inactive

How to change the Firewall Status

Changing Firewall Status

Security Policies

Security Policies are the rules of traffic that are allowed or not allowed in your cluster. This section shows the status of all Security Policies that are targeting the server and allows to apply them to the server Firewall configuration. Read more about Security Policies.

Security Policy Statuses

  • Applied (green checkmark): All rules from this policy are included in the Firewall configuration.

  • Not applied (red cross): At least one rule from this policy is not included in the Firewall configuration.

  • Unknown (yellow question mark): ClusterWare could not determine if this policy is applied. This may happen when UFW is not installed.

Security Policy Tags

  • Auto: This policy is automatically generated by ClusterWare. See types of auto-generated Security Policies.

  • External: External tag indicates that this policy comes from the same server, but in a different cluster on your account. Servers with the same hostname and port created in different clusters share their Security Policies. This allows you to reuse the same server in different clusters and apply cluster-specific Security Policies seamlessly.

Auto-generated Security Policies

  • Incoming/Outgoing default: ClusterWare by default blocks all incoming traffic and allows all outgoing traffic from the server.

  • Allow SSH from ClusterWare: All servers are included in this policy allowing ClusterWare to access them and collect insights surfaced in the ClusterWare Console.

  • Allow from Internet to Load Balancer: For each server hosting a Load Balancer ClusterWare generates a policy allowing incoming traffic from the Internet to the Load Balancer server on the specified port.

  • Allow From Load Balancer to Applications: For each server hosting a Load Balancer ClusterWare generates a policy allowing outgoing traffic from the Load Balancer server to all Applications in the cluster.

To override the behavior of auto-generated policies you can create your own policy targeting the same hostname and port range.

Extra Firewall rules not included in any Security Policy

When ClusterWare detects Firewall rules that are not included in any Security Policy, those rules are reported at the end of Security Policies list. This situation may happen when you delete some resources from your cluster (load balancers, applications, security policies etc) or when the Firewall rules are applied manually on the server.

  • Click on Extra firewall rules not covered by any policy are applied button to check the details.

Applying Security Policies to the server

Applying Security Policies

Server Public Key

In this section you can quickly access the server public key for example to allow list it in external systems such as your Git repository. This field is read-only.

Sync Actions

Security tab without firewall installed

If the server does not have UFW installed, ClusterWare Console will display warnings indicating that the security configurations can not be applied.

Last updated