This repository has been archived by the owner on Feb 6, 2024. It is now read-only.
Allow deployment of cluster with security hardening configuration #90
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Provides the ability to set up ClickHouse according to normal security hardening recommendations.
It provides
It is important to note though that this is a bit opinionated in a couple of ways. First, it will not configure normal HTTP or TCP (in
config.d/config.xml
) if HTTPS and secure TCP are configured. However, I do not go in and remove the default http_port and tcp_port configuration in the globalconfig.xml
which means that the default HTTP and TCP ports will still be exposed due to how the configuration is applied (on top of the default configuration). However, for internal replication, we need to go in and remove the default string from the global config simply because this will conflict with the internal_https configuration.In my own deployment, I go even further and remove the normal HTTP and TCP configuration from the global
config.xml
. Perhaps that would be nice to include as well? It depends on what you would like and what the users would expect.