Ilya Mashchenko d9f7159486 docs: format, typos, and some simplifications in `docs/` (#19112) | 15 часов назад | |
---|---|---|
.. | ||
README.md | 15 часов назад | |
Running-behind-apache.md | 15 часов назад | |
Running-behind-caddy.md | 1 месяц назад | |
Running-behind-h2o.md | 15 часов назад | |
Running-behind-haproxy.md | 1 месяц назад | |
Running-behind-lighttpd.md | 15 часов назад | |
Running-behind-nginx.md | 15 часов назад |
If you need to access a Netdata Agent's user interface or API in a production environment, we recommend you put Netdata behind another web server and secure access to the dashboard via SSL, user authentication, and firewall rules.
A dedicated web server also provides more robustness and capabilities than the Agent's internal web server.
We have documented running behind nginx, Apache, HAProxy, Lighttpd, Caddy, and H2O. If you prefer a different web server, we suggest you follow the documentation for nginx and tell us how you did it by adding your own "Running behind webserverX" document.
When you run Netdata behind a reverse proxy, we recommend you firewall protect all your Netdata servers, so that only the web server IP will be allowed to directly access Netdata. To do this, run this on each of your servers (or use your firewall manager):
PROXY_IP="1.2.3.4"
iptables -t filter -I INPUT -p tcp --dport 19999 \! -s ${PROXY_IP} -m conntrack --ctstate NEW -j DROP
The above will prevent anyone except your web server from accessing a Netdata dashboard running on the host.
You can also use netdata.conf
:
[web]
allow connections from = localhost 1.2.3.4
Of course, you can add more IPs.