Skip to content

Commit 028c311

Browse files
committed
Added recommendation to disable the default user with a sample XML file
1 parent f28b41a commit 028c311

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

docs/security_hardening.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,17 @@ With the default settings, the ClickHouse operator deploys ClickHouse with two u
1010

1111
The '**default**' user is used to connect to ClickHouse instance from a pod where it is running, and also for distributed queries. It is deployed with an **empty password** that was a long-time default for ClickHouse out-of-the-box installation.
1212

13-
To secure it, the operator applies network security rules that restrict connections to the pods running the ClickHouse cluster, and nothing else.
13+
For security purposes, we recommend that you disable the `default` user altogether. As an example, create a file named `remove_default_user.xml` and place it in the `users.d` directory. This markup does the trick:
14+
15+
```xml
16+
<clickhouse>
17+
<users>
18+
<default remove="1"/>
19+
</users>
20+
</clickhouse>
21+
```
22+
23+
However, if you do use the `default` user, the operator applies network security rules that restrict connections to the pods running the ClickHouse cluster, and nothing else.
1424

1525
Before version **0.19.0** `hostRegexp` was applied that captured pod names. This did not work correctly in some Kubernetes distributions, such as GKE. In later versions, the operator additionally applies a restrictive set of pod IP addresses and rebuilds this set if the IP address of a pod changes for whatever reason.
1626

0 commit comments

Comments
 (0)