It is important to secure the ClusterControl host and the database cluster. It is recommended for users to isolate the database infrastructure from the public Internet and just whitelist the known hosts or networks to reach the database cluster.
ClusterControl requires ports used by the following services to be opened/enabled:
- ICMP (echo reply/request).
- SSH (default is 22).
- HTTP (default is 80).
- HTTPS (default is 443).
- MySQL (default is 3306).
- CMON RPC (default is 9500).
- CMON RPC TLS (default is 9501).
- CMON Events (default is 9510).
- CMON SSH (default is 9511).
- CMON Cloud (default is 9518).
- Streaming port for backups through socat/netcat (default is 9999).
ClusterControl supports various database and application vendors and each has its own set of standard ports that need to be reachable. Following ports and services need to be reachable by ClusterControl on the managed database nodes:
Database Cluster (Vendor) | Port/Service |
---|---|
MySQL/MariaDB (single instance and replication) |
|
|
|
MySQL Cluster (NDB) |
|
MongoDB replica set |
|
MongoDB sharded cluster |
|
PostgreSQL |
|
TimeScaleDB |
|
HAProxy |
|
MariaDB MaxScale |
|
Keepalived |
|
Galera Arbitrator (garbd) |
|
ProxySQL |
|
Prometheus |
|
Microsoft SQL Server |
|
Redis |
|
Elasticsearch |
|
Valkey |
|