Going to Production
When deploying ClickStack in production, there are several additional considerations to ensure security, stability, and correct configuration. These vary depending on the distribution - Open Source or Managed - being used.
- Managed ClickStack
- ClickStack Open Source
For production deployments, Managed ClickStack is recommended. It applies industry-standard security practices by default - including enhanced encryption, authentication and connectivity, and managed access controls, as well as providing the following benefits:
- Automatic scaling of compute independent of storage
- Low-cost and effectively unlimited retention based on object storage
- The ability to independently isolate read and write workloads with Warehouses.
- Integrated authentication
- Automated backups
- Seamless upgrades
Follow these best practices for ClickHouse Cloud when using Managed ClickStack.
Secure ingestion
By default, the ClickStack OpenTelemetry Collector is not secured when deployed outside of the Open Source distributions and does not require authentication on its OTLP ports.
To secure ingestion, specify an authentication token when deploying the collector using the OTLP_AUTH_TOKEN environment variable. See "Securing the collector" for further details.
Create an ingestion user
It's recommended to create a dedicated user for the OTel collector for ingestion into Managed ClickHouse and ensuring ingestion is sent to a specific database e.g. otel. See "Creating an ingestion user" for further details.
Configure Time To Live (TTL)
Ensure the Time To Live (TTL) has been appropriately configured for your Managed ClickStack deployment. This controls how long data is retained for - the default of 3 days often needs to be modified.
Estimating Resources
When deploying Managed ClickStack, it is important to provision sufficient compute resources to handle both ingestion and query workloads. The estimates below provide a baseline starting point based on the volume of observability data you plan to ingest.
These recommendations are based on the following assumptions:
- Data volume refers to uncompressed ingest volume per month and applies to both logs and traces.
- Query patterns are typical for observability use cases, with most queries targeting recent data, usually the last 24 hours.
- Ingestion is relatively uniform across the month. If you expect bursty traffic or spikes, you should provision additional headroom.
- Storage is handled separately via ClickHouse Cloud object storage and is not a limiting factor for retention. We assume data retained for longer periods is infrequently accessed.
More compute may be required for access patterns that regularly query longer time ranges, perform heavy aggregations, or support a high number of concurrent users.
Recommended baseline sizing
| Monthly ingest volume | Recommended compute |
|---|---|
| < 10 TB / month | 2 vCPU × 3 replicas |
| 10–50 TB / month | 4 vCPU × 3 replicas |
| 50–100 TB / month | 8 vCPU × 3 replicas |
| 100–500 TB / month | 30 vCPU × 3 replicas |
| 1 PB+ / month | 59 vCPU × 3 replicas |
These values are estimates only and should be used as an initial baseline. Actual requirements depend on query complexity, concurrency, retention policies, and variance in ingestion throughput. Always monitor resource usage and scale as needed.
Isolating observability workloads
If you are adding ClickStack to an existing ClickHouse Cloud service that already supports other workloads, such as real-time application analytics, isolating observability traffic is strongly recommended.
Use Managed Warehouses to create a child service dedicated to ClickStack. This allows you to:
- Isolate ingest and query load from existing applications
- Scale observability workloads independently
- Prevent observability queries from impacting production analytics
- Share the same underlying datasets across services when needed
This approach ensures your existing workloads remain unaffected while allowing ClickStack to scale independently as observability data grows.
For larger deployments or custom sizing guidance, please contact support for a more precise estimate.
Network and port security
By default, Docker Compose exposes ports on the host, making them accessible from outside the container - even if tools like ufw (Uncomplicated Firewall) are enabled. This behavior is due to the Docker networking stack, which can bypass host-level firewall rules unless explicitly configured.
Recommendation:
Only expose ports that are necessary for production use. Typically the OTLP endpoints, API server, and frontend.
For example, remove or comment out unnecessary port mappings in your docker-compose.yml file:
Refer to the Docker networking documentation for details on isolating containers and hardening access.
Session secret configuration
In production, you must set a strong, random value for the EXPRESS_SESSION_SECRET environment variable for ClickStack UI (HyperDX) - to protect session data and prevent tampering.
Here's how to add it to your docker-compose.yml file for the app service:
You can generate a strong secret using openssl:
Avoid committing secrets to source control. In production, consider using environment variable management tools (e.g. Docker Secrets, HashiCorp Vault, or environment-specific CI/CD configs).
Secure ingestion
All ingestion should occur via the OTLP ports exposed by ClickStack distribution of the OpenTelemetry (OTel) collector. By default, this requires a secure ingestion API key generated at startup. This key is required when sending data to the OTel ports, and can be found in the HyperDX UI under Team Settings → API Keys.
Additionally, enabling TLS for OTLP endpoints is recommended.
Create an ingestion user
Creating a dedicated user for the OTel collector for ingestion into ClickHouse and ensuring ingestion is sent to a specific database e.g. otel is recommended. See "Creating an ingestion user" for further details.
ClickHouse
Users managing their own ClickHouse instance should adhere to the following best practices.
Security best practices
If you are managing your own ClickHouse instance, it's essential to enable TLS, enforce authentication, and follow best practices for hardening access. See this blog post for context on real-world misconfigurations and how to avoid them.
ClickHouse OSS provides robust security features out of the box. However, these require configuration:
- Use TLS via
tcp_port_secureand<openSSL>inconfig.xml. See guides/sre/configuring-tls. - Set a strong password for the
defaultuser or disable it. - Avoid exposing ClickHouse externally unless explicitly intended. By default, ClickHouse binds only to
localhostunlesslisten_hostis modified. - Use authentication methods such as passwords, certificates, SSH keys, or external authenticators.
- Restrict access using IP filtering and the
HOSTclause. See sql-reference/statements/create/user#user-host. - Enable Role-Based Access Control (RBAC) to grant granular privileges. See operations/access-rights.
- Enforce quotas and limits using quotas, settings profiles, and read-only modes.
- Encrypt data at rest and use secure external storage. See operations/storing-data and cloud/security/CMEK.
- Avoid hard coding credentials. Use named collections or IAM roles in ClickHouse Cloud.
- Audit access and queries using system logs and session logs.
See also external authenticators and query complexity settings for managing users and ensuring query/resource limits.
User permissions for ClickStack UI
The ClickHouse user for the ClickStack UI only needs to be a readonly user with access to change the following settings:
max_rows_to_read(at least up to 1 million)read_overflow_modecancel_http_readonly_queries_on_client_closewait_end_of_query
By default, the default user in both OSS and ClickHouse Cloud will have these permissions available however you are recommended to create a new user with these permissions.
Configure Time To Live (TTL)
Ensure the Time To Live (TTL) has been appropriately configured for your ClickStack deployment. This controls how long data is retained for - the default of 3 days often needs to be modified.
MongoDB guidelines
Follow the official MongoDB security checklist.