Security


Overview

SearchStax® from Measured Search® takes the security of your Solr search infrastructure very seriously. We have built-in industry-standard security at the level of the cluster, network and management portal (Dashboard). Custom firewall rules enable you to lock down your search infrastructure to a whitelist of IP addresses and IP address ranges.


Cluster Security

You can lock down your clusters to specific IP addresses or IP address ranges as described below.


Connecting to the Cluster

SearchStax recommends that you situate your application infrastructure in the same local network as your hosting provider (for example, AWS or Azure). Internal network security for these hosting providers is extremely high and eliminates any chance of a hacker potentially sniffing your network traffic.

If your application is hosted elsewhere, try to host it as close to your Search infrastructure as possible. This can be done by choosing the Cloud Provider Region which is closest to your application. This improves both security and performance.


IP Filtering

SearchStax Security IP Filtering SearchStax can limit access to specific IP addresses. You can configure access
for Zookeeper and Solr servers separately.

To limit access to a specific IP address or IP address range:

  1. From within a Deployment, click on Security > IP filter.
  2. Click on Add Row.
  3. Add a specific IP address in the appropriate field.
  4. Select a service you need to limit access to. If you plan to limit access for both Zookeeper and Solr to the same address, just chose 'Solr + Zookeeper'.
  5. Click on Save changes.

To remove a filter, click on the X button and then Save changes.

Note that the default entry is 0.0.0.0/0, which allows unrestricted access. You must remove this entry to enable IP access restrictions. If you delete this entry before adding a new IP address, you can lock yourself out. Send email to support@measuredsearch.com for assistance.


Solr Authentication and Authorization

You can optionally enable the Solr Authentication and Authorization plugin on your Cluster deployments.

Warning

Enabling/Disabling this feature requires Solr services to be restarted.

To enable the Authentication and Authorization plugin:

  1. Select the desired Deployment and click the Auth link in the main menu.
  2. Click the Enable button. SearchStax Authentication Enable button
  3. Add a user, entering the username, password and role you want to acquire. Click Add.

You can edit your users as needed.

To disable the Authentication and Authorization plugin, click on the Disable Auth button and confirm the action. (Again, Solr services will have to be restarted.)


SearchStax Dashboard Security

All connections to the SearchStax Dashboard use HTTPS, which encrypts your traffic in transit.


Activity Log

The activity log provides you with a list of all user actions within your tenant account, including those of the Measured Search Support team. The list consists of a User column including email of the user who performed the logged change, his/her role, Timestamp of action in UTC, Action itself, Action detail and IP address where the action originated.

SearchStax Activity Log table