Control Plane
The control plane owns management, DNS proxying, cluster state, observability, and service-plane processing.
The control plane is the operational side of the Neuwerk.
It owns:
- the management HTTPS API and web UI
- metrics, health, and readiness surfaces
- policy persistence and activation
- DNS proxying for hostname-based policy
- dynamic DNS allowlist maintenance
- service accounts and SSO
- integrations such as Kubernetes-backed source resolution
- audit and wiretap aggregation
- TLS interception runtime and CA management
- cluster replication and leader-aware management behavior
Why DNS And TLS Interception Live Here
Both features require more than packet forwarding:
- DNS policy needs query parsing, upstream resolution, and hostname-to-IP bookkeeping
- TLS interception needs certificate management, HTTP parsing, and a service runtime
Keeping those concerns in the control plane preserves the dataplane boundary and makes it clearer which failures are packet-engine failures versus service failures.
The Main Operational Surfaces
Operators interact with the control plane through:
- the main HTTPS listener for the UI and management API
- the metrics listener
- the DNS listener on the management address
- cluster listeners when HA is enabled
The control plane is therefore broader than “the web API”. It is every runtime surface that turns configuration into behavior or provides higher-layer services around enforcement.
State Ownership
The control plane is the source of truth for control-plane records such as:
- policies and active policy selection
- service accounts
- integrations
- SSO configuration
- management and intercept CA material
- audit history
In single-node mode that state is local. In clustered mode it is replicated and leader-aware.
Operator Implications
- If the management API is healthy but the node is not ready, the control plane may still be waiting for dataplane, DNS, service-plane, or cluster readiness.
- Hostname-based policy failures should be investigated from the DNS proxy outward.
- TLS interception depends on both policy and intercept CA availability.
Read Cluster Replication for the HA-specific control plane behavior.