Skip to content

Commit 1c39596

Browse files
authored
Merge pull request #36012 from nalhadef/BZ1918136
BZ1918136: adding note re: DDoS protection
2 parents 9c4b5ed + e67aba1 commit 1c39596

File tree

1 file changed

+10
-5
lines changed

1 file changed

+10
-5
lines changed

modules/nw-route-specific-annotations.adoc

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,16 @@ To create a whitelist with multiple source IPs or subnets, use a space-delimited
2424
|`router.openshift.io/cookie_name`| Specifies an optional cookie to use for
2525
this route. The name must consist of any combination of upper and lower case letters, digits, "_",
2626
and "-". The default is the hashed internal key name for the route. |
27-
|`haproxy.router.openshift.io/pod-concurrent-connections`| Sets the maximum number of connections that are allowed to a backing pod from a router. Note: if there are multiple pods, each can have this many connections. But if you have multiple routers, there is no coordination among them, each may connect this many times. If not set, or set to 0, there is no limit. |
28-
|`haproxy.router.openshift.io/rate-limit-connections`| Setting `true` or `TRUE` to enables rate limiting functionality. |
29-
|`haproxy.router.openshift.io/rate-limit-connections.concurrent-tcp`| Limits the number of concurrent TCP connections shared by an IP address. |
30-
|`haproxy.router.openshift.io/rate-limit-connections.rate-http`| Limits the rate at which an IP address can make HTTP requests. |
31-
|`haproxy.router.openshift.io/rate-limit-connections.rate-tcp`| Limits the rate at which an IP address can make TCP connections. |
27+
|`haproxy.router.openshift.io/pod-concurrent-connections`| Sets the maximum number of connections that are allowed to a backing pod from a router. +
28+
Note: If there are multiple pods, each can have this many connections. If you have multiple routers, there is no coordination among them, each may connect this many times. If not set, or set to 0, there is no limit. |
29+
|`haproxy.router.openshift.io/rate-limit-connections`| Setting `true` or `TRUE` enables rate limiting functionality which is implemented through stick-tables on the specific backend per route. +
30+
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
31+
|`haproxy.router.openshift.io/rate-limit-connections.concurrent-tcp`| Limits the number of concurrent TCP connections made through the same source IP address. It accepts a numeric value. +
32+
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
33+
|`haproxy.router.openshift.io/rate-limit-connections.rate-http`| Limits the rate at which a client with the same source IP address can make HTTP requests. It accepts a numeric value. +
34+
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
35+
|`haproxy.router.openshift.io/rate-limit-connections.rate-tcp`| Limits the rate at which a client with the same source IP address can make TCP connections. It accepts a numeric value. +
36+
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
3237
|`haproxy.router.openshift.io/timeout` | Sets a server-side timeout for the route. (TimeUnits) | `ROUTER_DEFAULT_SERVER_TIMEOUT`
3338
|`router.openshift.io/haproxy.health.check.interval`| Sets the interval for the back-end health checks. (TimeUnits) | `ROUTER_BACKEND_CHECK_INTERVAL`
3439
|`haproxy.router.openshift.io/ip_whitelist`

0 commit comments

Comments
 (0)