Skip to content

Commit 513bd8d

Browse files
authored
Merge pull request #70540 from kowen-rh/ocpbugs-22472
/lgtm, merging OCPBUGS#22472: Amend misleading reference to basic DDoS protection
2 parents 2b5c817 + a1af4d4 commit 513bd8d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/nw-route-specific-annotations.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ and "-". The default is the hashed internal key name for the route. |
2727
|`haproxy.router.openshift.io/pod-concurrent-connections`| Sets the maximum number of connections that are allowed to a backing pod from a router. +
2828
Note: If there are multiple pods, each can have this many connections. If you have multiple routers, there is no coordination among them, each may connect this many times. If not set, or set to 0, there is no limit. |
2929
|`haproxy.router.openshift.io/rate-limit-connections`| Setting `'true'` or `'TRUE'` enables rate limiting functionality which is implemented through stick-tables on the specific backend per route. +
30-
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
30+
Note: Using this annotation provides basic protection against denial-of-service attacks. |
3131
|`haproxy.router.openshift.io/rate-limit-connections.concurrent-tcp`| Limits the number of concurrent TCP connections made through the same source IP address. It accepts a numeric value. +
32-
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
32+
Note: Using this annotation provides basic protection against denial-of-service attacks. |
3333
|`haproxy.router.openshift.io/rate-limit-connections.rate-http`| Limits the rate at which a client with the same source IP address can make HTTP requests. It accepts a numeric value. +
34-
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
34+
Note: Using this annotation provides basic protection against denial-of-service attacks. |
3535
|`haproxy.router.openshift.io/rate-limit-connections.rate-tcp`| Limits the rate at which a client with the same source IP address can make TCP connections. It accepts a numeric value. +
36-
Note: Using this annotation provides basic protection against distributed denial-of-service (DDoS) attacks. |
36+
Note: Using this annotation provides basic protection against denial-of-service attacks. |
3737
|`haproxy.router.openshift.io/timeout` | Sets a server-side timeout for the route. (TimeUnits) | `ROUTER_DEFAULT_SERVER_TIMEOUT`
3838
|`haproxy.router.openshift.io/timeout-tunnel` | This timeout applies to a tunnel connection, for example, WebSocket over cleartext, edge, reencrypt, or passthrough routes. With cleartext, edge, or reencrypt route types, this annotation is applied as a timeout tunnel with the existing timeout value. For the passthrough route types, the annotation takes precedence over any existing timeout value set. | `ROUTER_DEFAULT_TUNNEL_TIMEOUT`
3939
|`ingresses.config/cluster ingress.operator.openshift.io/hard-stop-after` | You can set either an IngressController or the ingress config . This annotation redeploys the router and configures the HA proxy to emit the haproxy `hard-stop-after` global option, which defines the maximum time allowed to perform a clean soft-stop. | `ROUTER_HARD_STOP_AFTER`

0 commit comments

Comments
 (0)