Skip to content

Commit 83c3edc

Browse files
authored
Merge pull request #66299 from jldohmann/OCPBUGS-21751
OCPBUGS-21751: update ip_whitelist entry
2 parents 1f2a8f1 + 6807024 commit 83c3edc

File tree

1 file changed

+12
-2
lines changed

1 file changed

+12
-2
lines changed

modules/nw-route-specific-annotations.adoc

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,10 @@ Note: Using this annotation provides basic protection against distributed denial
3939
|`ingresses.config/cluster ingress.operator.openshift.io/hard-stop-after` | You can set either an IngressController or the ingress config . This annotation redeploys the router and configures the HA proxy to emit the haproxy `hard-stop-after` global option, which defines the maximum time allowed to perform a clean soft-stop. | `ROUTER_HARD_STOP_AFTER`
4040
|`router.openshift.io/haproxy.health.check.interval`| Sets the interval for the back-end health checks. (TimeUnits) | `ROUTER_BACKEND_CHECK_INTERVAL`
4141
|`haproxy.router.openshift.io/ip_whitelist`
42-
| Sets a whitelist for the route. The whitelist is a space-separated list of IP addresses and CIDR ranges for the approved source addresses. Requests from IP addresses that are not in the whitelist are dropped.
42+
| Sets an allowlist for the route. The allowlist is a space-separated list of IP addresses and CIDR ranges for the approved source addresses. Requests from IP addresses that are not in the allowlist are dropped.
43+
44+
The maximum number of IP addresses and CIDR ranges directly visible in the `haproxy.config` file is 61. [^1^] |
4345

44-
The maximum number of IP addresses and CIDR ranges allowed in a whitelist is 61.|
4546
|`haproxy.router.openshift.io/hsts_header` | Sets a Strict-Transport-Security header for the edge terminated or re-encrypt route. |
4647
|`haproxy.router.openshift.io/log-send-hostname` | Sets the `hostname` field in the Syslog header. Uses the hostname of the system. `log-send-hostname` is enabled by default if any Ingress API logging method, such as sidecar or Syslog facility, is enabled for the router. |
4748
|`haproxy.router.openshift.io/rewrite-target` | Sets the rewrite path of the request on the backend. |
@@ -66,6 +67,15 @@ This value is applicable to re-encrypt and edge routes only. For more informatio
6667
`if-none`: sets the header if it is not already set.| `ROUTER_SET_FORWARDED_HEADERS`
6768

6869
|===
70+
[.small]
71+
--
72+
1. If the number of IP addresses and CIDR ranges in an allowlist exceeds 61, they are written into a separate file that is then referenced from `haproxy.config`. This file is stored in the `var/lib/haproxy/router/whitelists` folder.
73+
+
74+
[NOTE]
75+
====
76+
To ensure that the addresses are written to the allowlist, check that the full list of CIDR ranges are listed in the Ingress Controller configuration file. The etcd object size limit restricts how large a route annotation can be. Because of this, it creates a threshold for the maximum number of IP addresses and CIDR ranges that you can include in an allowlist.
77+
====
78+
--
6979

7080
[NOTE]
7181
====

0 commit comments

Comments
 (0)