Disable Modsecurity from internal processing which affects large ingresses (#10316)
* Disable Modsecurity from interanl processing * Fix modsecurity check logic
This commit is contained in:
parent
6b05e9b06e
commit
8a578c9f4a
1 changed files with 5 additions and 0 deletions
|
@ -709,6 +709,11 @@ http {
|
||||||
|
|
||||||
# default server, used for NGINX healthcheck and access to nginx stats
|
# default server, used for NGINX healthcheck and access to nginx stats
|
||||||
server {
|
server {
|
||||||
|
# Ensure that modsecurity will not run on an internal location as this is not accessible from outside
|
||||||
|
{{ if $all.Cfg.EnableModsecurity }}
|
||||||
|
modsecurity off;
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
listen 127.0.0.1:{{ .StatusPort }};
|
listen 127.0.0.1:{{ .StatusPort }};
|
||||||
set $proxy_upstream_name "internal";
|
set $proxy_upstream_name "internal";
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue