Disable Modsecurity from internal processing which affects large ingresses (#10316)
* Disable Modsecurity from interanl processing * Fix modsecurity check logic
This commit is contained in:
parent
ec33a0e6c7
commit
d7bfa1941d
1 changed files with 5 additions and 0 deletions
|
@ -709,6 +709,11 @@ http {
|
||||||
|
|
||||||
# default server, used for NGINX healthcheck and access to nginx stats
|
# default server, used for NGINX healthcheck and access to nginx stats
|
||||||
server {
|
server {
|
||||||
|
# Ensure that modsecurity will not run on an internal location as this is not accessible from outside
|
||||||
|
{{ if $all.Cfg.EnableModsecurity }}
|
||||||
|
modsecurity off;
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
listen 127.0.0.1:{{ .StatusPort }};
|
listen 127.0.0.1:{{ .StatusPort }};
|
||||||
set $proxy_upstream_name "internal";
|
set $proxy_upstream_name "internal";
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue