[release-1.8] Disable Modsecurity from internal processing which affects large ingresses (#10375)
* Disable Modsecurity from interanl processing * Fix modsecurity check logic --------- Co-authored-by: mley <mley@intraedge.com>
This commit is contained in:
parent
98170bd6bf
commit
fb80e6d53f
1 changed files with 5 additions and 0 deletions
|
@ -710,6 +710,11 @@ http {
|
||||||
|
|
||||||
# default server, used for NGINX healthcheck and access to nginx stats
|
# default server, used for NGINX healthcheck and access to nginx stats
|
||||||
server {
|
server {
|
||||||
|
# Ensure that modsecurity will not run on an internal location as this is not accessible from outside
|
||||||
|
{{ if $all.Cfg.EnableModsecurity }}
|
||||||
|
modsecurity off;
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
listen 127.0.0.1:{{ .StatusPort }};
|
listen 127.0.0.1:{{ .StatusPort }};
|
||||||
set $proxy_upstream_name "internal";
|
set $proxy_upstream_name "internal";
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue