Skip to content

Commit 20d72af

Browse files
author
Ted Avery
committed
OSDOCS-13371-2:Ingress Controller Parameters
1 parent 41cee05 commit 20d72af

3 files changed

+207
-46
lines changed

modules/microshift-ingress-controller-conc.adoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,11 @@ With more configuration options, you can fine-tune ingress to meet your specific
1313
* If your application starts processing requests from clients but the connection is
1414
closed before it can respond, you can set the `ingress.tuningOptions.serverTimeout` parameter in the configuration file to a higher value to accommodate the speed of the response from the server.
1515
16-
* If the router has many connections open because an application running on the cluster does not close connections properly, you can set the `ingress.tuningOptions.serverTimeout` and `spec.tuningOptions.serverFinTimeout` parameters to a lower value, forcing those connections to close sooner.
16+
* If the router has many connections open because an application running on the cluster does not close connections properly, you can set the `ingress.tuningOptions.serverTimeout` and `spec.tuningOptions.serverFinTimeout` parameters to a lower value, forcing those connections to close sooner.
17+
18+
* If you want to enable the optional use of client certificates, you can set the 'ingress.clientTLS' parameter to 'Optional' so that the Operator configures the ingress controller to request and verify client certificates using the provided CA certificate bundle while still allowing clients that do not present a client certificate. The user enables client TLS with the 'Required' client certificate policy and a custom client CA certificate bundle. The operator configures the ingress controller to request and verify client certificates using the provided CA certificate bundle and reject clients that do not present valid client certificates.
19+
20+
* The user enables client TLS with the Required client certificate policy and a custom client CA certificate bundle with a CA certificate using the X509v3 extension to specify one or more CRL distribution points in the certificate. The operator configures the IngressController to request and verify client certificates using the provided CA certificate bundle and reject clients that do not present valid client certificates. The operator periodically updates the CRL using the distribution points.
21+
22+
* User wants to configure organization trusted SSL certificate that will be served to the application users. User wants to rotate/renew organization trusted SSL certificate that will be served to the application users (day 2). User want to enable client TLS and client certificate policy (mTLS) .
23+
Allow users to configure the additional HAProxy/Router security customization parameters, see Proposal table for details.

0 commit comments

Comments
 (0)