You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -248,9 +248,7 @@ _Note that Kubernetes annotation maps are all of Go type `map[string]string`. A
248
248
| <aname="disable-server-tokens"></a>deis-router | deployment |[router.deis.io/nginx.disableServerTokens](#disable-server-tokens)|`"false"`| Enables or disables emitting nginx version in error messages and in the “Server” response header field. |
249
249
| <aname="enforce-whitelists"></a>deis-router | deployment |[router.deis.io/nginx.enforceWhitelists](#enforce-whitelists)|`"false"`| Whether to _require_ application-level whitelists that explicitly enumerate allowed clients by IP / CIDR range. With this enabled, each app will drop _all_ requests unless a whitelist has been defined. |
250
250
| <aname="enable-regex-domains"></a>deis-router | deployment |[router.deis.io/nginx.enableRegexDomains](#enable-regex-domains)|`"false"`| Whether to _enable_ application-level regex domain that can be explicitly defined for specific applications. With this option enabled, each app can have its own regex domain in server_name blocks of the nginx config. This allows for useful domains like `store-number-\d*.example.com`. |
251
-
| <aname="load-tcell-module"></a>deis-router | deployment |[router.deis.io/nginx.loadTcellModule](#load-tcell-module)|`"false"`| Whether to _enable_ the dynamic security nginx module provided by [Tcell](https://tcell.io/) as a [WAF](https://en.wikipedia.org/wiki/Web_application_firewall) on the router. Note this requires that you purchase a Tcell account and have application configured in the Tcell UI. The tcell_agent.config is passed through a configMap object through k8s. Example of the configMap can be found in this [gist](https://gist.github.com/Cryptophobia/648b23f234eeb9538c87b478de401a53). The open source alternative for this is Modsecurity dynamic module. |
252
-
| <aname="global-tcell-app-id"></a>deis-router | deployment |[router.deis.io/nginx.globalTcellAppID](#global-tcell-app-id)| N/A | This is the global app id to insert for the Tcell module in the top-most http{} block of the nginx config. To configure an individual app id for each application, you need to use the application annotation below. The application specific app id will take precedence over the global one. |
253
-
| <aname="load-modsecurity-module"></a>deis-router | deployment |[router.deis.io/nginx.loadModsecurityModule](#load-modsecurity-module)|`"false"`| Whether to _enable_ the open source dynamic security nginx module [Modsecurity](https://github.com/SpiderLabs/ModSecurity/tree/v3/master) globally for all apps as a [WAF](https://en.wikipedia.org/wiki/Web_application_firewall) on the router. The rule set that Modsecurity will use by default is the [OWASP ModSecurity Core Rule Set (CRS)](https://github.com/SpiderLabs/owasp-modsecurity-crs) and Modsecurity will be turned on to block malicious traffic on all apps if this annotation is enabled. This core rule set can be overwritten by configMap like in the example above for the Tcell module. |
251
+
| <aname="load-modsecurity-module"></a>deis-router | deployment |[router.deis.io/nginx.loadModsecurityModule](#load-modsecurity-module)|`"false"`| Whether to _enable_ the open source dynamic security nginx module [Modsecurity](https://github.com/SpiderLabs/ModSecurity/tree/v3/master) globally for all apps as a [WAF](https://en.wikipedia.org/wiki/Web_application_firewall) on the router. The rule set that Modsecurity will use by default is the [OWASP ModSecurity Core Rule Set (CRS)](https://github.com/SpiderLabs/owasp-modsecurity-crs) and Modsecurity will be turned on to block malicious traffic on all apps if this annotation is enabled. This core rule set can be overwritten by configMap and mounted as a volumeMount. |
254
252
| <aname="default-whitelist"></a>deis-router | deployment |[router.deis.io/nginx.defaultWhitelist](#default-whitelist)| N/A | A default (router-wide) whitelist expressed as a comma-delimited list of addresses (using IP or CIDR notation). Application-specific whitelists can either extend or override this default. |
255
253
| <aname="whitelist-mode"></a>deis-router | deployment |[router.deis.io/nginx.whitelistMode](#whitelist-mode)|`"extend"`| Whether application-specific whitelists should extend or override the router-wide default whitelist (if defined). Valid values are `"extend"` and `"override"`. |
256
254
| <aname="default-service-enabled"></a>deis-router | deployment |[router.deis.io/nginx.defaultServiceEnabled](#default-service-enabled)|`"false"`| Enables default back-end service for traffic hitting /. In order to work correctly both `defaultServiceIP` and `DefaultAppName` MUST also be set. |
@@ -280,7 +278,6 @@ _Note that Kubernetes annotation maps are all of Go type `map[string]string`. A
280
278
| <aname="builder-tcp-timeout"></a>deis-builder | service |[router.deis.io/nginx.tcpTimeout](#builder-tcp-timeout)|`"1200s"`| nginx `proxy_timeout` setting expressed in units `ms`, `s`, `m`, `h`, `d`, `w`, `M`, or `y`. |
281
279
| <aname="app-domains"></a>routable application | service |[router.deis.io/domains](#app-domains)| N/A | Comma-delimited list of domains for which traffic should be routed to the application. These may be fully qualified (e.g. `foo.example.com`) or, if not containing any `.` character, will be considered subdomains of the router's domain, if that is defined. |
282
280
| <aname="app-regex-domain"></a>routable application | service |[router.deis.io/regexDomain](#app-regex-domain)| N/A | A string that represents the regex domain for which traffic should be routed to the application. This is the regex domain (e.g. `foo-store-\d*`) if not containing any `.` character and will be considered a subdomain of the router's domain, if that is defined. The regex domain cannot be a fully qualified name (e.g. `foo-store-\d*.example.com`) for safety and security right now. This feature must be enabled on the router via enable-regex-domain annotation above. |
283
-
| <aname="app-tcell-app-id"></a>routable application | service |[router.deis.io/tcellAppID](#app-tcell-app-id)| N/A | This is the individual app id to insert for the Tcell module in the server{} block of the nginx config for each app. The application specific app id will take precedence over the global one if defined. |
284
281
| <aname="app-certificates"></a>routable application | service |[router.deis.io/certificates](#app-certificates)| N/A | Comma delimited list of mappings between domain names (see `router.deis.io/domains`) and the certificate to be used for each. The domain name and certificate name must be separated by a colon. See the [SSL section](#ssl) below for further details. |
285
282
| <aname="app-whitelist"></a>routable application | service |[router.deis.io/whitelist](#app-whitelist)| N/A | Comma-delimited list of addresses permitted to access the application (using IP or CIDR notation). These may either extend or override the router-wide default whitelist (if defined). Requests from all other addresses are denied. |
286
283
| <aname="app-connect-timeout"></a>routable application | service |[router.deis.io/connectTimeout](#app-connect-timeout)|`"30s"`| nginx `proxy_connect_timeout` setting expressed in units `ms`, `s`, `m`, `h`, `d`, `w`, `M`, or `y`. |
0 commit comments