Skip to content

Commit 1832feb

Browse files
author
Daniel Chadwick
committed
osdocs5049c Replacing whitelist and blacklist references to allow and deny
1 parent 48a3791 commit 1832feb

File tree

2 files changed

+8
-9
lines changed

2 files changed

+8
-9
lines changed

modules/nw-route-specific-annotations.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ The Ingress Controller can set the default options for all the routes it exposes
99

1010
[IMPORTANT]
1111
====
12-
To create a whitelist with multiple source IPs or subnets, use a space-delimited list. Any other delimiter type causes the list to be ignored without a warning or error message.
12+
To create an allow list with multiple source IPs or subnets, use a space-delimited list. Any other delimiter type causes the list to be ignored without a warning or error message.
1313
====
1414

1515
//For all the variables outlined in this section, you can set annotations on the
@@ -38,7 +38,7 @@ Note: Using this annotation provides basic protection against denial-of-service
3838
|`haproxy.router.openshift.io/timeout-tunnel` | This timeout applies to a tunnel connection, for example, WebSocket over cleartext, edge, reencrypt, or passthrough routes. With cleartext, edge, or reencrypt route types, this annotation is applied as a timeout tunnel with the existing timeout value. For the passthrough route types, the annotation takes precedence over any existing timeout value set. | `ROUTER_DEFAULT_TUNNEL_TIMEOUT`
3939
|`ingresses.config/cluster ingress.operator.openshift.io/hard-stop-after` | You can set either an IngressController or the ingress config . This annotation redeploys the router and configures the HA proxy to emit the haproxy `hard-stop-after` global option, which defines the maximum time allowed to perform a clean soft-stop. | `ROUTER_HARD_STOP_AFTER`
4040
|`router.openshift.io/haproxy.health.check.interval`| Sets the interval for the back-end health checks. (TimeUnits) | `ROUTER_BACKEND_CHECK_INTERVAL`
41-
|`haproxy.router.openshift.io/ip_whitelist`
41+
|`haproxy.router.openshift.io/ip_allowlist`
4242
| Sets an allowlist for the route. The allowlist is a space-separated list of IP addresses and CIDR ranges for the approved source addresses. Requests from IP addresses that are not in the allowlist are dropped.
4343

4444
The maximum number of IP addresses and CIDR ranges directly visible in the `haproxy.config` file is 61. [^1^] |
@@ -68,7 +68,7 @@ This value is applicable to re-encrypt and edge routes only. For more informatio
6868
|===
6969
[.small]
7070
--
71-
1. If the number of IP addresses and CIDR ranges in an allowlist exceeds 61, they are written into a separate file that is then referenced from `haproxy.config`. This file is stored in the `var/lib/haproxy/router/whitelists` folder.
71+
1. If the number of IP addresses and CIDR ranges in an allowlist exceeds 61, they are written into a separate file that is then referenced from `haproxy.config`. This file is stored in the `var/lib/haproxy/router/allowlists` folder.
7272
+
7373
[NOTE]
7474
====
@@ -128,31 +128,31 @@ WebSocket connections to timeout frequently on that route.
128128
----
129129
metadata:
130130
annotations:
131-
haproxy.router.openshift.io/ip_whitelist: 192.168.1.10
131+
haproxy.router.openshift.io/ip_allowlist: 192.168.1.10
132132
----
133133

134134
.A route that allows several IP addresses
135135
[source,yaml]
136136
----
137137
metadata:
138138
annotations:
139-
haproxy.router.openshift.io/ip_whitelist: 192.168.1.10 192.168.1.11 192.168.1.12
139+
haproxy.router.openshift.io/ip_allowlist: 192.168.1.10 192.168.1.11 192.168.1.12
140140
----
141141

142142
.A route that allows an IP address CIDR network
143143
[source,yaml]
144144
----
145145
metadata:
146146
annotations:
147-
haproxy.router.openshift.io/ip_whitelist: 192.168.1.0/24
147+
haproxy.router.openshift.io/ip_allowlist: 192.168.1.0/24
148148
----
149149

150150
.A route that allows both IP an address and IP address CIDR networks
151151
[source,yaml]
152152
----
153153
metadata:
154154
annotations:
155-
haproxy.router.openshift.io/ip_whitelist: 180.5.61.153 192.168.1.0/24 10.0.0.0/8
155+
haproxy.router.openshift.io/ip_allowlist: 180.5.61.153 192.168.1.0/24 10.0.0.0/8
156156
----
157157

158158
.A route specifying a rewrite target

modules/security-network-egress.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,7 @@
66
= Securing egress traffic
77

88
{product-title} provides the ability to control egress traffic using either
9-
a router or firewall method. For example, you can use IP whitelisting to control
10-
database access.
9+
a router or firewall method. For example, you can use the IP allow list to control database access.
1110
A cluster administrator can assign one or more egress IP addresses to a project by xref:../../networking/ovn_kubernetes_network_provider/configuring-egress-ips-ovn.adoc#configuring-egress-ips-ovn[configuring an egress IP address].
1211
Likewise, a cluster administrator can prevent egress traffic from
1312
going outside of an {product-title} cluster using an egress firewall.

0 commit comments

Comments
 (0)