This repository has been archived by the owner on Mar 24, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 31
/
lds.yaml
52 lines (51 loc) · 1.64 KB
/
lds.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
version_info: "1"
resources:
- "@type": type.googleapis.com/envoy.api.v2.Listener
name: listener_0
address:
socket_address:
address: 0.0.0.0
port_value: 8585
filter_chains:
- filters:
- name: envoy.http_connection_manager
config:
codec_type: auto
stat_prefix: ingress_http
route_config:
name: local_route
virtual_hosts:
- name: backend
domains:
- "*"
routes:
- match:
prefix: "/"
route:
cluster: service1
metadata:
filter_metadata:
envoy.filters.http.modsecurity:
# disable: true
# disable_request: true
# disable_response: true
http_filters:
# before envoy.router because order matters!
- name: envoy.filters.http.modsecurity
config:
rules_inline: |
Include "conf/modsecurity.v3.0.3.conf"
Include "owasp-modsecurity-crs-3.1.1/crs-setup.conf.example"
Include "owasp-modsecurity-crs-3.1.1/rules/*.conf"
SecRuleEngine DetectionOnly
SecRule ARGS:param1 "test" "id:1,phase:1,deny,status:400,msg:'Test rule'"
SecRule REQUEST_BODY "blocktest" "id:2,phase:2,deny,status:400,msg:'Test rule'"
webhook:
http_uri:
uri: http://localhost:10000/wh_callback
cluster: service2
timeout:
seconds: 3
secret: webhook_secret
- name: envoy.router
config: {}