Skip to content

Commit 7a7083f

Browse files
authored
CDPT-1952 Enable modsec detection mode on production (#783)
1 parent 52d6f6f commit 7a7083f

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

config/kubernetes/production/ingress.yml

+8-3
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,16 @@
11
apiVersion: networking.k8s.io/v1
22
kind: Ingress
33
metadata:
4-
name: disclosure-checker-ingress-production
4+
name: disclosure-checker-ingress-modsec-production
55
namespace: disclosure-checker-production
66
annotations:
7-
external-dns.alpha.kubernetes.io/set-identifier: disclosure-checker-ingress-production-disclosure-checker-production-green
7+
external-dns.alpha.kubernetes.io/set-identifier: disclosure-checker-ingress-modsec-production-disclosure-checker-production-green
88
external-dns.alpha.kubernetes.io/aws-weight: "100"
9+
nginx.ingress.kubernetes.io/enable-modsecurity: "true"
10+
nginx.ingress.kubernetes.io/modsecurity-snippet: |
11+
SecAuditEngine On
12+
SecRuleEngine DetectionOnly
13+
SecDefaultAction "phase:2,pass,log,tag:github_team=central-digital-product-team,tag:namespace=disclosure-checker-production"
914
nginx.ingress.kubernetes.io/server-snippet: |
1015
location ~* \.(php|cgi|xml)$ {
1116
deny all; access_log off;
@@ -17,7 +22,7 @@ metadata:
1722
return 301 https://raw.githubusercontent.com/ministryofjustice/security-guidance/main/contact/vulnerability-disclosure-security.txt;
1823
}
1924
spec:
20-
ingressClassName: default
25+
ingressClassName: modsec
2126
tls:
2227
- hosts:
2328
- disclosure-checker-production.apps.live.cloud-platform.service.justice.gov.uk

0 commit comments

Comments
 (0)