-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x-forwarded-for support for logging true user IP #20367
Comments
Could you try to add env |
I assume by "core configmap" you mean env:
normal:
TRUE_CLIENT_IP_HEADER: x-forwarded-for to the end of the file ? (I'm not very familar with harbor) If so, no, doesn't work, I added it then re-ran |
If you deploy by docker compose, would you try bellowing steps?
|
Did not work
(i've also verified that traffic on the port does have that header in lowercase) |
Ooops,it is not been logged the audit logs. |
@MinerYang I dunno if here is proper place to say it but it really should have second parameter with list of allowed IPs/nets aside from "what header to use". Else anything (not just the LB that can ensure that header is not faked) could send a request with XFF and bogus IP in it. |
As far as I loooked there is no option to enable using IP in
x-forwarded-for
header for access logsWe use harbor behind a loadbalancer and only loadbalancer IP gets logged. Security-wise it should probably only accept that header from whitelisted proxy IPs/networks.
The text was updated successfully, but these errors were encountered: