This self mod nginx.conf maybe flushed by` apisix init`.

在 2019年11月18日星期一,liyong <chnliy...@gmail.com> 写道:

> The simplest method is to only allow loopback interface(127.0.0.1) access,
> this can be done in the nginx.conf:
> location /apisix/admin {
>     allow 127.0.0.0/24;
>     deny all;
>
>     content_by_lua_block {
>         apisix.http_admin()
>     }
> }
> We may also use another port for admin only and deny admin access for
> regular port, this separation is better.
> But I think the best practice in production is separate the gateway host
> and admin host, the apisix instance on gateway host has it's admin
> interface disabled,
> and the admin host only enable it's admin interface.
>
>
>
>
>
>
>
>
>
>
>
>
> On Mon, Nov 18, 2019 at 10:56 AM Lang Wang <totemofw...@apache.org> wrote:
>
> > For the plugin example:
> >
> > curl http://127.0.0.1:9080/apisix/admin/routes/1 -X PUT -d '
> > {
> >     "methods": ["GET"],
> >     "uri": "/index.html",
> >     "upstream": {
> >         "type": "roundrobin",
> >         "nodes": {
> >             "39.97.63.215:80": 1
> >         }
> >     }
> > }'
> >
> > The api seems like without any authentication. So what is the best
> practice
> > to protect those sensitive apis in prod env ?
> >
>

Reply via email to