Profile support for the Listener CRD
You can use individual entities such as HTTP profile, TCP profile, and SSL profile to configure HTTP, TCP, and SSL respectively for the Listener CRD. Profile support for the Listener CRD helps you to customize the default protocol behavior. You can also select the SSL ciphers for the SSL virtual server.
HTTP profile
An HTTP profile is a collection of HTTP settings. A default HTTP profile called nshttp_default_profile
is configured to set the HTTP configurations. These configurations are applied, by default, globally to all services and virtual servers. You can customize the HTTP configurations for a Listener resource by specifying spec.policies.httpprofile
. If specified, NetScaler Ingress Controller creates a new HTTP profile with the default values derived from the default HTTP profile and configures the values specified.
It helps to derive the default values from the default HTTP profile and configures the values specified.
The following example YAML shows how to enable websocket for a given front-end virtual server.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 80
protocol: http
policies:
httpprofile:
config:
websocket: "ENABLED"
<!--NeedCopy-->
For information about all the possible key-value pairs for the HTTP profile see, HTTP profile.
Note:
The ‘name’ is auto-generated.
You can also specify a built-in HTTP profile or a pre-configured HTTP profile and bind it to the front-end virtual server as shown in the following example.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 80
protocol: http
policies:
httpprofile:
preconfigured: 'nshttp_default_strict_validation'
<!--NeedCopy-->
TCP profile
A TCP profile is a collection of TCP settings. A default TCP profile called nstcp_default_profile
is configured to set the TCP configurations. These configurations are applied, by default, globally to all services and virtual servers. You can customize the TCP settings by specifying spec.policies.tcpprofile
. When you specify spec.policies.tcpprofile
, NetScaler Ingress Controller creates a TCP profile that is derived from the default TCP profile and applies the values provided in the specification, and binds it to the front-end virtual server.
For information about all the possible key-value pairs for a TCP profile, see TCP profile.
Note:
The name is auto-generated.
The following example shows how to enable tcpfastopen
and HyStart
for the front-end virtual server.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 80
protocol: http
policies:
tcpprofile:
config:
tcpfastopen: "ENABLED"
hystart: "ENABLED"
<!--NeedCopy-->
You can also specify a built-in TCP profile or a pre-configured TCP profile name as shown in the following example:
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 80
protocol: http
policies:
tcpprofile:
preconfigured: 'nstcp_default_Mobile_profile'
<!--NeedCopy-->
SSL profile
An SSL profile is a collection of settings for SSL entities. SSL profile makes configuration easier and flexible. You can configure the settings in a profile and bind that profile to a virtual server instead of configuring the settings on each entity. An SSL profile allows you to customize many SSL parameters such as TLS protocol and ciphers. For more information about SSL profile, see SSL profile infrastructure.
Note:
By default, NetScaler creates a legacy SSL profile. The legacy SSL profile has many drawbacks including non-support for advanced protocols such as SSLv3. Hence, it is recommended to enable the default SSL profiles in NetScaler before NetScaler Ingress Controller is launched.
To enable the advanced SSL profile, use the following command in the NetScaler command line:
set ssl parameter -defaultProfile ENABLED
The command enables the default SSL profile for all the existing SSL virtual servers and the SSL service groups.
You can specify spec.policies.sslprofile
to customize the SSL profile. When specified, NetScaler Ingress Controller creates an SSL profile derived from the default SSL front-end profile: ns_default_ssl_profile_frontend
.
For information about key-value pairs supported in the SSL profile, see SSL profile.
Note:
The
name
is auto-generated.
The following example shows how to enable TLS1.3 and HSTS for the front-end virtual server.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
sslprofile:
config:
tls13: "ENABLED"
hsts: "ENABLED"
<!--NeedCopy-->
You can specify a built-in or pre-configured SSL profile name as shown in the following example:
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
sslprofile:
preconfigured: 'ns_default_ssl_profile_secure_frontend'
<!--NeedCopy-->
SSL ciphers
The Ingress NetScaler has built-in cipher groups. By default, virtual servers use a DEFAULT cipher group for an SSL transaction. To use ciphers which are not part of the DEFAULT cipher group, you must explicitly bind them to an SSL profile. You can use spec.policies.sslciphers
to provide a list of ciphers, list of built-in cipher groups, or the list of user-defined cipher groups.
Note:
The order of priority of ciphers is the same order defined in the list. The first one in the list gets the first priority and likewise.
The following example shows how to provide a list of built-in cipher suites.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
sslciphers:
- 'TLS1.2-ECDHE-RSA-AES128-GCM-SHA256'
- 'TLS1.2-ECDHE-RSA-AES256-GCM-SHA384'
- 'TLS1.2-ECDHE-RSA-AES-128-SHA256'
- 'TLS1.2-ECDHE-RSA-AES-256-SHA384'
<!--NeedCopy-->
For information about the list of cipher suites available in NetScaler, see SSL profile infrastructure.
Ensure that NetScaler has a user-defined cipher group for using a user-defined cipher group. Perform the following steps to configure a user-defined cipher group:
- Create a user-defined cipher group. For example,
MY-CUSTOM-GROUP
. - Bind all the required ciphers to the user-defined cipher group.
- Note down the user-defined cipher group name.
For detailed instructions, see Configure a user-defined cipher group.
Note: The order of priority of ciphers is the same order defined in the list. The first one in the list gets the first priority and likewise.
The following example shows how to provide a list of built-in cipher groups and/or user defined cipher group. The user-defined cipher groups must be present in NetScaler before you apply it to Listener.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
sslciphers:
- 'SECURE'
- 'HIGH'
- 'MY-CUSTOM-CIPHERS'
<!--NeedCopy-->
In the preceding example, SECURE
and HIGH
are built-in cipher groups in NetScaler. MY-CUSTOM-CIPHERS
is the pre-configured user-defined cipher groups.
Note: If you have specified the pre-configured SSL profile, you must bind the ciphers manually through NetScaler and spec.policies.sslciphers
is not applied on the pre-configured SSL profile.
Note: The built-in cipher groups can be used in Tier-1 and Tier-2 NetScaler. The user-defined cipher group can be used only in a Tier-1 NetScaler.
Analytics profile
Analytics profile enables NetScaler to export the type of transactions or data to an external platform. If you are using NetScaler Observability Exporter to collect metrics and transactions data and export it to endpoints such Elasticsearch or Prometheus, you can configure the analytics profile to select the type of data that needs to be exported.
Note:
For the Analytics profile to be functional, you must configure the NetScaler Observability Exporter. Analytics configuration support using ConfigMap.
The following example shows how to enable webinsight
and tcpinsight
in the analytics profile.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
analyticsprofile:
config:
- type: webinsight
- type: tcpinsight
<!--NeedCopy-->
The following example shows how to select the additional parameters for the type of webinsight
which you want to be exported to NetScaler Observability Exporter. For information about the valid key-value pair, see Analytics Profile.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
analyticsprofile:
config:
- type: webinsight
parameters:
httpdomainname: "ENABLED"
httplocation: "ENABLED"
<!--NeedCopy-->
The following example shows how to use pre-configured analytics profiles.
apiVersion: citrix.com/v1
kind: Listener
metadata:
name: test-listener
namespace: default
spec:
vip: x.x.x.x
port: 443
certificates:
- secret:
name: my-cert
protocol: https
policies:
analyticsprofile:
preconfigured:
- 'custom-websingiht-analytics-profile'
- 'custom-tcpinsight-analytics-profile'
<!--NeedCopy-->