You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat: Rewrote main landing page to be in markdown + updated card shortcode usage
* Update card params correctly
* chore: Refactored icon usage to use new shortcode
* Removed brand icons
* Removed final few brand icons
### Download the NGINX Plus certificate and key {#myf5-download}
79
79
80
-
{{<fa"circle-info""text-muted">}} **This step is required if you are using NGINX Plus. If you are using NGINX open source, you can skip this section.**
80
+
{{<icon"circle-info""text-muted">}} **This step is required if you are using NGINX Plus. If you are using NGINX open source, you can skip this section.**
81
81
82
82
In order to build a container image with NGINX Plus, you must provide the SSL certificate and private key files provided with your NGINX Plus license. These files grant access to the package repository from which the script will download the NGINX Plus package.
Copy file name to clipboardExpand all lines: content/controller/platform/access-management/manage-active-directory-auth-provider.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Take the steps below to create a new Authentication Provider by using the NGINX
80
80
81
81
## Set up an Microsoft Entra Auth Provider {#set-up-entra}
82
82
83
-
{{< fa "arrow-circle-right" >}} **Introduced in NGINX Controller ADC v3.22**
83
+
{{< icon "arrow-circle-right" >}} **Introduced in NGINX Controller ADC v3.22**
84
84
85
85
In the previous section, you selected **Microsoft Entra** from the **Authentication Provider Type** list. Next, you'll set up the Auth Provider so it can connect to Microsoft Entra.
Copy file name to clipboardExpand all lines: content/mesh/guides/monitoring-and-tracing.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -57,8 +57,8 @@ To use NGINX Service Mesh with your Prometheus deployment:
57
57
If you are deploying NGINX Plus Ingress Controller with the NGINX Service Mesh, add the `nginx-plus-ingress` scrape config as well.
58
58
Consult the [Metrics]( {{< ref "/mesh/tutorials/kic/deploy-with-kic.md#nginx-plus-ingress-controller-metrics">}} ) section of the NGINX Ingress Controller Deployment tutorial for more information about the metrics collected.
59
59
60
-
- {{<fa"download">}} {{< link "/examples/nginx-mesh-sidecars-scrape-config.yaml""`nginx-mesh-sidecars-scrape-config.yaml`">}}
61
-
- {{<fa"download">}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml""`nginx-plus-ingress-scrape-config.yaml`">}}
60
+
- {{<icon"download">}} {{< link "/examples/nginx-mesh-sidecars-scrape-config.yaml""`nginx-mesh-sidecars-scrape-config.yaml`">}}
61
+
- {{<icon"download">}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml""`nginx-plus-ingress-scrape-config.yaml`">}}
62
62
63
63
{{< see-also >}}
64
64
For more information on how to view and understand the metrics that we track, see our [Prometheus Metrics]({{< ref "prometheus-metrics.md">}}) guide.
- Here is the minimal configuration to deploy the mesh using the `aws_pca` upstream authority:
79
79
@@ -102,7 +102,7 @@ In order to use a proper PKI, you must first choose one of the upstream authorit
102
102
{{< /note >}}
103
103
104
104
- [awssecret](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_awssecret.md): Loads CA credentials from AWS SecretsManager.
105
-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/awssecret.yaml" "awssecret.yaml" >}}
- [cert-manager](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_cert_manager.md): Uses an instance of `cert-manager` running in Kubernetes to request intermediate signing certificates for SPIRE server.
126
-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/cert-manager.yaml" "cert-manager.yaml" >}}
Copy file name to clipboardExpand all lines: content/mesh/guides/smi-traffic-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -170,7 +170,7 @@ In this example, `GET` requests to the destination service from `source-1` will
170
170
The burst of 10 and a delay of `nodelay` means that 10 excess requests over the rate will be forwarded to the destination service immediately.
171
171
Requests from sources other than `source-1`, or requests from `source-1` that are _not_ `GET` requests, will not be rate limited.
172
172
173
-
> You can download the schema for the RateLimit CRD here: {{< fa "download" >}} [`rate-limit-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/ratelimit.yaml)
173
+
> You can download the schema for the RateLimit CRD here: {{< icon "download" >}} [`rate-limit-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/ratelimit.yaml)
174
174
175
175
The rate limit spec contains the following fields:
If the `meshconfig` resource is deleted, or the `spec.meshConfigClassName` field is removed or changed, then the global mesh configuration cannot be updated, and unexpected behavior may occur.
Copy file name to clipboardExpand all lines: content/mesh/tutorials/accesscontrol-walkthrough.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,10 @@ The access control mode can be [set to `deny` at the global level]( {{< ref "/me
19
19
1. Enable [automatic sidecar injection]( {{< ref "/mesh/guides/inject-sidecar-proxy.md#automatic-proxy-injection" >}} ) for the `default` namespace.
20
20
1. Download all of the example files:
21
21
22
-
- {{< fa "download" >}} {{< link "/examples/dest-svc.yaml" >}}
23
-
- {{< fa "download" >}} {{< link "/examples/access.yaml" >}}
24
-
- {{< fa "download" >}} {{< link "/examples/driver-allowed.yaml" >}}
25
-
- {{< fa "download" >}} {{< link "/examples/driver-disallowed.yaml" >}}
22
+
- {{< icon "download" >}} {{< link "/examples/dest-svc.yaml" >}}
23
+
- {{< icon "download" >}} {{< link "/examples/access.yaml" >}}
24
+
- {{< icon "download" >}} {{< link "/examples/driver-allowed.yaml" >}}
25
+
- {{< icon "download" >}} {{< link "/examples/driver-disallowed.yaml" >}}
26
26
27
27
## Objectives
28
28
@@ -352,7 +352,7 @@ Traffic can be filtered via sets that are classified via ServiceAccounts. But [T
352
352
For exact matches, be sure to use regular expression anchors. To exactly match the header value `hello`, be sure to use `^hello$`; otherwise, additional headers that contain the sequence `hello` will be allowed.
353
353
{{< /tip>}}
354
354
{{< tip>}}
355
-
For an expanded example showing configuration for an application using a headless service, checkout our example for clustered application traffic policies {{<fa"download">}} {{< link "/examples/clustered-application.yaml">}}
355
+
For an expanded example showing configuration for an application using a headless service, checkout our example for clustered application traffic policies {{<icon"download">}} {{< link "/examples/clustered-application.yaml">}}
{{< note >}} The provided manifests configure NGINX Ingress Controller for ingress traffic only. If you would like to enable egress traffic, refer to the [Enable Egress](#enable-with-manifests) section of this guide. {{< /note >}}
104
104
{{< important >}} Be sure to replace the `nginx-ingress:version` image used in the manifest with the chosen image from a supported Container registry; or the container image that you have built. {{< /important >}}
105
105
106
106
- *OpenShift only*:
107
107
108
108
Download the SecurityContextConstraint necessary to run NGINX Ingress Controller in an OpenShift environment.
109
109
110
-
- {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/oss/openshift/nic-scc.yaml" "`nginx-ingress-controller/oss/openshift/nic-scc.yaml`" >}}
110
+
- {{< icon "download" >}} {{< link "/examples/nginx-ingress-controller/oss/openshift/nic-scc.yaml" "`nginx-ingress-controller/oss/openshift/nic-scc.yaml`" >}}
111
111
112
112
- Apply the `nginx-ingress-permissions` SecurityContextConstraint:
113
113
@@ -132,18 +132,18 @@ Before continuing, check the NGINX Ingress Controller [supported versions](#supp
132
132
- [Configure role-based access control (RBAC)](https://docs.nginx.com/nginx-ingress-controller/installation/installation-with-manifests/#1-configure-rbac)
133
133
- [Create Common Resources](https://docs.nginx.com/nginx-ingress-controller/installation/installation-with-manifests/#2-create-common-resources)
134
134
1. Create the NGINX Plus Ingress Controller as a **Deployment** or **DaemonSet** in Kubernetes using one of the following example manifests:
135
-
- Kubernetes Deployment: {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/plus/nginx-plus-ingress.yaml" "`nginx-ingress-controller/plus/nginx-plus-ingress.yaml`" >}}
136
-
- Kubernetes DaemonSet: {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/plus/nginx-plus-ingress-daemonset.yaml" "`nginx-ingress-controller/plus/nginx-plus-ingress-daemonset.yaml`" >}}
137
-
- OpenShift Deployment: {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/openshift/nginx-plus-ingress.yaml" "`nginx-ingress-controller/openshift/nginx-plus-ingress.yaml`" >}}
138
-
- Openshift DaemonSet: {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/openshift/nginx-plus-ingress-daemonset.yaml" "`nginx-ingress-controller/openshift/nginx-plus-ingress-daemonset.yaml`" >}}
{{< note >}} The provided manifests configure NGINX Plus Ingress Controller for ingress traffic only. If you would like to enable egress traffic, refer to the [Enable Egress](#enable-with-manifests) section of this guide. {{< /note >}}
140
140
{{< important >}} Be sure to replace the `nginx-plus-ingress:version` image used in the manifest with the chosen image from the F5 Container registry; or the container image that you have built. {{< /important >}}
141
141
142
142
- *OpenShift only*:
143
143
144
144
Download the SecurityContextConstraint necessary to run NGINX Ingress Controller in an OpenShift environment.
145
145
146
-
- {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/openshift/nic-scc.yaml" "`nginx-ingress-controller/openshift/nic-scc.yaml`" >}}
146
+
- {{< icon "download" >}} {{< link "/examples/nginx-ingress-controller/openshift/nic-scc.yaml" "`nginx-ingress-controller/openshift/nic-scc.yaml`" >}}
147
147
148
148
- Apply the `nginx-ingress-permissions` SecurityContextConstraint:
149
149
@@ -356,8 +356,8 @@ The NGINX Service Mesh uses the Pod's container name setting to identify the NGI
356
356
Add the applicable `nginx-ingress` scrape config to your Prometheus configuration and consult
357
357
[Monitoring and Tracing]( {{< ref "/mesh/guides/monitoring-and-tracing.md#prometheus" >}} ) for installation instructions.
358
358
359
-
- {{< fa "download" >}} {{< link "/examples/nginx-ingress-scrape-config.yaml" "`nginx-ingress-scrape-config.yaml`" >}}
360
-
- {{< fa "download" >}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml" "`nginx-plus-ingress-scrape-config.yaml`" >}}
359
+
- {{< icon "download" >}} {{< link "/examples/nginx-ingress-scrape-config.yaml" "`nginx-ingress-scrape-config.yaml`" >}}
360
+
- {{< icon "download" >}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml" "`nginx-plus-ingress-scrape-config.yaml`" >}}
361
361
362
362
## Available metrics
363
363
For a list of the NGINX Ingress Controller metrics, consult the [Available Metrics](https://docs.nginx.com/nginx-ingress-controller/logging-and-monitoring/prometheus/#available-metrics) section of the NGINX Ingress Controller docs.
- {{< fa "download" >}} {{< link "/examples/traffic-split/target-v1.0.yaml" "target-v1.0.yaml" >}}
35
-
- {{< fa "download" >}} {{< link "/examples/egress-driver.yaml" "egress-driver.yaml" >}}
34
+
- {{< icon "download" >}} {{< link "/examples/traffic-split/target-v1.0.yaml" "target-v1.0.yaml" >}}
35
+
- {{< icon "download" >}} {{< link "/examples/egress-driver.yaml" "egress-driver.yaml" >}}
36
36
37
37
## Install NGINX Service Mesh
38
38
@@ -188,7 +188,7 @@ Ingress:
188
188
If using Kubernetes v1.18.0 or greater you must use `ingressClassName` in your Ingress resources. Uncomment line 9 in the resource below or the downloaded file, `target-internal-route.yaml`.
189
189
{{< /important >}}
190
190
191
-
- {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/target-internal-route.yaml" "nginx-ingress-controller/target-internal-route.yaml" >}}
191
+
- {{< icon "download" >}} {{< link "/examples/nginx-ingress-controller/target-internal-route.yaml" "nginx-ingress-controller/target-internal-route.yaml" >}}
192
192
193
193
```yaml
194
194
apiVersion: networking.k8s.io/v1
@@ -216,7 +216,7 @@ spec:
216
216
217
217
VirtualServer:
218
218
219
-
- {{< fa "download" >}} {{< link "/examples/nginx-ingress-controller/target-vs-internal-route.yaml" "nginx-ingress-controller/target-vs-internal-route.yaml" >}}
219
+
- {{< icon "download" >}} {{< link "/examples/nginx-ingress-controller/target-vs-internal-route.yaml" "nginx-ingress-controller/target-vs-internal-route.yaml" >}}
0 commit comments