You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can now monitor your NGINX Ingress Controller deployments. For details, see how
38
+
you can [Connect to NGINX One Console]({{< ref "/nginx-one/k8s/add-nic.md" >}}).
39
+
40
+
Unlike other NGINX instances, when you connect NGINX Ingress Controller to NGINX One Console, access is read-only. Refer to our [NGINX Ingress Controller]({{< ref "/nic/" >}}) for details on how to modify these instances.
Copy file name to clipboardExpand all lines: content/nginx-one/k8s/add-nic.md
+17-17Lines changed: 17 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -12,19 +12,20 @@ Connecting NGINX Ingress Controller to NGINX One Console enables centralized mon
12
12
Once connected, you'll see a **read-only** configuration of NGINX Ingress Controller. For each instance, you can review:
13
13
14
14
- Read-only configuration file
15
-
- SSL/TLS certificates
16
-
- CVEs
15
+
- Unmanaged SSL/TLS certificates for Control Planes
17
16
18
-
## Prerequisites
17
+
## Before you begin
19
18
20
19
Before connecting NGINX Ingress Controller to NGINX One Console, you need to create a Kubernetes Secret with the data plane key. Use the following command:
When you create a Kubernetes Secret, use the same namespace where NGINX Ingress Controller is running.
27
-
If you use `-watch-namespace`or `watch-secret-namespace` arguments with NGINX Ingress Controller,
28
+
If you use [`-watch-namespace`]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#watch-namespace-string" >}}) or [`watch-secret-namespace`]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#watch-secret-namespace-string" >}}) arguments with NGINX Ingress Controller,
28
29
you need to add the dataplane key secret to the watched namespaces. This secret will take approximately 60 - 90 seconds to reload on the pod.
29
30
30
31
{{<note>}}
@@ -41,11 +42,11 @@ Edit your `values.yaml` file to enable NGINX Agent and configure it to connect t
The `dataplaneKeySecretName` is used to authenticate the agent with NGINX One Console. See the [NGINX One Console Docs]({{< ref "/nginx-one/connect-instances/create-manage-data-plane-keys.md" >}})
48
-
for instructions on to generate your dataplane key from the NGINX One Console.
49
+
for instructions on how to generate your dataplane key from the NGINX One Console.
49
50
50
51
Follow the [Installation with Helm]({{< ref "/nic/installation/installing-nic/installation-with-helm.md" >}}) instructions to deploy NGINX Ingress Controller.
51
52
@@ -97,7 +98,7 @@ data:
97
98
```
98
99
99
100
Make sure to set the namespace in the nginx-agent.config to the same namespace as NGINX Ingress Controller.
100
-
Mount the ConfigMap to the deployment/daemonset file of NGINX Ingress Controller:
101
+
Mount the ConfigMap to the Deployment/DaemonSet file of NGINX Ingress Controller:
101
102
102
103
```yaml
103
104
volumeMounts:
@@ -112,7 +113,7 @@ volumes:
112
113
name: nginx-agent-config
113
114
- name: dataplane-key
114
115
secret:
115
-
secretName: <Your Dataplane Key Secret Name>
116
+
secretName: "<data_plane_key_secret_name>"
116
117
```
117
118
118
119
Follow the [Installation with Manifests]({{< ref "/nic/installation/installing-nic/installation-with-manifests.md" >}}) instructions to deploy NGINX Ingress Controller.
@@ -122,8 +123,8 @@ Follow the [Installation with Manifests]({{< ref "/nic/installation/installing-n
122
123
123
124
## Verify a connection to NGINX One Console
124
125
125
-
After deploying NGINX Ingress Controller or NGINX Gateway Fabric with NGINX Agent, you can verify the connection to NGINX One Console.
126
-
Log in to your F5 Distributed Console cloud account. Select **NGINX One > Visit Service**. In the dashboard that appears, navigate to **Manage > Instances**. Your instances should appear in the list, where the instance name is the hostname and also the pod name.
126
+
After deploying NGINX Ingress Controller <!-- or NGINX Gateway Fabric --> with NGINX Agent, you can verify the connection to NGINX One Console.
127
+
Log in to your F5 Distributed Cloud Console account. Select **NGINX One > Visit Service**. In the dashboard, go to **Manage > Instances**. You should see your instances listed by name. The instance name matches both the hostname and the pod name.
127
128
128
129
## Troubleshooting
129
130
@@ -132,7 +133,7 @@ If you encounter issues connecting your instances to NGINX One Console, try the
Select the instance associated with your deployment of NGINX Ingress Controller. Under the **Details** tab, you'll see You'll see information associated with:
154
+
Select the instance associated with your deployment of NGINX Ingress Controller. Under the **Details** tab, you'll see information associated with:
154
155
155
-
- SSL/TLS certificates
156
-
- CVEs
156
+
- Unmanaged SSL/TLS certificates for Control Planes
157
157
- Configuration recommendations
158
158
159
159
Under the **Configuration** tab, you'll see a **read-only** view of the configuration files.
Copy file name to clipboardExpand all lines: content/nginx-one/k8s/overview.md
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,5 @@ nd-product: NGINX One
15
15
You can now include Kubernetes systems through the [control plane](https://www.f5.com/glossary/control-plane). In related documentation, you can learn how to:
16
16
17
17
- Set up a connection to F5 NGINX One Console through a data plane key.
18
-
- Monitor each connected Kubernetes system for CVEs.
19
-
- Review the NGINX Ingress Controller and NGINX Gateway Fabric instances that are part of your fleet
18
+
- Review the NGINX Ingress Controller instances that are part of your fleet.
0 commit comments