Skip to content

Commit f21a2f2

Browse files
mjangsylwang
andcommitted
Include changelog
Co-authored-by: Alan Dooley <[email protected]> Co-authored-by: Jodie Putrino <[email protected]> Co-authored-by: Travis Martin <[email protected]> Co-authored-by: Sylvia Wang <[email protected]>
1 parent 4f70a15 commit f21a2f2

File tree

4 files changed

+28
-21
lines changed

4 files changed

+28
-21
lines changed

content/nginx-one/changelog.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,15 @@ h2 {
3030

3131
Stay up-to-date with what's new and improved in the F5 NGINX One Console.
3232

33+
## July 18, 2025
34+
35+
### Monitor F5 NGINX Ingress Controller deployments
36+
37+
You can now monitor your NGINX Ingress Controller deployments. For details, see how
38+
you can [Connect to NGINX One Console]({{< ref "/nginx-one/k8s/add-nic.md" >}}).
39+
40+
Unlike other NGINX instances, when you connect NGINX Ingress Controller to NGINX One Console, access is read-only. Refer to our [NGINX Ingress Controller]({{< ref "/nic/" >}}) for details on how to modify these instances.
41+
3342
## July 1, 2025
3443

3544
### NGINX Agent version 3 support

content/nginx-one/glossary.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@ nd-docs: DOCS-1396
44
title: Glossary
55
toc: true
66
weight: 1000
7-
type:
8-
- reference
7+
nd-content-type: reference
98
---
109

1110
This glossary defines terms used in the F5 NGINX One Console and F5 Distributed Cloud.

content/nginx-one/k8s/add-nic.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,20 @@ Connecting NGINX Ingress Controller to NGINX One Console enables centralized mon
1212
Once connected, you'll see a **read-only** configuration of NGINX Ingress Controller. For each instance, you can review:
1313

1414
- Read-only configuration file
15-
- SSL/TLS certificates
16-
- CVEs
15+
- Unmanaged SSL/TLS certificates for Control Planes
1716

18-
## Prerequisites
17+
## Before you begin
1918

2019
Before connecting NGINX Ingress Controller to NGINX One Console, you need to create a Kubernetes Secret with the data plane key. Use the following command:
2120

2221
```shell
23-
kubectl create secret generic dataplane-key --from-literal=dataplane.key=<Your Dataplane Key> -n <namespace>
22+
kubectl create secret generic dataplane-key \
23+
--from-literal=dataplane.key=<Your Dataplane Key> \
24+
-n <namespace>
2425
```
2526

2627
When you create a Kubernetes Secret, use the same namespace where NGINX Ingress Controller is running.
27-
If you use `-watch-namespace` or `watch-secret-namespace` arguments with NGINX Ingress Controller,
28+
If you use [`-watch-namespace`]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#watch-namespace-string" >}}) or [`watch-secret-namespace`]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#watch-secret-namespace-string" >}}) arguments with NGINX Ingress Controller,
2829
you need to add the dataplane key secret to the watched namespaces. This secret will take approximately 60 - 90 seconds to reload on the pod.
2930

3031
{{<note>}}
@@ -41,11 +42,11 @@ Edit your `values.yaml` file to enable NGINX Agent and configure it to connect t
4142
```yaml
4243
nginxAgent:
4344
enable: true
44-
dataplaneKeySecretName: "<Your Dataplane Key Secret Name>"
45+
dataplaneKeySecretName: "<data_plane_key_secret_name>"
4546
```
4647
4748
The `dataplaneKeySecretName` is used to authenticate the agent with NGINX One Console. See the [NGINX One Console Docs]({{< ref "/nginx-one/connect-instances/create-manage-data-plane-keys.md" >}})
48-
for instructions on to generate your dataplane key from the NGINX One Console.
49+
for instructions on how to generate your dataplane key from the NGINX One Console.
4950

5051
Follow the [Installation with Helm]({{< ref "/nic/installation/installing-nic/installation-with-helm.md" >}}) instructions to deploy NGINX Ingress Controller.
5152

@@ -97,7 +98,7 @@ data:
9798
```
9899

99100
Make sure to set the namespace in the nginx-agent.config to the same namespace as NGINX Ingress Controller.
100-
Mount the ConfigMap to the deployment/daemonset file of NGINX Ingress Controller:
101+
Mount the ConfigMap to the Deployment/DaemonSet file of NGINX Ingress Controller:
101102

102103
```yaml
103104
volumeMounts:
@@ -112,7 +113,7 @@ volumes:
112113
name: nginx-agent-config
113114
- name: dataplane-key
114115
secret:
115-
secretName: <Your Dataplane Key Secret Name>
116+
secretName: "<data_plane_key_secret_name>"
116117
```
117118

118119
Follow the [Installation with Manifests]({{< ref "/nic/installation/installing-nic/installation-with-manifests.md" >}}) instructions to deploy NGINX Ingress Controller.
@@ -122,8 +123,8 @@ Follow the [Installation with Manifests]({{< ref "/nic/installation/installing-n
122123

123124
## Verify a connection to NGINX One Console
124125

125-
After deploying NGINX Ingress Controller or NGINX Gateway Fabric with NGINX Agent, you can verify the connection to NGINX One Console.
126-
Log in to your F5 Distributed Console cloud account. Select **NGINX One > Visit Service**. In the dashboard that appears, navigate to **Manage > Instances**. Your instances should appear in the list, where the instance name is the hostname and also the pod name.
126+
After deploying NGINX Ingress Controller <!-- or NGINX Gateway Fabric --> with NGINX Agent, you can verify the connection to NGINX One Console.
127+
Log in to your F5 Distributed Cloud Console account. Select **NGINX One > Visit Service**. In the dashboard, go to **Manage > Instances**. You should see your instances listed by name. The instance name matches both the hostname and the pod name.
127128

128129
## Troubleshooting
129130

@@ -132,7 +133,7 @@ If you encounter issues connecting your instances to NGINX One Console, try the
132133
Check the NGINX Agent version:
133134

134135
```shell
135-
kubectl exec -it -n <namespace> <nginx-ingress-pod-name> -- nginx-agent -v
136+
kubectl exec -it -n <namespace> <nginx_ingress_pod_name> -- nginx-agent -v
136137
```
137138

138139
If nginx-agent version is v3, continue with the following steps.
@@ -141,19 +142,18 @@ Otherwise, make sure you are using an image that does not include NGINX App Prot
141142
Check the NGINX Agent configuration:
142143

143144
```shell
144-
kubectl exec -it -n <namespace> <nginx-ingress-pod-name> -- cat /etc/nginx-agent/nginx-agent.conf
145+
kubectl exec -it -n <namespace> <nginx_ingress_pod_name> -- cat /etc/nginx-agent/nginx-agent.conf
145146
```
146147

147148
Check NGINX Agent logs:
148149

149150
```shell
150-
kubectl exec -it -n <namespace> <nginx-ingress-pod-name> -- nginx-agent
151+
kubectl exec -it -n <namespace> <nginx_ingress_pod_name> -- nginx-agent
151152
```
152153

153-
Select the instance associated with your deployment of NGINX Ingress Controller. Under the **Details** tab, you'll see You'll see information associated with:
154+
Select the instance associated with your deployment of NGINX Ingress Controller. Under the **Details** tab, you'll see information associated with:
154155

155-
- SSL/TLS certificates
156-
- CVEs
156+
- Unmanaged SSL/TLS certificates for Control Planes
157157
- Configuration recommendations
158158

159159
Under the **Configuration** tab, you'll see a **read-only** view of the configuration files.

content/nginx-one/k8s/overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,5 @@ nd-product: NGINX One
1515
You can now include Kubernetes systems through the [control plane](https://www.f5.com/glossary/control-plane). In related documentation, you can learn how to:
1616

1717
- Set up a connection to F5 NGINX One Console through a data plane key.
18-
- Monitor each connected Kubernetes system for CVEs.
19-
- Review the NGINX Ingress Controller and NGINX Gateway Fabric instances that are part of your fleet
18+
- Review the NGINX Ingress Controller instances that are part of your fleet.
2019

0 commit comments

Comments
 (0)