You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**NIM_LOG_LEVEL**| General | Sets the logging level for NGINX Instance Manager. |
9
+
|**NIM_METRICS_TTL**| General | Specifies the number of days to retain metrics. |
10
+
|**NIM_EVENTS_TTL**| General | Specifies the number of days to retain event logs. |
11
+
|**NIM_SECURITY_TTL**| General | Specifies the number of days to retain security violation logs. |
12
+
|**NIM_MAINTENANCE**| General | Enables maintenance mode for backup, restore, and troubleshooting (`true` or `false`). |
13
+
|**NIM_WATCHDOG_TIMEOUT**| General | Sets the timeout (in seconds) for the Data Plane Monitoring (DPM) watchdog. |
14
+
|**NIM_LICENSE_MODE_OF_OPERATION**| General | Sets the license mode to either `connected` (default) or `disconnected`. |
15
+
|**PROXY_ENABLE**| Forward Proxy | Enables or disables the use of a forward proxy (`true` or `false`). |
16
+
|**PROXY_HOST**| Forward Proxy | The IP address or hostname of the proxy server. |
17
+
|**PROXY_PORT**| Forward Proxy | The port number of the proxy server. |
18
+
|**PROXY_PROTOCOL**| Forward Proxy | The proxy protocol (`http` or `https`). |
19
+
|**PROXY_AUTH_REQUIRED**| Forward Proxy | Specifies whether authentication is required for the proxy (`true` or `false`). |
20
+
|**PROXY_USERNAME**| Forward Proxy | (Required if `PROXY_AUTH_REQUIRED=true`) The username for proxy authentication. |
21
+
|**PROXY_PASSWORD**| Forward Proxy | (Required if `PROXY_AUTH_REQUIRED=true`) The password for proxy authentication. |
22
+
|**PROXY_SSL_VERIFY**| Forward Proxy | Enables or disables SSL verification when `PROXY_PROTOCOL=https`. Default is `true`, meaning the proxy must have a valid certificate issued by a trusted Certificate Authority (CA). Set to `false` to allow self-signed or untrusted certificates (not recommended). |
1. Copy the proxy CA certificate into the system’s trusted certificate directory, for example **/usr/local/share/ca-certificates/** or **/etc/ssl/certs/** (path varies by distribution).
6
+
1. Run the appropriate command to update the system’s trusted certificates:
Copy file name to clipboardExpand all lines: content/nap-waf/v4/admin-guide/install-nms.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ weight: 100
21
21
22
22
[NGINX Management Suite Security Monitoring]({{< relref "/nms/about.md#security-monitoring" >}}) provides a centralized visualization tool that lets you analyze threats, view protection insights, and identify areas for policy tuning.
23
23
24
-
- For more information on how to configure Security Monitoring, see [Set Up App Protect Instances for Security Monitoring]({{< relref "/nim/monitoring/security-monitoring/configure/set-up-app-protect-instances.md" >}}).
24
+
- For more information on how to configure Security Monitoring, see [Set Up App Protect Instances for Security Monitoring]({{< relref "/nim/nginx-app-protect/security-monitoring/set-up-app-protect-instances.md" >}}).
Copy file name to clipboardExpand all lines: content/ngf/get-started.md
+23-23
Original file line number
Diff line number
Diff line change
@@ -36,14 +36,14 @@ Create the file _cluster-config.yaml_ with the following contents, noting the hi
36
36
apiVersion: kind.x-k8s.io/v1alpha4
37
37
kind: Cluster
38
38
nodes:
39
-
- role: control-plane
40
-
extraPortMappings:
41
-
- containerPort: 31437
42
-
hostPort: 8080
43
-
protocol: TCP
44
-
- containerPort: 31438
45
-
hostPort: 8443
46
-
protocol: TCP
39
+
- role: control-plane
40
+
extraPortMappings:
41
+
- containerPort: 31437
42
+
hostPort: 8080
43
+
protocol: TCP
44
+
- containerPort: 31438
45
+
hostPort: 8443
46
+
protocol: TCP
47
47
```
48
48
49
49
{{< warning >}}
@@ -73,7 +73,7 @@ Thanks for using kind! 😊
73
73
```
74
74
75
75
{{< note >}}
76
-
If you have cloned [the NGINX Gateway Fabric repository](https://github.com/nginx/nginx-gateway-fabric/tree/main), you can also create a kind cluster from the root folder with the following *make* command:
76
+
If you have cloned [the NGINX Gateway Fabric repository](https://github.com/nginx/nginx-gateway-fabric/tree/main), you can also create a kind cluster from the root folder with the following _make_ command:
77
77
78
78
```shell
79
79
make create-kind-cluster
@@ -90,7 +90,7 @@ make create-kind-cluster
90
90
Use `kubectl` to add the API resources for NGINX Gateway Fabric with the following command:
Copy file name to clipboardExpand all lines: content/ngf/how-to/monitoring/prometheus.md
+28-28
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ NGINX Gateway Fabric provides a variety of metrics for monitoring and analyzing
83
83
84
84
### NGINX/NGINX Plus metrics
85
85
86
-
NGINX metrics cover specific NGINX operations such as the total number of accepted client connections. For a complete list of available NGINX/NGINX Plus metrics, refer to the [NGINX Prometheus Exporter developer docs](https://github.com/nginxinc/nginx-prometheus-exporter#exported-metrics).
86
+
NGINX metrics cover specific NGINX operations such as the total number of accepted client connections. For a complete list of available NGINX/NGINX Plus metrics, refer to the [NGINX Prometheus Exporter developer docs](https://github.com/nginx/nginx-prometheus-exporter#exported-metrics).
87
87
88
88
These metrics use the `nginx_gateway_fabric` namespace and include the `class` label, indicating the NGINX Gateway class. For example, `nginx_gateway_fabric_connections_accepted{class="nginx"}`.
89
89
@@ -119,13 +119,13 @@ You can configure monitoring metrics for NGINX Gateway Fabric using Helm or Mani
119
119
120
120
### Using Helm
121
121
122
-
If you're setting up NGINX Gateway Fabric with Helm, you can adjust the `metrics.*` parameters to fit your needs. For detailed options and instructions, see the [Helm README](https://github.com/nginx/nginx-gateway-fabric/blob/v1.5.1/charts/nginx-gateway-fabric/README.md).
122
+
If you're setting up NGINX Gateway Fabric with Helm, you can adjust the `metrics.*` parameters to fit your needs. For detailed options and instructions, see the [Helm README](https://github.com/nginx/nginx-gateway-fabric/blob/v1.6.1/charts/nginx-gateway-fabric/README.md).
123
123
124
124
---
125
125
126
126
### Using Kubernetes manifests
127
127
128
-
For setups using Kubernetes manifests, change the metrics configuration by editing the NGINX Gateway Fabric manifest that you want to deploy. You can find some examples in the [deploy](https://github.com/nginx/nginx-gateway-fabric/tree/v1.5.1/deploy) directory.
128
+
For setups using Kubernetes manifests, change the metrics configuration by editing the NGINX Gateway Fabric manifest that you want to deploy. You can find some examples in the [deploy](https://github.com/nginx/nginx-gateway-fabric/tree/v1.6.1/deploy) directory.
129
129
130
130
---
131
131
@@ -136,18 +136,18 @@ If you need to disable metrics:
136
136
1. Set the `-metrics-disable`[command-line argument]({{< ref "/ngf/reference/cli-help.md">}}) to `true` in the NGINX Gateway Fabric Pod's configuration. Remove any other `-metrics-*` arguments.
137
137
2. In the Pod template for NGINX Gateway Fabric, delete the metrics port entry from the container ports list:
138
138
139
-
```yaml
140
-
- name: metrics
141
-
containerPort: 9113
142
-
```
139
+
```yaml
140
+
- name: metrics
141
+
containerPort: 9113
142
+
```
143
143
144
144
3. Also, remove the following annotations from the NGINX Gateway Fabric Pod template:
145
145
146
-
```yaml
147
-
annotations:
148
-
prometheus.io/scrape: "true"
149
-
prometheus.io/port: "9113"
150
-
```
146
+
```yaml
147
+
annotations:
148
+
prometheus.io/scrape: "true"
149
+
prometheus.io/port: "9113"
150
+
```
151
151
152
152
#### Changing the default port
153
153
@@ -156,19 +156,19 @@ To change the default port for metrics:
156
156
1. Update the `-metrics-port` [command-line argument]({{< ref "/ngf/reference/cli-help.md">}}) in the NGINX Gateway Fabric Pod's configuration to your chosen port number.
157
157
2. In the Pod template, change the metrics port entry to reflect the new port:
158
158
159
-
```yaml
160
-
- name: metrics
161
-
containerPort: <new-port>
162
-
```
159
+
```yaml
160
+
- name: metrics
161
+
containerPort: <new-port>
162
+
```
163
163
164
164
3. Modify the `prometheus.io/port` annotation in the Pod template to match the new port:
165
165
166
-
```yaml
167
-
annotations:
168
-
<...>
169
-
prometheus.io/port: "<new-port>"
170
-
<...>
171
-
```
166
+
```yaml
167
+
annotations:
168
+
<...>
169
+
prometheus.io/port: "<new-port>"
170
+
<...>
171
+
```
172
172
173
173
---
174
174
@@ -180,9 +180,9 @@ For enhanced security with HTTPS:
180
180
181
181
2. Add an HTTPS scheme annotation to the Pod template:
Copy file name to clipboardExpand all lines: content/ngf/how-to/monitoring/tracing.md
+27-27
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This guide explains how to enable tracing on HTTPRoutes in NGINX Gateway Fabric
15
15
16
16
NGINX Gateway Fabric supports tracing using [OpenTelemetry](https://opentelemetry.io/).
17
17
18
-
The official [NGINX OpenTelemetry Module](https://github.com/nginxinc/nginx-otel) instruments the NGINX data plane to export traces to a configured collector. Tracing data can be used with an OpenTelemetry Protocol (OTLP) exporter, such as the [OpenTelemetry Collector](https://github.com/open-telemetry/opentelemetry-collector).
18
+
The official [NGINX OpenTelemetry Module](https://github.com/nginxinc/nginx-otel) instruments the NGINX data plane to export traces to a configured collector. Tracing data can be used with an OpenTelemetry Protocol (OTLP) exporter, such as the [OpenTelemetry Collector](https://github.com/open-telemetry/opentelemetry-collector).
19
19
20
20
This collector can then export data to one or more upstream collectors like [Jaeger](https://www.jaegertracing.io/), [DataDog](https://docs.datadoghq.com/tracing/), and many others. This is called the [Agent model](https://opentelemetry.io/docs/collector/deployment/agent/).
21
21
@@ -104,7 +104,7 @@ The span attribute will be added to all tracing spans.
Copy file name to clipboardExpand all lines: content/ngf/how-to/traffic-management/advanced-routing.md
+7-8
Original file line number
Diff line number
Diff line change
@@ -21,18 +21,17 @@ The following image shows the traffic flow that we will be creating with these r
21
21
22
22
The goal is to create a set of rules that will result in client requests being sent to specific backends based on the request attributes. In this diagram, we have two versions of the `coffee` service. Traffic for v1 needs to be directed to the old application, while traffic for v2 needs to be directed towards the new application. We also have two `tea` services, one that handles GET operations and one that handles POST operations. Both the `tea` and `coffee` applications share the same Gateway.
- Save the public IP address and port of NGINX Gateway Fabric into shell variables:
31
30
32
-
```text
33
-
GW_IP=XXX.YYY.ZZZ.III
34
-
GW_PORT=<port number>
35
-
```
31
+
```text
32
+
GW_IP=XXX.YYY.ZZZ.III
33
+
GW_PORT=<port number>
34
+
```
36
35
37
36
{{< note >}} In a production environment, you should have a DNS record for the external IP address that is exposed, and it should refer to the hostname that the gateway will forward for. {{< /note >}}
38
37
@@ -45,7 +44,7 @@ The goal is to create a set of rules that will result in client requests being s
45
44
Begin by deploying the `coffee-v1` and `coffee-v2` applications:
@@ -117,7 +116,7 @@ This HTTPRoute has a few important properties:
117
116
- The `parentRefs` references the gateway resource that we created, and specifically defines the `http` listener to attach to, via the `sectionName` field.
118
117
-`cafe.example.com` is the hostname that is matched for all requests to the backends defined in this HTTPRoute.
119
118
- The first rule defines that all requests with the path prefix `/coffee` and no other matching conditions are sent to the `coffee-v1` Service.
120
-
- The second rule defines two matching conditions. If *either* of these conditions match, requests are forwarded to the `coffee-v2` Service:
119
+
- The second rule defines two matching conditions. If _either_ of these conditions match, requests are forwarded to the `coffee-v2` Service:
121
120
122
121
- Request with the path prefix `/coffee` and header `version=v2`
123
122
- Request with the path prefix `/coffee` and the query parameter `TEST=v2`
@@ -173,7 +172,7 @@ Let's deploy a different set of applications now called `tea` and `tea-post`. Th
0 commit comments