You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/nginx-one/changelog.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
description: ''
2
+
description: ""
3
3
docs: DOCS-1394
4
4
doctypes:
5
-
- reference
5
+
- reference
6
6
tags:
7
-
- docs
7
+
- docs
8
8
title: Changelog
9
9
toc: true
10
10
weight: 99999
@@ -34,6 +34,14 @@ Stay up-to-date with what's new and improved in the F5 NGINX One Console.
34
34
35
35
## January 20, 2025
36
36
37
+
### Revert a configuration
38
+
39
+
Using the NGINX One Console you can now:
40
+
41
+
- See a history of changes to the configuration on an instance or a Config Sync Group, as well as the content of the previous five configs published to that object
42
+
- Review the differences between the current and other saved configurations
43
+
- Revert to older configurations as needed
44
+
37
45
### AI Assistant
38
46
39
47
In the F5 NGINX One Console, you can now select lines from your configuration files, and then select **Explain with AI**. The NGINX One AI Assistant explains those lines based on the official NGINX documentation.
@@ -62,7 +70,7 @@ For more information, see the full documentation on [Managing Config Sync Groups
62
70
63
71
### Instance object cleanup
64
72
65
-
NGINX Instance objects that have been `unavailable` for a set period will be automatically cleaned up (deleted). By default, this period is 24 hours from the time the NGINX Instance object was last updated. An administrator can change or disable the cleanup process in the "Instance Settings" under Settings. Events will be generated for NGINX Instances that have been automatically cleaned up. See "Events" for a list of NGINX Instances that have been deleted automatically.
73
+
NGINX Instance objects that have been `unavailable` for a set period will be automatically cleaned up (deleted). By default, this period is 24 hours from the time the NGINX Instance object was last updated. An administrator can change or disable the cleanup process in the "Instance Settings" under Settings. Events will be generated for NGINX Instances that have been automatically cleaned up. See "Events" for a list of NGINX Instances that have been deleted automatically.
66
74
67
75
## June 11, 2024
68
76
@@ -92,9 +100,9 @@ We've updated the **Instance Details** and **Data Plane Keys** pages to make it
92
100
### Breaking change
93
101
94
102
- API responses now use "object_id" instead of "uuid". For example, **key_1mp6W5pqRxSZJugJN-yA8g**. We've introduced specific prefixes for different types of objects:
95
-
- Use **key_** for data-plane keys.
96
-
- Use **inst_** for NGINX instances.
97
-
- Use **nc_** for NGINX configurations.
103
+
- Use **key\_** for data-plane keys.
104
+
- Use **inst\_** for NGINX instances.
105
+
- Use **nc\_** for NGINX configurations.
98
106
- Likewise, we've updated the JSON key from **uuid** to **object_id** in response objects.
If needed, you can push these images to your own private registry.
73
-
74
-
#### Push images to your private registry
75
-
76
-
After pulling the images, tag them and upload them to your private registry.
77
-
78
-
1. Log in to your private registry:
79
-
80
-
```shell
81
-
docker login <my-docker-registry>
82
-
```
83
-
84
-
2. Tag and push each image. Replace `<my-docker-registry>` with your registry’s path and `<version-tag>` with the version you’re using (for example, `2.17.0`):
85
-
86
-
- For the `apigw` image:
87
-
88
-
```shell
89
-
docker tag private-registry.nginx.com/nms/apigw:<version-tag><my-docker-registry>/nms/apigw:<version-tag>
If you don't need a private registry, you can use a JWT token as a Docker configuration secret with Helm charts.
54
+
You can use your NGINX JWT as a Docker configuration secret with Helm charts.
131
55
132
56
Create a Docker registry secret on the cluster, using the JWT token as the username and `none` as the password. The Docker server is `private-registry.nginx.com`.
133
57
@@ -179,8 +103,8 @@ The `values.yaml` file customizes the Helm chart installation without editing th
179
103
180
104
1. Create a `values.yaml` file similar to this example:
181
105
182
-
- Replace `<my-docker-registry:port>` with your private Docker registry and port (if needed).
183
106
- In the `imagePullSecrets` section, add the credentials for your private Docker registry.
107
+
- Change the version tag to the version of NGINX Instance Manager you would like to install. See "Install the chart" below for versions.
184
108
185
109
{{< see-also >}} For more on creating a secret, see Kubernetes [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/). {{</ see-also >}}
186
110
@@ -190,27 +114,27 @@ The `values.yaml` file customizes the Helm chart installation without editing th
@@ -220,36 +144,7 @@ The `values.yaml` file customizes the Helm chart installation without editing th
220
144
221
145
---
222
146
223
-
## Manage network policies
224
147
225
-
To apply network policies for NGINX Instance Manager, ensure Kubernetes has a [network plugin](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) installed before the Helm chart installation.
226
-
227
-
By default, the following network policies will be created in the release namespace:
To disable network policies, update the `values.yaml` file:
245
-
246
-
```yaml
247
-
networkPolicies:
248
-
# Set this to true to enable network policies for NGINX Instance Manager.
249
-
enabled: false
250
-
```
251
-
252
-
---
253
148
254
149
## Install the chart
255
150
@@ -342,6 +237,37 @@ This deletes the `nms` application and all associated Kubernetes resources.
342
237
343
238
---
344
239
240
+
## Manage network policies
241
+
242
+
To apply network policies for NGINX Instance Manager, ensure Kubernetes has a [network plugin](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) installed before the Helm chart installation.
243
+
244
+
By default, the following network policies will be created in the release namespace:
To disable network policies, update the `values.yaml` file:
262
+
263
+
```yaml
264
+
networkPolicies:
265
+
# Set this to true to enable network policies for NGINX Instance Manager.
266
+
enabled: false
267
+
```
268
+
269
+
---
270
+
345
271
## Troubleshooting
346
272
347
273
For instructions on creating a support package to share with NGINX Customer Support, see [Create a Support Package from a Helm Installation]({{< relref "/nms/support/k8s-support-package.md" >}}).
0 commit comments