|
1 | | -**Note**: To complete this step, make sure that `gpg` is installed on your system. You can install NGINX Agent using various command-line tools like `curl` or `wget`. If your NGINX Instance Manager host is not set up with valid TLS certificates, you can use the insecure flags provided by those tools. See the following examples: |
| 1 | +--- |
| 2 | +docs: DOCS-1031 |
| 3 | +files: |
| 4 | + - content/nim/nginx-app-protect/setup-waf-config-management.md |
| 5 | +--- |
| 6 | + |
| 7 | +{{<note>}}Make sure `gpg` is installed on your system before continuing. You can install NGINX Agent using command-line tools like `curl` or `wget`.{{</note>}} |
| 8 | + |
| 9 | +If your NGINX Instance Manager host doesn't use valid TLS certificates, you can use the insecure flags to bypass verification. Here are some example commands: |
2 | 10 |
|
3 | 11 | {{<tabs name="install-agent-api">}} |
4 | 12 |
|
5 | 13 | {{%tab name="curl"%}} |
6 | 14 |
|
7 | | -- Secure: |
| 15 | +- **Secure:** |
8 | 16 |
|
9 | 17 | ```bash |
10 | | - curl https://<NMS_FQDN>/install/nginx-agent | sudo sh |
| 18 | + curl https://<NIM_FQDN>/install/nginx-agent | sudo sh |
11 | 19 | ``` |
12 | 20 |
|
13 | | -- Insecure: |
| 21 | +- **Insecure:** |
14 | 22 |
|
15 | 23 | ```bash |
16 | | - curl --insecure https://<NMS_FQDN>/install/nginx-agent | sudo sh |
| 24 | + curl --insecure https://<NIM_FQDN>/install/nginx-agent | sudo sh |
17 | 25 | ``` |
18 | 26 |
|
19 | | - You can add your NGINX instance to an existing instance group or create one using `--instance-group` or `-g` flag when installing NGINX Agent. |
20 | | - |
21 | | - The following example shows how to download and run the script with the optional `--instance-group` flag adding the NGINX instance to the instance group **my-instance-group**: |
22 | | - |
23 | | - ```bash |
24 | | - curl https://<NMS_FQDN>/install/nginx-agent > install.sh; chmod u+x install.sh |
25 | | - sudo ./install.sh --instance-group my-instance-group |
26 | | - ``` |
| 27 | +To add the instance to a specific instance group during installation, use the `--instance-group` (or `-g`) flag: |
27 | 28 |
|
28 | | - By default, the install script attempts to use a secure connection when downloading packages. If, however, the script cannot create a secure connection, it uses an insecure connection instead and logs the following warning message: |
| 29 | +```shell |
| 30 | +curl https://<NIM_FQDN>/install/nginx-agent -o install.sh |
| 31 | +chmod u+x install.sh |
| 32 | +sudo ./install.sh --instance-group <instance group> |
| 33 | +``` |
29 | 34 |
|
30 | | - ``` text |
31 | | - Warning: An insecure connection will be used during this nginx-agent installation |
32 | | - ``` |
| 35 | +By default, the install script uses a secure connection to download packages. If it can’t establish one, it falls back to an insecure connection and logs this message: |
33 | 36 |
|
34 | | - To require a secure connection, you can set the optional flag `skip-verify` to `false`. |
| 37 | +```text |
| 38 | +Warning: An insecure connection will be used during this nginx-agent installation |
| 39 | +``` |
35 | 40 |
|
36 | | - The following example shows how to download and run the script with an enforced secure connection: |
| 41 | +To enforce a secure connection, set the `--skip-verify` flag to false: |
37 | 42 |
|
38 | | - ```bash |
39 | | - curl https://<NMS_FQDN>/install/nginx-agent > install.sh chmod u+x install.sh; chmod u+x install.sh |
40 | | - sudo sh ./install.sh --skip-verify false |
41 | | - ``` |
| 43 | +```shell |
| 44 | +curl https://<NIM_FQDN>/install/nginx-agent -o install.sh |
| 45 | +chmod u+x install.sh |
| 46 | +sudo ./install.sh --skip-verify false |
| 47 | +``` |
42 | 48 |
|
43 | 49 | {{%/tab%}} |
44 | 50 |
|
45 | 51 | {{%tab name="wget"%}} |
46 | 52 |
|
| 53 | +- **Secure:** |
47 | 54 |
|
48 | | -- Secure: |
49 | | - |
50 | | - ```bash |
51 | | - wget https://<NMS_FQDN>/install/nginx-agent -O - | sudo sh -s --skip-verify false |
| 55 | + ```shell |
| 56 | + wget https://<NIM_FQDN>/install/nginx-agent -O - | sudo sh -s --skip-verify false |
52 | 57 | ``` |
53 | 58 |
|
54 | | -- Insecure: |
| 59 | +- **Insecure:** |
55 | 60 |
|
56 | | - ```bash |
57 | | - wget --no-check-certificate https://<NMS_FQDN>/install/nginx-agent -O - | sudo sh |
| 61 | + ```shell |
| 62 | + wget --no-check-certificate https://<NIM_FQDN>/install/nginx-agent -O - | sudo sh |
58 | 63 | ``` |
59 | 64 |
|
60 | | - When you install the NGINX Agent, you can use the `--instance-group` or `-g` flag to add your NGINX instance to an existing instance group or to a new group that you specify. |
61 | | - |
62 | | - The following example downloads and runs the NGINX Agent install script with the optional `--instance-group` flag, adding the NGINX instance to the instance group **my-instance-group**: |
63 | | - |
64 | | - ```bash |
65 | | - wget https://gnms1.npi.f5net.com/install/nginx-agent -O install.sh ; chmod u+x install.sh |
66 | | - sudo ./install.sh --instance-group my-instance-group |
67 | | - ``` |
| 65 | +To add your instance to a group during installation, use the `--instance-group` (or `-g`) flag: |
68 | 66 |
|
| 67 | +```shell |
| 68 | +wget https://<NIM_FQDN>/install/nginx-agent -O install.sh |
| 69 | +chmod u+x install.sh |
| 70 | +sudo ./install.sh --instance-group <instance group> |
| 71 | +``` |
69 | 72 |
|
70 | 73 | {{%/tab%}} |
71 | | -{{</tabs>}} |
72 | 74 |
|
73 | | -<!-- Do not remove. Keep this code at the bottom of the include --> |
74 | | -<!-- DOCS-1031 --> |
| 75 | +{{</tabs>}} |
0 commit comments