Skip to content

Commit 540ee26

Browse files
authored
Updates from internal changes, thru Jan 6 (#47)
2 parents 904bde5 + 61fc717 commit 540ee26

File tree

4 files changed

+14
-16
lines changed

4 files changed

+14
-16
lines changed

content/amplify/faq/nginx-amplify-agent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,16 @@ The F5 NGINX Amplify Agent is currently officially packaged and supported for th
1313

1414
* Ubuntu 22.04 "jammy" (amd64/arm64)
1515
* Ubuntu 20.04 "focal" (amd64/arm64)
16-
* Ubuntu 18.04 "bionic" (amd64/arm64)
1716
* Debian 12 "bookworm" (amd64/arm64)
1817
* Debian 11 "bullseye" (amd64/arm64)
19-
* Debian 10 "buster" (amd64/arm64)
2018
* RHEL/CentOS/OEL 9 (amd64/arm64)
2119
* Amazon Linux 2 LTS (amd64/arm64)
2220

2321
The following platforms are no longer supported but still can be used with older agent packages powered by Python 3:
2422

2523
* RHEL/CentOS/OEL 8 (amd64/arm64)
24+
* Ubuntu 18.04 "bionic" (amd64/arm64)
25+
* Debian 10 "buster" (amd64/arm64)
2626

2727
The following platforms are no longer supported but still can be used with older agent packages powered by Python 2:
2828

content/amplify/nginx-amplify-agent/install/installing-amplify-agent.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ docs: "DOCS-968"
99

1010
To use F5 NGINX Amplify to monitor your infrastructure, you need to install NGINX Amplify Agent on each system you wish to monitor.
1111

12-
{{< note >}} NGINX Amplify Agent will drop *root* privileges on startup. It will then use the user ID of the user `nginx` to set its effective user ID. The package install procedure will add the `nginx` user automatically unless it's already found in the system. If the [user](http://nginx.org/en/docs/ngx_core_module.html#user) directive appears in the NGINX configuration, NGINX Amplify Agent will pick up the user specified in the NGINX config for its effective user ID (e.g. `www-data`). {{< /note >}}
12+
{{< note >}} NGINX Amplify Agent will drop *root* privileges on startup. It will then use the user ID of the user `nginx` to set its effective user ID. The package install procedure will add the `nginx` user automatically unless it's already found in the system. If the [user](https://nginx.org/en/docs/ngx_core_module.html#user) directive appears in the NGINX configuration, NGINX Amplify Agent will pick up the user specified in the NGINX config for its effective user ID (e.g. `www-data`). {{< /note >}}
1313

1414
## Using the Install Script
1515

@@ -39,30 +39,30 @@ Take the following steps to install NGINX Amplify Agent:
3939
1. Add the NGINX public key.
4040

4141
```bash
42-
curl -fs http://nginx.org/keys/nginx_signing.key | apt-key add -
42+
curl -fs https://nginx.org/keys/nginx_signing.key | apt-key add -
4343
```
4444

4545
or
4646

4747
```bash
4848
wget -q -O - \
49-
http://nginx.org/keys/nginx_signing.key | apt-key add -
49+
https://nginx.org/keys/nginx_signing.key | apt-key add -
5050
```
5151

5252
2. Configure the repository as follows.
5353

5454
```bash
5555
codename=`lsb_release -cs` && \
5656
os=`lsb_release -is | tr '[:upper:]' '[:lower:]'` && \
57-
echo "deb http://packages.amplify.nginx.com/${os}/ ${codename} amplify-agent" > \
57+
echo "deb https://packages.amplify.nginx.com/py3/${os} ${codename} amplify-agent" > \
5858
/etc/apt/sources.list.d/nginx-amplify.list
5959
```
6060

61-
3. Verify the repository config file (Ubuntu 14.04 example follows).
61+
3. Verify the repository config file (Ubuntu 22.04 example follows).
6262

6363
```bash
6464
cat /etc/apt/sources.list.d/nginx-amplify.list
65-
deb http://packages.amplify.nginx.com/ubuntu/ trusty amplify-agent
65+
deb https://packages.amplify.nginx.com/py3/ubuntu jammy amplify-agent
6666
```
6767

6868
4. Update the package index files.
@@ -82,14 +82,14 @@ Take the following steps to install NGINX Amplify Agent:
8282
1. Add the NGINX public key.
8383

8484
```bash
85-
curl -sS -L -O http://nginx.org/keys/nginx_signing.key && \
85+
curl -sS -L -O https://nginx.org/keys/nginx_signing.key && \
8686
rpm --import nginx_signing.key
8787
```
8888

8989
or
9090

9191
```bash
92-
wget -q -O nginx_signing.key http://nginx.org/keys/nginx_signing.key && \
92+
wget -q -O nginx_signing.key https://nginx.org/keys/nginx_signing.key && \
9393
rpm --import nginx_signing.key
9494
```
9595

@@ -99,23 +99,23 @@ Take the following steps to install NGINX Amplify Agent:
9999

100100
```bash
101101
release="7" && \
102-
printf "[nginx-amplify]\nname=nginx amplify repo\nbaseurl=http://packages.amplify.nginx.com/centos/${release}/\$basearch\ngpgcheck=1\nenabled=1\n" > \
102+
printf "[nginx-amplify]\nname=nginx amplify repo\nbaseurl=https://packages.amplify.nginx.com/py3/centos/${release}/\$basearch\ngpgcheck=1\nenabled=1\n" > \
103103
/etc/yum.repos.d/nginx-amplify.repo
104104
```
105105

106106
```bash
107107
release="latest" && \
108-
printf "[nginx-amplify]\nname=nginx amplify repo\nbaseurl=http://packages.amplify.nginx.com/amzn/${release}/\$basearch\ngpgcheck=1\nenabled=1\n" > \
108+
printf "[nginx-amplify]\nname=nginx amplify repo\nbaseurl=https://packages.amplify.nginx.com/py3/amzn/${release}/\$basearch\ngpgcheck=1\nenabled=1\n" > \
109109
/etc/yum.repos.d/nginx-amplify.repo
110110
```
111111

112-
3. Verify the repository config file (RHEL 7.1 example follows).
112+
3. Verify the repository config file (RHEL 9.5 example follows).
113113

114114
```bash
115115
cat /etc/yum.repos.d/nginx-amplify.repo
116116
[nginx-amplify]
117117
name=nginx repo
118-
baseurl=http://packages.amplify.nginx.com/centos/7/$basearch
118+
baseurl=https://packages.amplify.nginx.com/centos/9/$basearch
119119
gpgcheck=1
120120
enabled=1
121121
```

content/nap-waf/v4/logging-overview/security-log.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,6 @@ The table below lists attributes that are generated in the security logs. When u
274274
| enforced_bot_anomalies | Comma-separated list of anomalies that caused the request to be blocked. | default, grpc |
275275
| grpc_method | The method name of the gRPC request (derived from the URI). Not to be confused with `http_method`. Applicable only to requests that are processed by a gRPC Content Profile. The value is `N/A` in other cases. | grpc |
276276
| grpc_service | The service name of the gRPC request (derived from the URI). Applicable only to requests that are processed by a gRPC Content Profile. The value is `N/A` in other cases. | grpc |
277-
| grpc_message | The value of the `grpc-message` header | grpc |
278277
| compression_method | The compression algorithm used for the present message. Currently one of: <ul><li>gzip</li><li>deflate</li><li>none</li><li>n/a</li></ul> | grpc |
279278
|headers | The headers part of the request including the query string but not the body. | grpc |
280279
|ip_client | The source IP of the client initiating the request<br> Note: if a proxy is being used, this may differ from the IP in the `X-Forwarded-For` header. | default, grpc |

content/nap-waf/v5/logging-overview/security-log.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,6 @@ The table below lists attributes that are generated in the security logs. When u
256256
| enforced_bot_anomalies | Comma-separated list of anomalies that caused the request to be blocked. | default, grpc |
257257
| grpc_method | The method name of the gRPC request (derived from the URI). Not to be confused with 'http_method`. Applicable only to requests that are processed by a gRPC Content Profile. The value is `N/A` in other cases. | grpc |
258258
| grpc_service | The service name of the gRPC request (derived from the URI). Applicable only to requests that are processed by a gRPC Content Profile. The value is `N/A` in other cases. | grpc |
259-
| grpc_message | The value of the `grpc-message` header | grpc |
260259
| compression_method | The compression algorithm used for the present message. Currently one of: <ul><li>gzip</li><li>deflate</li><li>none</li><li>n/a</li></ul> | grpc |
261260
|headers | The headers part of the request including the query string but not the body. | grpc |
262261
|ip_client | The source IP of the client initiating the request<br> Note: if a proxy is being used, this may differ from the IP in the `X-Forwarded-For` header. | default, grpc |

0 commit comments

Comments
 (0)