Skip to content

Commit a181556

Browse files
authored
Merge branch 'main' into fips-url
2 parents 48982be + 0158f5d commit a181556

File tree

7 files changed

+112
-43
lines changed

7 files changed

+112
-43
lines changed

content/nap-dos/deployment-guide/learn-about-deployment.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -413,22 +413,28 @@ When deploying App Protect DoS on NGINX Plus take the following precautions to s
413413
414414
6. Enable Yum repositories to pull NGINX App Protect DoS dependencies:
415415
416-
If you have a RHEL subscription:
416+
For RHEL subscription:
417417
418418
```shell
419419
sudo subscription-manager repos --enable=rhel-8-for-x86_64-baseos-rpms
420420
sudo subscription-manager repos --enable=rhel-8-for-x86_64-appstream-rpms
421421
sudo dnf -y install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
422422
```
423423
424-
7. Add NGINX Plus and NGINX App Protect DoS repository:
424+
For RockyLinux:
425+
426+
```shell
427+
sudo dnf -y install epel-release
428+
```
429+
430+
8. Add NGINX Plus and NGINX App Protect DoS repository:
425431
426432
```shell
427433
sudo wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/nginx-plus-8.repo
428434
sudo wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/app-protect-dos-8.repo
429435
```
430436
431-
8. In case of fresh installation, update the repository and install the most recent version of the NGINX Plus App Protect DoS package (which includes NGINX Plus):
437+
9. In case of fresh installation, update the repository and install the most recent version of the NGINX Plus App Protect DoS package (which includes NGINX Plus):
432438
433439
```shell
434440
sudo dnf install app-protect-dos
@@ -457,7 +463,7 @@ When deploying App Protect DoS on NGINX Plus take the following precautions to s
457463
sudo dnf install app-protect-dos-27+2.4.0
458464
```
459465
460-
9. In case of upgrading from previously installed NGINX Plus App Protect DoS package (which includes NGINX Plus):
466+
10. In case of upgrading from previously installed NGINX Plus App Protect DoS package (which includes NGINX Plus):
461467
462468
```shell
463469
sudo dnf remove nginx-plus
@@ -621,14 +627,20 @@ When deploying App Protect DoS on NGINX Plus take the following precautions to s
621627
622628
6. Enable the yum repositories to pull NGINX App Protect DoS dependencies:
623629
624-
If you have a RHEL subscription:
630+
For RHEL subscription:
625631
626632
```shell
627633
sudo subscription-manager repos --enable=rhel-9-for-x86_64-baseos-rpms
628634
sudo subscription-manager repos --enable=rhel-9-for-x86_64-appstream-rpms
629635
sudo dnf -y install https://dl.fedoraproject.org/pub/epel/epel-release-latest-9.noarch.rpm
630636
```
631637
638+
For RockyLinux:
639+
640+
```shell
641+
sudo dnf -y install epel-release
642+
```
643+
632644
7. Add the NGINX Plus and NGINX App Protect DoS repositories:
633645
634646
```shell

content/nginxaas-azure/changelog.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,17 @@ To see a list of currently active issues, visit the [Known issues]({{< ref "/ngi
1414
To review older entries, visit the [Changelog archive]({{< ref "/nginxaas-azure/changelog-archive" >}}) section.
1515

1616

17+
## September 18, 2025
18+
19+
- {{% icon-feature %}} **Notification on update to deployments using the Stable Upgrade Channel**
20+
21+
NGINXaaS for Azure deployments using the **Stable** [Upgrade Channel]({{< ref "/nginxaas-azure/quickstart/upgrade-channels.md" >}}) will be updated to [NGINX Plus Release 35 (R35)]({{< ref "/nginx/releases.md#nginxplusrelease-35-r35" >}}) during the week of Oct 06-10, 2025. This will also include updates to the following NGINX Plus modules:
22+
- nginx-plus-module-njs
23+
24+
Please review the [NGINX Plus Release 35 (R35)]({{< ref "/nginx/releases.md#nginxplusrelease-35-r35" >}}) Release Notes carefully. If you have any concerns, it's recommended to validate your configuration against NGINX Plus R35 by setting up a test deployment using the **Preview** [Upgrade Channel]({{< ref "/nginxaas-azure/quickstart/upgrade-channels.md" >}}). See [these instructions]({{< ref "/nginxaas-azure/quickstart/recreate.md" >}}) on how to set up a deployment similar to your current one.
25+
26+
If you have any questions or concerns, please [contact us]({{< ref "/nginxaas-azure/get-help.md" >}}).
27+
1728
## August 18, 2025
1829

1930
- {{% icon-feature %}} **Updates to NGINXaaS for Azure GitHub Action**

content/nginxaas-azure/getting-started/nginx-configuration/nginx-configuration-azure-cli.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,15 @@ az nginx deployment configuration analyze --deployment-name $DEPLOYMENT_NAME \
127127
--package data="$TAR_DATA"
128128
```
129129

130+
Upload a package with config files and protected files:
131+
132+
```shell
133+
az nginx deployment configuration create --deployment-name myDeployment \
134+
--resource-group myResourceGroup --root-file nginx.conf --name default \
135+
--package data="$TAR_DATA" \
136+
protected-files="['nginx/servers/server1.conf','nginx/servers/server2.conf']"
137+
```
138+
130139
- Multiple file configuration with protected files:
131140

132141
```shell

content/nginxaas-azure/getting-started/nginx-configuration/overview.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,20 @@ The topics below provide information on NGINX configuration restrictions and dir
2525
NGINX configurations stored in GitHub can be applied to existing NGINXaaS for Azure deployments using custom GitHub Action workflows. See [NGINXaaS for Azure Deployment Action](https://github.com/nginxinc/nginx-for-azure-deploy-action) for documentation and examples on how to incorporate these workflows in your GitHub Actions CI/CD pipelines.
2626

2727
## NGINX filesystem restrictions
28-
NGINXaaS for Azure places restrictions on the instance's filesystem; only a specific set of directories are allowed to be read from and written to. Below is a table describing what directories the NGINX worker process can read and write to and what directories files can be written to. These files include certificate files and any files uploaded to the deployment, excluding NGINX configuration files.
2928

30-
{{< table >}}
31-
| Allowed Directory | NGINX worker process can read/write to | Files can be written to |
32-
|------------------ | ----------------- | ----------------- |
33-
| /etc/nginx | | &check; |
34-
| /opt | &check; | &check; |
35-
| /srv | &check; | &check; |
36-
| /tmp | &check; | |
37-
| /var/cache/nginx | &check; | |
38-
| /var/www | &check; | &check; |
29+
NGINXaaS for Azure places restrictions on the instance’s filesystem; only a specific set of directories are allowed to be read from and written to. Below is a table describing what directories the NGINX worker process can read and write to and what directories files can be written to. These files include certificate files and any files uploaded to the deployment, excluding NGINX configuration files.
30+
31+
{{< table >}}
32+
33+
| Directory | Master Read | Master Write | Worker Read | Worker Write | Recommended Use |
34+
|-------------------|:-----------:|:------------:|:-----------:|:------------:|----------------------------------|
35+
| /etc/nginx/ | ✔️ | ✔️ ||| NGINX configuration, certificates, keys, application files (e.g. Lua or njs scripts) |
36+
| /opt/ | ✔️ | ✔️ | ✔️ || Application files (e.g. Lua scripts) |
37+
| /srv/ | ✔️ | ✔️ | ✔️ || Application files |
38+
| /var/www/ | ✔️ | ✔️ | ✔️ || Static files (e.g. index.html) |
39+
| /tmp/ | ✔️ | ✔️ | ✔️ | ✔️ | Temporary files |
40+
| /var/cache/nginx/ | ✔️ | ✔️ | ✔️ | ✔️ | Cache data |
41+
3942
{{< /table >}}
4043

4144
Attempts to access other directories will be denied and result in a `5xx` error.

content/nginxaas-azure/module-changelog.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,29 @@ url: /nginxaas/azure/module-changelog/
77

88
Learn about the modules supported by the latest versions of F5 NGINXaaS for Azure.
99

10+
## September 18, 2025
11+
12+
### Preview
13+
14+
{{<bootstrap-table "table table-bordered table-striped table-responsive table-sm">}}
15+
16+
| Name | Version | Description |
17+
|------------------------------------------|--------------------------|------------------------------------------------------------------------|
18+
| nginx-plus | 1.29.0 (nginx-plus-r35) | NGINX Plus, provided by Nginx, Inc. |
19+
| nginx-agent | 1.20.16-2026591880 | NGINX Agent - Management for NGINXaaS |
20+
| Operating System | Ubuntu 22.04.5 | Jammy Jellyfish, provided by Canonical Ltd. |
21+
| nginx-plus-module-geoip2 | 35+3.4-1 | NGINX Plus 3rd-party GeoIP2 dynamic modules |
22+
| nginx-plus-module-headers-more | 35+0.37-1 | NGINX Plus 3rd-party headers-more dynamic module |
23+
| nginx-plus-module-image-filter | 35-1 | NGINX Plus image filter dynamic module |
24+
| nginx-plus-module-lua | 35+0.10.28-1 | NGINX Plus 3rd-party Lua dynamic modules |
25+
| nginx-plus-module-ndk | 35+0.3.3-1 | NGINX Plus 3rd-party NDK dynamic module |
26+
| nginx-plus-module-njs | 35+0.9.1-1 | NGINX Plus njs dynamic modules |
27+
| nginx-plus-module-otel | 35+0.1.2-1 | NGINX Plus OpenTelemetry dynamic module |
28+
| nginx-plus-module-xslt | 35-1 | NGINX Plus xslt dynamic module |
29+
| nginx-plus-module-appprotect | 35+5.498.0-1 | NGINX Plus app protect dynamic module version 5.498.0 |
30+
| app-protect-module-plus | 35+5.498.0-1 | App-Protect package for Nginx Plus, includes all of the default files and examples. NGINX App Protect provides web application firewall (WAF) security protection for your web applications, including OWASP Top 10 attacks. |
31+
| app-protect-plugin | 6.20.0-1 | NGINX App Protect plugin |
32+
{{</bootstrap-table>}}
1033

1134
## Access module versions using data plane API:
1235

content/nic/configuration/policy-resource.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -793,29 +793,6 @@ The feature is implemented using the NGINX [ngx_http_proxy_module](https://nginx
793793

794794
A VirtualServer/VirtualServerRoute can reference multiple cache policies. However, only one can be applied: every subsequent reference will be ignored.
795795

796-
## Using Policy
797-
798-
You can use the usual `kubectl` commands to work with Policy resources, just as with built-in Kubernetes resources.
799-
800-
For example, the following command creates a Policy resource defined in `access-control-policy-allow.yaml` with the name `webapp-policy`:
801-
802-
```shell
803-
kubectl apply -f access-control-policy-allow.yaml
804-
805-
policy.k8s.nginx.org/webapp-policy configured
806-
```
807-
808-
You can get the resource by running:
809-
810-
```shell
811-
kubectl get policy webapp-policy
812-
813-
NAME AGE
814-
webapp-policy 27m
815-
```
816-
817-
For `kubectl get` and similar commands, you can also use the short name `pol` instead of `policy`.
818-
819796
### WAF
820797

821798
{{< call-out "note" >}} The feature is implemented using the NGINX Plus [NGINX App Protect WAF Module]({{< ref "/nap-waf/" >}}). {{< /call-out >}}
@@ -863,6 +840,29 @@ policies:
863840

864841
In this example NGINX Ingress Controller will use the configuration from the first policy reference `waf-policy-one`, and ignores `waf-policy-two`.
865842

843+
## Using Policy
844+
845+
You can use the usual `kubectl` commands to work with Policy resources, just as with built-in Kubernetes resources.
846+
847+
For example, the following command creates a Policy resource defined in `access-control-policy-allow.yaml` with the name `webapp-policy`:
848+
849+
```shell
850+
kubectl apply -f access-control-policy-allow.yaml
851+
852+
policy.k8s.nginx.org/webapp-policy configured
853+
```
854+
855+
You can get the resource by running:
856+
857+
```shell
858+
kubectl get policy webapp-policy
859+
860+
NAME AGE
861+
webapp-policy 27m
862+
```
863+
864+
For `kubectl get` and similar commands, you can also use the short name `pol` instead of `policy`.
865+
866866
### Applying Policies
867867

868868
You can apply policies to both VirtualServer and VirtualServerRoute resources. For example:

content/nic/tutorials/security-monitoring.md

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -82,13 +82,24 @@ If you use custom container images, NGINX Agent must be installed along with NGI
8282

8383
{{< call-out "note" >}} The `features` list must not contain `nginx-config-async` or `nginx-ssl-config` as these features can cause conflicts with NGINX Ingress Controller.{{< /call-out >}}
8484

85-
3. Make sure that the ConfigMap is mounted to the NGINX Ingress Controller pod at `/etc/nginx-agent/nginx-agent.conf` by adding the following to the NGINX Ingress Controller deployment manifest:
85+
3. Make sure that the ConfigMap is mounted to the NGINX Ingress Controller pod at `/etc/nginx-agent/nginx-agent.conf` and the dynamic agent config is mounted at `/var/lib/nginx-agent` by adding the following volumes and volumeMounts to the NGINX Ingress Controller deployment manifest:
8686

8787
```yaml
88-
volumeMounts:
89-
- name: agent-conf
90-
mountPath: /etc/nginx-agent/nginx-agent.conf
91-
subPath: nginx-agent.conf
88+
volumes:
89+
- name: agent-conf
90+
configMap:
91+
name: agent-conf
92+
- name: agent-dynamic
93+
emptyDir: {}
94+
```
95+
96+
```yaml
97+
volumeMounts:
98+
- name: agent-conf
99+
mountPath: /etc/nginx-agent/nginx-agent.conf
100+
subPath: nginx-agent.conf
101+
- name: agent-dynamic
102+
mountPath: /var/lib/nginx-agent
92103
```
93104

94105
4. Follow the [Installation with Manifests]({{< ref "/nic/installation/installing-nic/installation-with-manifests.md" >}}) instructions to deploy NGINX Ingress Controller with custom resources enabled.

0 commit comments

Comments
 (0)