You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/nginx/deployment-guides/amazon-web-services/high-availability-network-load-balancer.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ NGINX Plus also provides reverse‑proxy and load balancing features, including
41
41
-[Management and real‑time configuration changes with DevOps‑friendly tools](https://www.nginx.com/products/nginx/load-balancing/#load-balancing-api)
42
42
43
43
<spanid="overview"></span>
44
-
## Solution Overview
44
+
## Solution overview
45
45
46
46
The combined solution described further in these instructions consists of:
47
47
@@ -88,7 +88,7 @@ The steps to set up an AWS NLB for an HA, all‑active NGINX Plus deployment i
88
88
-[Launch the AWS NLB](#nlb-launch)
89
89
90
90
<spanid="nlb-eip"></span>
91
-
### Allocate an Elastic IP Address
91
+
### Allocate an Elastic IP address
92
92
93
93
The first step is to allocate an Elastic IP address, which becomes the fixed IP address for your AWS NLB. Using an Elastic IP address is optional, but it is strongly recommended that you do so. With a dynamic IP address, the AWS NLB might not remain reachable if you reconfigure or restart it.
94
94
@@ -139,7 +139,7 @@ The new Elastic IP address displays on the **Elastic IPs** dashboard. Make a no
139
139
5. Select the *Next: Configure Routing* button. The **Step 2: Configure Routing** window opens.
140
140
141
141
<spanid="nlb-routing-options"></span>
142
-
### Configure the AWS NLB Routing Options
142
+
### Configure the AWS NLB routing options
143
143
144
144
In this step, you create a _target group_, using the **Step 2: Configure Routing** window. The target group contains the set of EC2 instances across which your AWS NLB load balances traffic. You specify those EC2 instances later, in the step [Register Instances in the Target Group](#nlb-register-instances)).
145
145
@@ -169,7 +169,7 @@ In this step, you create a _target group_, using the **Step 2: Configure Routing
169
169
3. Select the *Next: Register Targets* button. The **Step 3: Register Targets** window opens.
170
170
171
171
<spanid="nlb-register-instances"></span>
172
-
### Register Instances in the Target Group
172
+
### Register instances in the target group
173
173
174
174
In this step, you add instances to the empty target group you created in the previous section. Use the the **Step 3: Register Targets** window to add both NGINX Plus load balancer instances.
175
175
@@ -242,7 +242,7 @@ Use our Packer and Terraform scripts to completely automate the process:
242
242
Once you have created and configured the EC2 instances, your prerequisites are complete. Continue to [Configure an AWS Network Load Balancer](#nlb-configure).
243
243
244
244
<spanid="create-instance-install-nginx"></span>
245
-
#### Create EC2 Instances and Install the NGINX Software
245
+
#### Create EC2 instances and install the NGINX software
246
246
247
247
The deployed solution in these instructions uses six EC2 instances. Two instances run NGINX Plus. These load balance traffic to the other four instances, which run NGINX Open Source as a web server. The four NGINX Open Source instances deploy in two pairs; each pair runs a different app.
248
248
@@ -267,7 +267,7 @@ Assign the following names to the instances, then install the indicated NGINX so
#### Configure NGINX Open Source on the Web Servers
270
+
#### Configure NGINX Open Source on the web servers
271
271
272
272
Configure NGINX Open Source instances as web servers. These should return a page specifying the server name, address, and other information. As an example, here's the page returned by *App 1*:
273
273
@@ -285,7 +285,7 @@ Repeat the instructions on all four web servers:
Configure NGINX Plus instances as load balancers. These distribute requests to NGINX Open Source web servers set up in [Configure NGINX Open Source on the Web Servers](#configure-web-servers).
291
291
@@ -294,7 +294,7 @@ Use the *Step‑by‑step* instructions in our deployment guide, [Setting Up an
294
294
Repeat the instructions on both <spanstyle="color:#666666; font-weight:bolder; white-space: nowrap;">ngx-plus-1</span> and <spanstyle="color:#666666; font-weight:bolder; white-space: nowrap;">ngx-plus-2</span>.
295
295
296
296
<spanid="create-instances-automated"></span>
297
-
### Automate Instance Setup with Packer and Terraform
297
+
### Automate instance setup with Packer and Terraform
298
298
299
299
You can automate set up of the six instances described in these instructions. Automation is an alternative to creating and configuring each instance one at a time. To automate the set up, use the Packer and Terraform scripts from our [GitHub repository](https://github.com/nginxinc/NGINX-Demos/tree/master/aws-nlb-ha-asg). These scripts will:
Copy file name to clipboardExpand all lines: static/nginx-one/api/one.json
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@
38
38
},
39
39
{
40
40
"name": "Certificates",
41
-
"description": "The `Certificates` object in the NGINX One console represents an SSL certificate, covering both managed and unmanaged types. \nYou can view essential details like issuer, expiration status, and the instances or config sync groups where each certificate is deployed.\n",
41
+
"description": "The `Certificates` object in NGINX One Console represents an SSL certificate, covering both managed and unmanaged types. \nYou can view essential details like issuer, expiration status, and the instances or config sync groups where each certificate is deployed.\n",
42
42
"x-displayName": "Certificates"
43
43
},
44
44
{
@@ -48,7 +48,7 @@
48
48
},
49
49
{
50
50
"name": "Events",
51
-
"description": "Get a list of system events in the NGINX One console.\n",
51
+
"description": "Get a list of system events in NGINX One Console.\n",
52
52
"x-displayName": "Events"
53
53
},
54
54
{
@@ -616,7 +616,7 @@
616
616
],
617
617
"summary": "Delete an SSL certificate",
618
618
"operationId": "deleteCertificate",
619
-
"description": "Deletes a managed SSL certificate from the NGINX One console. This operation is disabled for unmanaged certificates, as they get cleaned up automatically when they are not used in any NGINX configuration.",
619
+
"description": "Deletes a managed SSL certificate from NGINX One Console. This operation is disabled for unmanaged certificates, as they get cleaned up automatically when they are not used in any NGINX configuration.",
620
620
"responses": {
621
621
"204": {
622
622
"description": "Successfully deleted the SSL certificate."
@@ -1127,7 +1127,7 @@
1127
1127
"Config Sync Groups"
1128
1128
],
1129
1129
"summary": "Delete an NGINX config sync group",
1130
-
"description": "Delete a NGINX config sync group from the NGINX One console. You can delete a config sync group, only if it contains no NGINX instances.\n",
1130
+
"description": "Delete a NGINX config sync group from NGINX One Console. You can delete a config sync group, only if it contains no NGINX instances.\n",
1131
1131
"operationId": "deleteConfigSyncGroup",
1132
1132
"responses": {
1133
1133
"204": {
@@ -1702,7 +1702,7 @@
1702
1702
"Config Sync Groups"
1703
1703
],
1704
1704
"summary": "Retrieves stored NGINX configurations for a NGINX config sync group",
1705
-
"description": "Returns a list of all configurations for a NGINX config sync group. Only the last 5 are kept on the NGINX One Console for a NGINX config sync group.",
1705
+
"description": "Returns a list of all configurations for a NGINX config sync group. Only the last 5 are kept on NGINX One Console for a NGINX config sync group.",
"summary": "Retrieves the stored NGINX configurations for an instance",
2814
-
"description": "Returns a list of all configurations for a NGINX instance. Only the last 5 are kept on the NGINX One Console for a NGINX instance.",
2814
+
"description": "Returns a list of all configurations for a NGINX instance. Only the last 5 are kept on NGINX One Console for a NGINX instance.",
2815
2815
"operationId": "listInstanceConfigurations",
2816
2816
"responses": {
2817
2817
"200": {
@@ -3731,7 +3731,7 @@
3731
3731
"properties": {
3732
3732
"total": {
3733
3733
"type": "integer",
3734
-
"description": "The absolute total number of the resource in the NGINX One Console.\n"
3734
+
"description": "The absolute total number of the resource in NGINX One Console.\n"
3735
3735
},
3736
3736
"count": {
3737
3737
"type": "integer",
@@ -4078,7 +4078,7 @@
4078
4078
},
4079
4079
"CertificateType": {
4080
4080
"type": "string",
4081
-
"description": "Certificate type:\n * `ca_bundle` - This certificate object is a CA bundle.\n * `cert_key` - This certificate object is consisted of public certificates and key.\n * `unmanaged` - This certificate is not managed by NGINX One console and its type is unmanaged.\n",
4081
+
"description": "Certificate type:\n * `ca_bundle` - This certificate object is a CA bundle.\n * `cert_key` - This certificate object is consisted of public certificates and key.\n * `unmanaged` - This certificate is not managed by NGINX One Console and its type is unmanaged.\n",
4082
4082
"enum": [
4083
4083
"ca_bundle",
4084
4084
"cert_key",
@@ -5535,7 +5535,7 @@
5535
5535
},
5536
5536
"NginxConfigPayloads": {
5537
5537
"type": "array",
5538
-
"description": "An array of payloads that track the file paths of each SSL certificates and key, indicating where to deploy\nthem onto the data plane instance.\n* If the `type` is `managed_certificate` or `managed_key`, you need to specify an `object_id`.\n * The `object_id` must represent a managed certificate object, or a `400 Bad Request` is returned. \n * The `contents` field is optional and is ignored if included.\n* The NGINX One Console manages deployed file paths only for managed certificates and keys. If you don't want \nthem to be managed by NGINX One Console, `inline_content` and `inline_secret` can be used for certificates or \nkeys, respectively. When you retrieve certificate deployment details, only the file paths of managed \ncertificates and keys will be shown.\n* If you use `inline_content` and `inline_secret` in your NGINX configuration, the NGINX One Console \nwill detect them. When they are used as SSL directives of the NGINX configuration \nfor certificates and keys, the certificates will be listed as `unmanaged_certificate` in the certificate \ndeployment details.\n",
5538
+
"description": "An array of payloads that track the file paths of each SSL certificates and key, indicating where to deploy\nthem onto the data plane instance.\n* If the `type` is `managed_certificate` or `managed_key`, you need to specify an `object_id`.\n * The `object_id` must represent a managed certificate object, or a `400 Bad Request` is returned. \n * The `contents` field is optional and is ignored if included.\n* NGINX One Console manages deployed file paths only for managed certificates and keys. If you don't want \nthem to be managed by NGINX One Console, `inline_content` and `inline_secret` can be used for certificates or \nkeys, respectively. When you retrieve certificate deployment details, only the file paths of managed \ncertificates and keys will be shown.\n* If you use `inline_content` and `inline_secret` in your NGINX configuration, NGINX One Console \nwill detect them. When they are used as SSL directives of the NGINX configuration \nfor certificates and keys, the certificates will be listed as `unmanaged_certificate` in the certificate \ndeployment details.\n",
0 commit comments