Skip to content

Commit afb62ba

Browse files
committed
feat: More PLM changes
1 parent 3a18f2e commit afb62ba

File tree

1 file changed

+23
-21
lines changed

1 file changed

+23
-21
lines changed

content/waf/policies/lifecycle-management.md

Lines changed: 23 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,19 @@ To complete this guide, you will need the following prerequisites:
3939

4040
{{< include "licensing-and-reporting/download-certificates-from-myf5.md" >}}
4141

42+
## Prepare environment variables
43+
44+
For simplicity, set the following environment variables, which point towards your credential files:
45+
46+
```shell
47+
export JWT=<your-nginx-jwt-token>
48+
export NGINX_REGISTRY_TOKEN=<base64-encoded-docker-credentials>
49+
export NGINX_CERT=<base64-encoded-nginx-cert>
50+
export NGINX_KEY=<base64-encoded-nginx-key>
51+
```
52+
53+
They will be used in subsequent steps to download and apply necessary resources for the policy lifecycle management feature.
54+
4255
## Configure Docker for the F5 Container Registry
4356

4457
Create a directory and copy your certificate and key to this directory:
@@ -55,19 +68,6 @@ Log in to the Docker registry:
5568
docker login private-registry.nginx.com
5669
```
5770

58-
## Prepare environment variables
59-
60-
For simplicity, set the following environment variables, which point towards your credential files:
61-
62-
```shell
63-
export JWT=<your-nginx-jwt-token>
64-
export NGINX_REGISTRY_TOKEN=<base64-encoded-docker-credentials>
65-
export NGINX_CERT=<base64-encoded-nginx-cert>
66-
export NGINX_KEY=<base64-encoded-nginx-key>
67-
```
68-
69-
They will be used in subsequent steps to download and apply necessary resources for the policy lifecycle management feature.
70-
7171
## Create a directory and volume for policy bundles
7272

7373
Create the directory and persistent volume for policy bundles:
@@ -215,17 +215,18 @@ appprotect:
215215
216216
## Configure Docker
217217
218-
Create the Docker registry secret or configure in values.yaml:
219-
```shell
220-
kubectl create secret docker-registry regcred -n <namespace> \
221-
--docker-server=private-registry.nginx.com \
222-
--docker-username=<JWT-Token> \
223-
--docker-password=none
224-
```
218+
Create a Docker registry secret or add the details to _values.yaml_:
219+
220+
```shell
221+
kubectl create secret docker-registry regcred -n <namespace> \
222+
--docker-server=private-registry.nginx.com \
223+
--docker-username=$JWT \
224+
--docker-password=none
225+
```
225226

226227
## Deploy the Helm chart
227228

228-
Install the chart with Policy Controller enabled:
229+
Install the chart, adding the parameter to enable the Policy Controller:
229230

230231
```shell
231232
helm install <release-name> . \
@@ -241,6 +242,7 @@ helm install <release-name> . \
241242
## Verify the Policy Controller is running
242243

243244
Check that all components are deployed successfully:
245+
244246
```shell
245247
kubectl get pods -n <namespace>
246248
kubectl get crds | grep appprotect.f5.com

0 commit comments

Comments
 (0)