You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/includes/nim/kubernetes/access-webui-helm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,4 +23,4 @@ You can access the NGINX Instance Manager web interface using the external IP ad
23
23
24
24
For example, `https://10.108.57.167/ui`.
25
25
26
-
This IP address might not be reachable, depending on how the Kubernetes cluster networking was configured. If so, the `apigw` service type can be changed to a more suitable option, such as `LoadBalancer`, by changing the [Configurable Helm Setting]({{< relref "/nim/deploy/kubernetes/helm-config-settings.md" >}}) value for `nms-hybrid.apigw.service.type`.
26
+
This IP address might not be reachable, depending on how the Kubernetes cluster networking was configured. If so, the `apigw` service type can be changed to a more suitable option, such as `LoadBalancer`, by changing the [Configurable Helm Setting]({{< relref "/nim/deploy/kubernetes/helm-config-settings.md" >}}) value for `apigw.service.type`.
Copy file name to clipboardExpand all lines: content/nginx/deployment-guides/amazon-web-services/high-availability-network-load-balancer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -248,7 +248,7 @@ The deployed solution in these instructions uses six EC2 instances. Two instance
248
248
249
249
*Step‑by‑step* instructions for creating EC2 instances and installing NGINX Open Source and NGINX Plus are available. Refer to our deployment guide, [Creating Amazon EC2 Instances for NGINX Open Source and NGINX Plus]({{< ref "/nginx/deployment-guides/amazon-web-services/ec2-instances-for-nginx.md" >}}).
250
250
251
-
{{< note >}} When installing NGINX Open Source or NGINX Plus, you connect to each instance over SSH. To save time, leave the SSH connection to each instance open after installing the software. This way, you can reuse the connection when configuring the instance. {{< note >}}
251
+
{{< note >}} When installing NGINX Open Source or NGINX Plus, you connect to each instance over SSH. To save time, leave the SSH connection to each instance open after installing the software. This way, you can reuse the connection when configuring the instance. {{< /note >}}
252
252
253
253
Assign the following names to the instances, then install the indicated NGINX software. The screenshot below shows the resulting **Instances** table.
254
254
@@ -303,7 +303,7 @@ You can automate set up of the six instances described in these instructions. Au
303
303
304
304
These scripts also create a new set of networking rules and security group settings. These rules and settings help avoid conflicts with any pre‑existing network settings. After you run the scripts, continue to the [instructions for creating an AWS NLB](#nlb-configure). No further setup is required.
305
305
306
-
{{< note >}} These scripts also create a new VPC. They do not use the default VPC described in the [instructions in our Deployment Guide]({{< ref "/nginx/deployment-guides/amazon-web-services/ec2-instances-for-nginx.md >}}). {{< /note >}}
306
+
{{< note >}} These scripts also create a new VPC. They do not use the default VPC described in the [instructions in our Deployment Guide]({{< ref "/nginx/deployment-guides/amazon-web-services/ec2-instances-for-nginx.md" >}}). {{< /note >}}
@@ -55,20 +55,30 @@ Create a Docker registry secret on the cluster, using the JWT token as the usern
55
55
56
56
-**Kubernetes**:
57
57
58
+
```shell
59
+
kubectl create namespace nms
60
+
```
61
+
58
62
```shell
59
63
kubectl create secret docker-registry regcred \
60
64
--docker-server=private-registry.nginx.com \
61
65
--docker-username=<JWT Token> \
62
-
--docker-password=none
66
+
--docker-password=none \
67
+
-n nms
63
68
```
64
69
65
70
-**OpenShift**:
66
71
72
+
```shell
73
+
oc new-project nms
74
+
```
75
+
67
76
```shell
68
77
oc create secret docker-registry regcred \
69
78
--docker-server=private-registry.nginx.com \
70
79
--docker-username=<JWT Token> \
71
-
--docker-password=none
80
+
--docker-password=none \
81
+
-n nms
72
82
```
73
83
74
84
{{< warning >}}
@@ -84,13 +94,13 @@ To confirm the secret is created:
84
94
-**Kubernetes**:
85
95
86
96
```shell
87
-
kubectl get secret regcred --output=yaml
97
+
kubectl get secret regcred --output=yaml -n nms
88
98
```
89
99
90
100
-**OpenShift**:
91
101
92
102
```shell
93
-
oc get secret regcred --output=yaml
103
+
oc get secret regcred --output=yaml -n nms
94
104
```
95
105
96
106
@@ -127,37 +137,36 @@ The `values.yaml` file customizes the Helm chart installation without modifying
127
137
{{< see-also >}} For details on creating a secret, see Kubernetes [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/). {{</ see-also >}}
@@ -169,65 +178,24 @@ The `values.yaml` file customizes the Helm chart installation without modifying
169
178
If deploying on OpenShift, include this setting in the `values.yaml` file:
170
179
171
180
```yaml
172
-
nms-hybrid:
173
-
openshift:
174
-
enabled: true
181
+
openshift:
182
+
enabled: true
175
183
```
176
184
177
185
### How OpenShift handles security constraints
178
186
179
187
When `openshift.enabled: true` is set in the `values.yaml` file, the NGINX Instance Manager deployment automatically creates a **custom Security Context Constraint (SCC)** and links it to the Service Account used by all pods.
180
188
181
-
By default, OpenShift enforces strict security policies that require containers to run as **non-root** users. The NGINX Instance Manager deployment needs specific user IDs (UIDs) for certain services, such as **1000** for `nms` and **101** for `nginx` and `clickhouse`. Since the default SCCs do not allow these UIDs, a **custom SCC** is created. This ensures that the deployment can run with the necessary permissions while maintaining OpenShift’s security standards.
189
+
By default, OpenShift enforces strict security policies that require containers to run as **non-root** users. The NGINX Instance Manager deployment needs specific user IDs (UIDs) for certain services, such as **1000** for `nms` and **101** for `nginx` and `clickhouse`. Since the default SCCs do not allow these UIDs, a **custom SCC** is created. This ensures that the deployment can run with the necessary permissions while maintaining OpenShift’s security standards. The custom SCC allows these UIDs by setting the `runAsUser` field, which controls which users can run containers.
190
+
191
+
{{< note >}} If you’re encountering errors with the custom [Security Context Constraints](https://docs.openshift.com/container-platform/4.15/authentication/managing-security-context-constraints.html), it may be due to insufficient permissions to access the Security Context Constraints resource. Please contact a Cluster Administrator to request access, either via a ClusterRoleBinding or by adjusting your user role. {{< /note >}}
182
192
183
-
The custom SCC allows these UIDs by setting the `runAsUser` field, which controls which users can run containers. To verify that the SCC has been created, run:
193
+
To verify that the custom SCC has been created, run only after installing the helm chart:
184
194
185
195
```shell
186
196
oc get scc nms-restricted-v2-scc --output=yaml
187
197
```
188
198
189
-
190
-
---
191
-
192
-
193
-
To apply network policies for NGINX Instance Manager, ensure Kubernetes has a [network plugin](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/) installed before the Helm chart installation.
194
-
195
-
By default, the following network policies will be created in the release namespace:
To disable network policies, update the `values.yaml` file:
224
-
225
-
```yaml
226
-
networkPolicies:
227
-
# Set this to true to enable network policies for NGINX Instance Manager.
228
-
enabled: false
229
-
```
230
-
231
199
---
232
200
233
201
## Install the chart
@@ -239,19 +207,19 @@ Run the `helm install` command to deploy NGINX Instance Manager:
239
207
240
208
{{< important >}} Remember to save the password for future use. Only the encrypted password is stored, and there's no way to recover or reset it if lost. {{< /important >}}
241
209
242
-
(Optional) Replace `<nms-chart-version>` with the desired chart version. If omitted, the latest version will be installed.
210
+
(Optional) Replace `<chart-version>` with the desired chart version. If omitted, the latest version will be installed. At present, only version 2.19.0 is supported.
To help you choose the right NGINX Instance Manager chart version, see the table in:
222
+
To help you choose the right NGINX Instance Manager chart version, refer to the table (applicable for NIM versions up to v2.18.0) in:
255
223
256
224
{{< include "nim/kubernetes/nms-chart-supported-module-versions.md" >}}
257
225
@@ -289,14 +257,16 @@ To upgrade:
289
257
290
258
1. [Update the Helm repository list](#add-helm-repository).
291
259
1. [Adjust your `values.yaml` file](#create-a-helm-deployment-values.yaml-file) if needed.
292
-
1. To upgrade the NGINX instance deployment, run the following command. This command updates the `nms` deployment with a new version from the `nginx-stable/nms` repository. It also hashes the provided password and uses the `values.yaml` file at the path you specify.
260
+
1. To upgrade the NGINX Instance Manager deployment, run the following command. This command updates the `nms` deployment with a new version from the `nginx-stable/nms-hybrid` repository. It also hashes the provided password and uses the `values.yaml` file at the path you specify.
261
+
262
+
(Optional) Replace `<chart-version>` with the desired chart version. If omitted, the latest version will be installed. At present, only version 2.19.0 is supported.
0 commit comments