You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can configure a variety of NGINX alerts in the F5 Distributed Cloud. If you have access to the [F5 Distributed Cloud]({{< ref "/nginx-one/getting-started.md#confirm-access-to-the-f5-distributed-cloud" >}}), log in and select the **Audit Logs & Alerts** tile.
9
+
10
+
Go to **Notifications > Alerts**. Select the gear icon and select **Alert Name > Active Alerts**. You may see one or more of the following alerts in the **Audit Logs & Alerts** Console.
| HighCVENGINX | A high-severity CVE is impacting an NGINX instance | Critical | Review the CVE details in the NGINX One Console. Apply updates or change configurations to resolve the vulnerability. |
19
+
| MediumCVENGINX | A medium-severity CVE is impacting an NGINX instance | Major | Review the CVE details in the NGINX One Console. Apply updates or configuration changes as needed. |
20
+
| LowCVENGINX | A low-severity CVE is impacting an NGINX instance | Minor | Review the CVE details in the NGINX One Console. Consider updates or configuration changes to maintain security. |
21
+
| SecurityRecommendationNGINX | A security recommendation has been found for an NGINX configuration | Critical | Review the configuration issue in the NGINX One Console. Follow the recommendations to secure the instance or Config Sync Group. |
22
+
| OptimizationRecommendationNGINX| An optimization recommendation has been found for an NGINX configuration| Major | Review the optimization details in the NGINX One Console. Update the configuration to for the instance or Config Sync Group to enhance performance. |
23
+
| BestPracticeRecommendationNGINX| A best practice recommendation has been found for an NGINX configuration | Minor | Review the best practice recommendation in the NGINX One Console. Update the configuration for the instance or Config Sync Group to align with industry standards. |
24
+
| NGINXOffline | An NGINX instance is now offline | Major | Verify the host is online. Check the NGINX Agent's status on the instance and ensure it is connected to the NGINX One Console. |
25
+
| NGINXUnavailable | An NGINX instance is now unavailable | Major | Ensure the NGINX Agent and host are active. Verify the NGINX Agent can connect to the NGINX One Console and resolve any network issues. |
26
+
| NewNGINX | A new NGINX instance has connected to NGINX One | Minor | Review the instance details in the NGINX One Console. Confirm availability, CVEs, and recommendations to ensure the instance is operational. |
Copy file name to clipboardExpand all lines: content/nginx-one/glossary.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,10 @@ This glossary defines terms used in the F5 NGINX One Console and F5 Distributed
28
28
29
29
{{< include "nap-waf/config/common/nginx-app-protect-waf-terminology.md" >}}
30
30
31
+
## NGINX Alerts
32
+
33
+
{{< include "/nginx-one/alert-labels.md" >}}
34
+
31
35
## Legal notice: Licensing agreements for NGINX products
32
36
33
37
Using NGINX One is subject to our End User Service Agreement (EUSA). For [NGINX Plus]({{< ref "/nginx" >}}), usage is governed by the End User License Agreement (EULA). Open source projects, including [NGINX Agent](https://github.com/nginx/agent) and [NGINX Open Source](https://github.com/nginx/nginx), are covered under their respective licenses. For more details on these licenses, follow the provided links.
The `dataplaneKeySecretName` is used to authenticate the agent with NGINX One Console. See the [NGINX One Console Docs]({{< ref "/nginx-one/connect-instances/create-manage-data-plane-keys.md">}})
49
63
for instructions on how to generate your dataplane key from the NGINX One Console.
Copy file name to clipboardExpand all lines: content/nginxaas-azure/getting-started/nginx-configuration/overview.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,9 @@ Some directives cannot be overridden by the user provided configuration.
74
74
75
75
## NGINX listen port restrictions
76
76
77
-
- Due to port restrictions on Azure Load Balancer health probes, ports `19`, `21`, `70`, and `119` are not allowed. The NGINXaaS deployment can listen on all other ports.
77
+
- Due to port restrictions on Azure Load Balancer health probes, certain ports are not allowed for the `listen` directive in NGINX configuration. The following ports are blocked:
78
+
-`19`, `21`, `70`, `119` - Azure health probe restricted ports
79
+
-`49151`, `49153`, `5140`, `50000`, `54141`, `54779` - reserved ports to support other NGINXaaS features
78
80
79
81
- The [Basic]({{< ref "/nginxaas-azure/billing/overview.md#basic-plan" >}}) plan (and the deprecated Standard (v1) plan) supports a maximum of 5 listen ports in the NGINX configuration. Configurations that specify over 5 unique ports are rejected.
Copy file name to clipboardExpand all lines: content/nic/installation/installing-nic/installation-with-helm.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -472,19 +472,23 @@ The following tables lists the configurable parameters of the NGINX Ingress Cont
472
472
|**serviceNameOverride**| Used to prevent cloud load balancers from being replaced due to service name change during helm upgrades. |""|
473
473
|**nginxServiceMesh.enable**| Enable integration with NGINX Service Mesh. See the NGINX Service Mesh docs for more details. Requires `controller.nginxplus`. |false|
474
474
|**nginxServiceMesh.enableEgress**| Enable NGINX Service Mesh workloads to route egress traffic through the Ingress Controller. See the NGINX Service Mesh docs for more details. Requires `nginxServiceMesh.enable`. |false|
475
-
|**nginxAgent.enable**| Enable NGINX Agent to integrate the Security Monitoring and App Protect WAF modules. Requires `controller.appprotect.enable`. |false|
476
-
|**nginxAgent.instanceGroup**| Set a custom Instance Group name for the deployment, shown when connected to NGINX Instance Manager. `nginx-ingress.controller.fullname` will be used if not set. |""|
477
-
|**nginxAgent.logLevel**| Log level for NGINX Agent. |"error |
478
-
|**nginxAgent.instanceManager.host** | FQDN or IP for connecting to NGINX Ingress Controller. Required when `nginxAgent.enable` is set to `true` | "" |
479
-
|**nginxAgent.instanceManager.grpcPort** | Port for connecting to NGINX Ingress Controller. | 443 |
480
-
|**nginxAgent.instanceManager.sni** | Server Name Indication for Instance Manager. See the NGINX Agent [docs]({{< ref "/agent/configuration/encrypt-communication.md" >}}) for more details. | "" |
|**nginxAgent.instanceManager.tls.caSecret** | Name of `nginx.org/ca` secret used for verification of Instance Manager TLS. | "" |
484
-
|**nginxAgent.instanceManager.tls.secret** | Name of `kubernetes.io/tls` secret with a TLS certificate and key for using mTLS between NGINX Agent and Instance Manager. See the NGINX Instance Manager [docs]({{< ref "/nim/system-configuration/secure-traffic.md#mutual-client-certificate-authentication-setup-mtls" >}}) and the NGINX Agent [docs]({{< ref "/agent/configuration/encrypt-communication.md" >}}) for more details. | "" |
485
-
|**nginxAgent.syslog.host** | Address for NGINX Agent to run syslog listener. | 127.0.0.1 |
486
-
|**nginxAgent.syslog.port** | Port for NGINX Agent to run syslog listener. | 1514 |
487
-
|**nginxAgent.napMonitoring.collectorBufferSize** | Buffer size for collector. Will contain log lines and parsed log lines. | 50000 |
488
-
|**nginxAgent.napMonitoring.processorBufferSize** | Buffer size for processor. Will contain log lines and parsed log lines. | 50000 |
489
-
|**nginxAgent.customConfigMap** | The name of a custom ConfigMap to use instead of the one provided by default. | "" |
475
+
|**nginxAgent.enable**| Enable NGINX Agent 3.x to allow [connecting to NGINX One Console]({{< ref "/nginx-one/k8s/add-nic.md">}}) or to integrate NGINX Agent 2.x for [Security Monitoring]({{< ref "/nic/tutorials/security-monitoring.md">}}) .|false|
476
+
|**nginxAgent.logLevel**| Log level for NGINX Agent. |"error"|
477
+
|**nginxAgent.dataplaneKeySecretName**| Name of the Kubernetes Secret containing the Data Plane key used to authenticate to NGINX One Console. Learn more [here]({{< ref "/nginx-one/k8s/add-nic.md">}}). Required when `nginxAgent.enable` is set to `true`. Requires NGINX Agent 3.x. |""|
478
+
|**nginxAgent.endpointHost**| Domain or IP address for the NGINX One Console. Requires NGINX Agent 3.x. |"agent.connect.nginx.com"|
479
+
|**nginxAgent.endpointPort**| Port for the NGINX One Console endpoint. Requires NGINX Agent 3.x. | 443 |
480
+
|**nginxAgent.tlsSkipVerify**| Skip TLS verification for the NGINX One Console endpoint. Requires NGINX Agent 3.x. |false|
481
+
|**nginxAgent.instanceGroup**| Set a custom Instance Group name for the deployment, shown when connected to NGINX Instance Manager. `nginx-ingress.controller.fullname` will be used if not set. Requires NGINX Agent 2.x. |""|
482
+
|**nginxAgent.instanceManager.host**| FQDN or IP for connecting to NGINX Ingress Controller. Required when `nginxAgent.enable` is set to `true`. Requires NGINX Agent 2.x. |""|
483
+
|**nginxAgent.instanceManager.grpcPort**| Port for connecting to NGINX Ingress Controller. Requires NGINX Agent 2.x. | 443 |
484
+
|**nginxAgent.instanceManager.sni**| Server Name Indication for Instance Manager. See the NGINX Agent [docs]({{< ref "/agent/configuration/encrypt-communication.md">}}) for more details. Requires NGINX Agent 2.x. |""|
|**nginxAgent.instanceManager.tls.caSecret**| Name of `nginx.org/ca` secret used for verification of Instance Manager TLS. Requires NGINX Agent 2.x. |""|
488
+
|**nginxAgent.instanceManager.tls.secret**| Name of `kubernetes.io/tls` secret with a TLS certificate and key for using mTLS between NGINX Agent and Instance Manager. See the NGINX Instance Manager [docs]({{< ref "/nim/system-configuration/secure-traffic.md#mutual-client-certificate-authentication-setup-mtls">}}) and the NGINX Agent [docs]({{< ref "/agent/configuration/encrypt-communication.md">}}) for more details. Requires NGINX Agent 2.x. |""|
489
+
|**nginxAgent.syslog.host**| Address for NGINX Agent to run syslog listener. Requires NGINX Agent 2.x. | 127.0.0.1 |
490
+
|**nginxAgent.syslog.port**| Port for NGINX Agent to run syslog listener. Requires NGINX Agent 2.x. | 1514 |
491
+
|**nginxAgent.napMonitoring.collectorBufferSize**| Buffer size for collector. Will contain log lines and parsed log lines. Requires NGINX Agent 2.x. | 50000 |
492
+
|**nginxAgent.napMonitoring.processorBufferSize**| Buffer size for processor. Will contain log lines and parsed log lines. Requires NGINX Agent 2.x. | 50000 |
493
+
|**nginxAgent.customConfigMap**| The name of a custom ConfigMap to use instead of the one provided by default. Requires NGINX Agent 2.x.|""|
Copy file name to clipboardExpand all lines: content/nic/releases.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,13 +10,15 @@ nd-docs: DOCS-616
10
10
11
11
08 Jul 2025
12
12
13
-
This release includes the ability to configure Rate Limiting for your APIs based on a specific NGINX variable and its value. This allows you more granular control over how frequently specific users access your resources.
13
+
This NGINX Ingress Controller release brings initial connectivity to the NGINX One Console! You can now use NGINX One Console to manage NGINX instances that are part of your NGINX Ingress Controller cluster. See [here]({{< ref "/nginx-one/k8s/add-nic.md" >}}) to configure NGINX One Console with NGINX Ingress Controller.
14
+
15
+
This release also includes the ability to configure Rate Limiting for your APIs based on a specific NGINX variable and its value. This allows you more granular control over how frequently specific users access your resources.
14
16
15
17
Lastly, in our previous v5.0.0 release, we removed support for Open Tracing. This release replaces that observability capability with native NGINX Open Telemetry traces, allowing you to monitor the internal traffic of your applications.
16
18
17
19
### <iclass="fa-solid fa-rocket"></i> Features
18
20
-[7642](https://github.com/nginx/kubernetes-ingress/pull/7642) Add OpenTelemetry support
19
-
-[7916](https://github.com/nginx/kubernetes-ingress/pull/7916) Add support for Agent V3
21
+
-[7916](https://github.com/nginx/kubernetes-ingress/pull/7916) Add support for NGINX Agent version 3 and Connecting to NGINX One Console
20
22
-[7884](https://github.com/nginx/kubernetes-ingress/pull/7884) Tiered rate limits with variables
21
23
-[7765](https://github.com/nginx/kubernetes-ingress/pull/7765) Add OIDC PKCE configuration through Policy
22
24
-[7832](https://github.com/nginx/kubernetes-ingress/pull/7832) Add request_method to rate-limit Policy
@@ -46,7 +48,7 @@ Lastly, in our previous v5.0.0 release, we removed support for Open Tracing. Thi
0 commit comments