Skip to content

Commit d2ac7a3

Browse files
committed
fix: values.yaml
1 parent 8e3213a commit d2ac7a3

File tree

1 file changed

+75
-3
lines changed

1 file changed

+75
-3
lines changed

content/nap-waf/v5/admin-guide/policy-lifecycle-management.md

Lines changed: 75 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ The following is the complete Helm configuration required for Policy Lifecycle M
5252
namespace: <namespace>
5353

5454
appprotect:
55+
## Note: This option is useful if you use Nginx Ingress Controller for example.
5556
## Enable/Disable Nginx App Protect Deployment
5657
enable: true
5758

@@ -78,7 +79,9 @@ appprotect:
7879
repository: <your-private-registry>/nginx-app-protect-5
7980
## The tag of the Nginx image
8081
tag: latest
82+
## The pull policy for the Nginx image
8183
imagePullPolicy: IfNotPresent
84+
## The resources of the Nginx container.
8285
resources:
8386
requests:
8487
cpu: 10m
@@ -93,7 +96,9 @@ appprotect:
9396
repository: private-registry.nginx.com/nap/waf-config-mgr
9497
## The tag of the WAF Config Mgr image
9598
tag: 5.9.0
99+
## The pull policy for the WAF Config Mgr image
96100
imagePullPolicy: IfNotPresent
101+
## The resources of the Waf Config Manager container
97102
resources:
98103
requests:
99104
cpu: 10m
@@ -108,9 +113,12 @@ appprotect:
108113
repository: private-registry.nginx.com/nap/waf-enforcer
109114
## The tag of the WAF Enforcer image
110115
tag: 5.9.0
116+
## The pull policy for the WAF Enforcer image
111117
imagePullPolicy: IfNotPresent
118+
## The environment variable for enforcer port to be set on the WAF Enforcer container
112119
env:
113120
enforcerPort: "50000"
121+
## The resources of the WAF Enforcer container
114122
resources:
115123
requests:
116124
cpu: 20m
@@ -126,7 +134,9 @@ appprotect:
126134
repository: private-registry.nginx.com/nap/waf-ip-intelligence
127135
## The tag of the WAF IP Intelligence
128136
tag: 5.9.0
137+
## The pull policy for the WAF IP Intelligence
129138
imagePullPolicy: IfNotPresent
139+
## The resources of the WAF IP Intelligence container
130140
resources:
131141
requests:
132142
cpu: 10m
@@ -136,17 +146,26 @@ appprotect:
136146
# memory: 1Gi
137147

138148
policyController:
139-
enable: true # Set to false to disable Policy Controller
149+
## Enable/Disable Policy Controller Deployment
150+
enable: true
151+
## Number of replicas for the Policy Controller
140152
replicas: 1
153+
## The image repository of the WAF Policy Controller
141154
image:
142155
repository: private-registry.nginx.com/nap/waf-policy-controller
156+
## The tag of the WAF Policy COntroller
143157
tag: 5.9.0
158+
## The pull policy for the WAF Policy Controller
144159
imagePullPolicy: IfNotPresent
145160
wafCompiler:
161+
## The image repository of the WAF Compiler
146162
image:
147163
repository: private-registry.nginx.com/nap/waf-compiler
164+
## The tag of the WAF Compiler image
148165
tag: 5.9.0
166+
## Save logs before deleting a job or not
149167
enableJobLogSaving: false
168+
## The resources of the WAF Policy Controller
150169
resources:
151170
requests:
152171
cpu: 100m
@@ -168,20 +187,33 @@ appprotect:
168187
mountPath: /etc/app_protect/bundles
169188
pv:
170189
## PV name that pvc will request
190+
## if empty will be used <release-name>-shared-bundles-pv
171191
name: nginx-app-protect-shared-bundles-pv
172192
pvc:
173-
## The storage class to be used for the PersistentVolumeClaim
193+
## The storage class to be used for the PersistentVolumeClaim. 'manual' indicates a manually managed storage class
174194
bundlesPvc:
175195
storageClass: manual
176196
## The amount of storage requested for the PersistentVolumeClaim
177197
storageRequest: 2Gi
178198

199+
# Not needed as values will be set during helm install
200+
# nginxRepo:
201+
# ## Used for Policy Controller to pull the security updates from the NGINX repository.
202+
# ## The base64-encoded TLS certificate for the NGINX repository.
203+
# nginxCrt: ""
204+
# ## The base64-encoded TLS key for the NGINX repository.
205+
# nginxKey: ""
206+
179207
config:
180208
## The name of the ConfigMap used by the Nginx container
181209
name: nginx-config
182210
## The annotations of the configmap
183211
annotations: {}
184212

213+
# Not needed as value will be set during helm install
214+
# ## The JWT token license.txt of the ConfigMap for customizing NGINX configuration.
215+
# nginxJWT: ""
216+
185217
## The nginx.conf of the ConfigMap for customizing NGINX configuration
186218
nginxConf: |-
187219
user nginx;
@@ -196,6 +228,25 @@ appprotect:
196228
worker_connections 1024;
197229
}
198230
231+
# Uncomment if using mtls
232+
# mTLS configuration
233+
# stream {
234+
# upstream enforcer {
235+
# # Replace with the actual App Protect Enforcer address and port if different
236+
# server 127.0.0.1:4431;
237+
# }
238+
# server {
239+
# listen 5000;
240+
# proxy_pass enforcer;
241+
# proxy_ssl_server_name on;
242+
# proxy_timeout 30d;
243+
# proxy_ssl on;
244+
# proxy_ssl_certificate /etc/ssl/certs/app_protect_client.crt;
245+
# proxy_ssl_certificate_key /etc/ssl/certs/app_protect_client.key;
246+
# proxy_ssl_trusted_certificate /etc/ssl/certs/app_protect_server_ca.crt;
247+
# }
248+
# }
249+
199250
http {
200251
include /etc/nginx/mime.types;
201252
default_type application/octet-stream;
@@ -209,9 +260,11 @@ appprotect:
209260
keepalive_timeout 65;
210261
211262
# Enable Policy Lifecycle Management
263+
# WAF default config source. For policies from CRDs, use "custom-resource"
264+
# Remove this line to use default bundled policies
212265
app_protect_default_config_source "custom-resource";
213266
214-
# WAF enforcer address
267+
# WAF enforcer address. For mTLS, use port 5000
215268
app_protect_enforcer_address 127.0.0.1:50000;
216269
217270
server {
@@ -239,6 +292,7 @@ appprotect:
239292
return 200 "Hello! I got your URI request - $request_uri\n";
240293
}
241294
}
295+
# include /etc/nginx/conf.d/*.conf;
242296
}
243297
244298
## The default.conf of the ConfigMap for customizing NGINX configuration
@@ -288,6 +342,13 @@ appprotect:
288342
targetPort: 80
289343
## The type of service to create. NodePort will expose the service on each Node's IP at a static port.
290344
type: NodePort
345+
346+
# Not needed as value will be set during helm install
347+
# ## This is a base64-encoded string representing the contents of the Docker configuration file (config.json).
348+
# ## This file is used by Docker to manage authentication credentials for accessing private Docker registries.
349+
# ## By encoding the configuration file in base64, sensitive information such as usernames, passwords, and access tokens are protected from being exposed directly in plain text.
350+
# ## You can create this base64-encoded string yourself by encoding your config.json file, or you can create the Kubernetes secret containing these credentials before deployment and not use this value directly in the values.yaml file.
351+
# dockerConfigJson: ""
291352
```
292353

293354
#### Enable/Disable the Policy Controller
@@ -349,6 +410,10 @@ When Policy Controller is enabled in Helm, the NGINX configuration in your value
349410
helm pull oci://private-registry.nginx.com/nap/nginx-app-protect --version <release-version> --untar
350411
cd nginx-app-protect
351412
```
413+
414+
{{< call-out "important" >}}
415+
**Important**: The extracted Helm chart includes a default `values.yaml` file. Ignore this file and use your custom values.yaml created from the Configuration section above.
416+
{{< /call-out >}}
352417

353418
3. **Create Storage**
354419

@@ -412,6 +477,7 @@ When Policy Controller is enabled in Helm, the NGINX configuration in your value
412477
```bash
413478
helm install <release-name> . \
414479
--namespace <namespace> \
480+
--values /path/to/your/values.yaml \
415481
--set appprotect.policyController.enable=true \
416482
--set dockerConfigJson=$NGINX_REGISTRY_TOKEN \
417483
--set appprotect.config.nginxJWT=$JWT \
@@ -423,6 +489,7 @@ When Policy Controller is enabled in Helm, the NGINX configuration in your value
423489
```bash
424490
helm upgrade <release-name> . \
425491
--namespace <namespace> \
492+
--values /path/to/your/values.yaml \
426493
--set appprotect.policyController.enable=true \
427494
--set dockerConfigJson=$NGINX_REGISTRY_TOKEN \
428495
--set appprotect.config.nginxJWT=$JWT \
@@ -950,6 +1017,10 @@ To verify that the policy bundles are being deployed and enforced correctly:
9501017
helm pull oci://private-registry.nginx.com/nap/nginx-app-protect --version <new-release-version> --untar
9511018
cd nginx-app-protect
9521019
```
1020+
1021+
{{< call-out "important" >}}
1022+
**Important**: The extracted Helm chart includes a default `values.yaml` file. Ignore this file and use your custom values.yaml created from the Configuration section above.
1023+
{{< /call-out >}}
9531024

9541025
3. **Apply Custom Resource Definitions**
9551026

@@ -1020,6 +1091,7 @@ To verify that the policy bundles are being deployed and enforced correctly:
10201091
```bash
10211092
helm upgrade <release-name> . \
10221093
--namespace <namespace> \
1094+
--values /path/to/your/values.yaml \
10231095
--set appprotect.policyController.enable=true \
10241096
--set dockerConfigJson=$NGINX_REGISTRY_TOKEN \
10251097
--set appprotect.config.nginxJWT=$JWT \

0 commit comments

Comments
 (0)