Skip to content

Commit 48d9fbb

Browse files
authored
Add docs for NAP DoS images (#3050)
Add docs for NAP DoS images (#3023) (cherry picked from commit 2832b38)
1 parent 60ea97e commit 48d9fbb

File tree

5 files changed

+51
-35
lines changed

5 files changed

+51
-35
lines changed

docs/content/app-protect-dos/installation.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,9 @@ Take the steps below to create the Docker image that you'll use to deploy NGINX
4848
```bash
4949
make debian-image-dos-plus PREFIX=<your Docker registry domain>/nginx-plus-ingress
5050
```
51+
Alternatively, if you want to run on an [OpenShift](https://www.openshift.com/) cluster, use the `ubi-image-dos-plus` target.
52+
53+
If you want to include the App Protect WAF module in the image, you can use the `debian-image-nap-dos-plus` target or the `ubi-image-nap-dos-plus` target for OpenShift.
5154
5255
- [Push the image to your local Docker registry](/nginx-ingress-controller/installation/building-ingress-controller-image/#building-the-image-and-pushing-it-to-the-private-registry).
5356

docs/content/app-protect/installation.md

Lines changed: 13 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -13,33 +13,17 @@ This document provides an overview of the steps required to use NGINX App Protec
1313

1414
You can also [install the Ingress Controller with App Protect by using Helm](/nginx-ingress-controller/installation/installation-with-helm/). Use the `controller.appprotect.*` parameters of the chart.
1515

16-
## Using the Docker Images from the F5 Container registry
16+
## Prerequisites
1717

18-
Take the steps below to either configure a Docker Registry secret in your Kubernetes cluster, or to pull the Docker image that you'll use to deploy NGINX Ingress Controller with App Protect in Kubernetes.
19-
20-
- Follow the steps to [use the JWT token to create a docker registry secret](/nginx-ingress-controller/installation/using-the-jwt-token-docker-secret).
21-
22-
- Alternatively, follow the steps to [Pull the NGINX Ingress Controller image](/nginx-ingress-controller/installation/pulling-ingress-controller-image).
23-
24-
For NGINX Plus Ingress Controller with App Protect, pull from `private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress`:
25-
```
26-
$ docker pull private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress:2.3.0
27-
```
28-
`2.3.0` will pull down the Debian based image. The other available image tag is `2.3.0-ubi` for the UBI based image.
29-
30-
- Use the docker registry API to list the available image tags for the repository.
31-
32-
To list the available image tags for the repository, you can use the Docker registry API, e.g.:
33-
```
34-
$ curl https://private-registry.nginx.com/v2/nginx-ic-nap/nginx-plus-ingress/tags/list --key <path-to-client.key> --cert <path-to-client.cert> | jq
35-
{
36-
"name": "nginx-ic-nap/nginx-plus-ingress",
37-
"tags": [
38-
"2.3.0-ubi",
39-
"2.3.0"
40-
]
41-
}
42-
```
18+
1. Make sure you have access to the Ingress Controller image:
19+
* For NGINX Plus Ingress Controller, see [here](/nginx-ingress-controller/installation/pulling-ingress-controller-image) for details on how to pull the image from the F5 Docker registry.
20+
* To pull from the F5 Container registry in your Kubernetes cluster, configure a docker registry secret using your JWT token from the MyF5 portal by following the instructions from [here](/nginx-ingress-controller/installation/using-the-jwt-token-docker-secret).
21+
* It is also possible to build your own image and push it to your private Docker registry by following the instructions from [here](/nginx-ingress-controller/installation/building-ingress-controller-image).
22+
2. Clone the Ingress Controller repo:
23+
```
24+
$ git clone https://github.com/nginxinc/kubernetes-ingress.git --branch v2.3.0
25+
$ cd kubernetes-ingress
26+
```
4327
4428
## Build the Docker Image
4529
@@ -54,7 +38,9 @@ Take the steps below to create the Docker image that you'll use to deploy NGINX
5438
```
5539
Alternatively, if you want to run on an [OpenShift](https://www.openshift.com/) cluster, you can use the `ubi-image-nap-plus` target.
5640
57-
If you intend to use [external references](https://docs.nginx.com/nginx-app-protect/configuration/#external-references) in NGINX App Protect policies, you may want to provide a custom CA certificate to authenticate with the hosting server.
41+
If you want to include the App Protect DoS module in the image, you can use the `debian-image-nap-dos-plus` target or the `ubi-image-nap-dos-plus` target for OpenShift.
42+
43+
If you intend to use [external references](https://docs.nginx.com/nginx-app-protect/configuration/#external-references) in NGINX App Protect WAF policies, you may want to provide a custom CA certificate to authenticate with the hosting server.
5844
In order to do so, place the `*.crt` file in the build folder and uncomment the lines that follow this comment:
5945
`#Uncomment the lines below if you want to install a custom CA certificate`
6046

docs/content/installation/pulling-ingress-controller-image.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,19 +38,23 @@ Before you can pull the image, make sure that the following software is installe
3838
$ docker pull private-registry.nginx.com/nginx-ic/nginx-plus-ingress:2.3.0
3939
```
4040

41-
For NGINX Plus Ingress Controller with App Protect, pull from `private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress`. For example:
41+
For NGINX Plus Ingress Controller with App Protect WAF, pull from `private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress`. For example:
4242
```
4343
$ docker pull private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress:2.3.0
4444
```
4545

46+
For NGINX Plus Ingress Controller with App Protect DoS, pull from `private-registry.nginx.com/nginx-ic-dos/nginx-plus-ingress`. For example:
47+
```
48+
$ docker pull private-registry.nginx.com/nginx-ic-dos/nginx-plus-ingress:2.3.0
49+
```
50+
4651
To list the available image tags for the repositories, you can also use the Docker registry API. For example:
4752
```
4853
$ curl https://private-registry.nginx.com/v2/nginx-ic/nginx-plus-ingress/tags/list --key <path-to-client.key> --cert <path-to-client.cert> | jq
4954
{
5055
"name": "nginx-ic/nginx-plus-ingress",
5156
"tags": [
5257
"2.3.0-alpine",
53-
"2.3.0-ot",
5458
"2.3.0-ubi",
5559
"2.3.0"
5660
]
@@ -64,6 +68,15 @@ Before you can pull the image, make sure that the following software is installe
6468
"2.3.0"
6569
]
6670
}
71+
72+
$ curl https://private-registry.nginx.com/v2/nginx-ic-dos/nginx-plus-ingress/tags/list --key <path-to-client.key> --cert <path-to-client.cert> | jq
73+
{
74+
"name": "nginx-ic-dos/nginx-plus-ingress",
75+
"tags": [
76+
"2.3.0-ubi",
77+
"2.3.0"
78+
]
79+
}
6780
```
6881

6982
3. Tag and push the image to your private registry.
@@ -76,8 +89,14 @@ Before you can pull the image, make sure that the following software is installe
7689
$ docker push <my-docker-registry>/nginx-ic/nginx-plus-ingress:2.3.0
7790
```
7891

79-
or for NGINX App Protect enabled image
92+
or for NGINX App Protect WAF enabled image
8093
```
8194
$ docker tag private-registry.nginx.com/nginx-ic-nap/nginx-plus-ingress:2.3.0 <my-docker-registry>/nginx-ic-nap/nginx-plus-ingress:2.3.0
8295
$ docker push <my-docker-registry>/nginx-ic-nap/nginx-plus-ingress:2.3.0
8396
```
97+
98+
or for NGINX App Protect DoS enabled image
99+
```
100+
$ docker tag private-registry.nginx.com/nginx-ic-dos/nginx-plus-ingress:2.3.0 <my-docker-registry>/nginx-ic-dos/nginx-plus-ingress:2.3.0
101+
$ docker push <my-docker-registry>/nginx-ic-dos/nginx-plus-ingress:2.3.0
102+
```

docs/content/installation/using-the-jwt-token-docker-secret.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,6 @@ This document explains how to use the NGINX Plus Ingress Controller image from t
4343
"name": "nginx-ic/nginx-plus-ingress",
4444
"tags": [
4545
"2.3.0-alpine",
46-
"2.3.0-ot",
4746
"2.3.0-ubi",
4847
"2.3.0"
4948
]
@@ -57,4 +56,13 @@ This document explains how to use the NGINX Plus Ingress Controller image from t
5756
"2.3.0"
5857
]
5958
}
59+
60+
$ curl https://private-registry.nginx.com/v2/nginx-ic-dos/nginx-plus-ingress/tags/list --key <path-to-client.key> --cert <path-to-client.cert> | jq
61+
{
62+
"name": "nginx-ic-dos/nginx-plus-ingress",
63+
"tags": [
64+
"2.3.0-ubi",
65+
"2.3.0"
66+
]
67+
}
6068
```

docs/content/technical-specifications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ NGINX Plus images are available through the F5 Container registry `private-regis
6262
|Alpine-based image | ``alpine:3.16`` | NGINX Plus JavaScript and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | `nginx-ic/nginx-plus-ingress:2.3.0-alpine` | arm64, amd64 |
6363
|Debian-based image | ``debian:bullseye-slim`` | NGINX Plus JavaScript and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | `nginx-ic/nginx-plus-ingress:2.3.0` | arm64, amd64 |
6464
|Debian-based image with App Protect WAF | ``debian:buster-slim`` | NGINX Plus App Protect WAF, JavaScript and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | `nginx-ic-nap/nginx-plus-ingress:2.3.0` | amd64 |
65-
|Debian-based image with App Protect DoS | ``debian:bullseye-slim`` | NGINX Plus App Protect DoS, JavaScript module and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | | amd64 |
66-
|Debian-based image with App Protect WAF and DoS | ``debian:buster-slim`` | NGINX Plus App Protect WAF, DoS, JavaScript and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | | amd64 |
65+
|Debian-based image with App Protect DoS | ``debian:bullseye-slim`` | NGINX Plus App Protect DoS, JavaScript module and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | `nginx-ic-dos/nginx-plus-ingress:2.3.0` | amd64 |
66+
|Debian-based image with App Protect WAF and DoS | ``debian:buster-slim`` | NGINX Plus App Protect WAF, DoS, JavaScript and OpenTracing modules, OpenTracing tracers for Jaeger, Zipkin and Datadog | `nginx-ic-nap-dos/nginx-plus-ingress:2.3.0` | amd64 |
6767
|Ubi-based image | ``redhat/ubi8`` | NGINX Plus JavaScript module | `nginx-ic/nginx-plus-ingress:2.3.0-ubi` | arm64, amd64, s390x |
6868
|Ubi-based image with App Protect WAF | ``redhat/ubi8`` | NGINX Plus App Protect WAF and JavaScript modules | `nginx-ic-nap/nginx-plus-ingress:2.3.0-ubi` | amd64 |
69-
|Ubi-based image with App Protect DoS | ``redhat/ubi8`` | NGINX Plus App Protect DoS and JavaScript modules | | amd64 |
70-
|Ubi-based image with App Protect WAF and DoS | ``redhat/ubi8`` | NGINX Plus App Protect WAF, DoS and JavaScript modules | | amd64 |
69+
|Ubi-based image with App Protect DoS | ``redhat/ubi8`` | NGINX Plus App Protect DoS and JavaScript modules | `nginx-ic-dos/nginx-plus-ingress:2.3.0-ubi` | amd64 |
70+
|Ubi-based image with App Protect WAF and DoS | ``redhat/ubi8`` | NGINX Plus App Protect WAF, DoS and JavaScript modules | `nginx-ic-nap-dos/nginx-plus-ingress:2.3.0-ubi` | amd64 |
7171
{{% /table %}}
7272

7373
We also provide NGINX Plus images through the AWS Marketplace. Please see [Using the AWS Marketplace Ingress Controller Image](/nginx-ingress-controller/installation/using-aws-marketplace-image/) for details on how to set up the required IAM resources in your EKS cluster.

0 commit comments

Comments
 (0)