Skip to content

Commit 1fc2ede

Browse files
committed
Rewrite per known working process
1 parent 50a7fc0 commit 1fc2ede

File tree

1 file changed

+30
-13
lines changed

1 file changed

+30
-13
lines changed

content/nginx-one/secure-your-fleet/secure.md

Lines changed: 30 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -94,38 +94,55 @@ To configure security-related alerts, follow these steps:
9494

9595
## Configure Alert Policy
9696

97-
Next, configure the policy that identifies when you'll get an alert.
97+
Next, configure the policy that identifies when you'll get an alert. You'll need to reference available alerts in our [NGINX One Console Glossary]({{< ref "/nginx-one/glossary.md#nginx-alerts/" >}}). Relevant security alerts include:
98+
99+
- SecurityRecommendationNGINX
100+
- HighCVENGINX
101+
- MediumCVENGINX
102+
- LowCVENGINX
98103

99104
1. Go to **Alerts Management > Alert Policies**.
100105
1. Select **Add Alert Policy**.
101-
1. Enter the name of your choice.
106+
1. Enter the name of your choice. You're limited to lower-case characters, numbers, and dashes.
102107
1. (Optional) Specify a label and description.
103108
1. Under **Alert Reciever Configuration > Alert Receivers,** select the **Alert Receiver** you just created.
104109
1. Under **Policy Rules** select **Configure**.
105-
1. Select **Add Item**.
106-
1. Under **Select Alerts** select a filter. If you're interested in all NGINX alerts, select **Matching RegEx of Alertname**. In the text box that appears, enter **NGINX**.
110+
1. In the **Policy Rules** screen that appears, select **Add Item**.
111+
1. In the **Route** window that appears, review the **Select Alerts** drop-down.
112+
1. Under **Select Alerts** select a filter. Now select **Matching Custom Criteria > Alertname > Configure**. In the screen that appears, use **Exact Match** and copy/paste an alert name from the [NGINX One Console Glossary]({{< ref "/nginx-one/glossary.md#nginx-alerts" >}}).
113+
1. Select **Apply** to exit the **Alertname** window.
114+
1. Select **Apply** to exit the **Route** window.
115+
1. Select **Apply** to exit the **Policy Rules** window.
116+
1. You can now select the **Add Alert policy** button.
107117
1. Set the **Action as Send** and select **Apply**.
108118

109-
Now set a second alert related to Common Vulnerabilities and Exposures (CVEs).
119+
## Create more alert policies
120+
121+
Repeat the process described in [Configure Alert Policy](#configure-alert-policy) section. Repeat again if and as needed for all of the alerts in the
122+
[NGINX One Console Glossary]({{< ref "/nginx-one/glossary.md#nginx-alerts/" >}}).
110123

124+
## Activate the alert policy
125+
126+
Now to make sure your new policy works, add your new policies to the list of **Active Alert Policies**. To do so:
127+
128+
1. Select **Alerts Management > Active Alert Policies**
129+
1. Select **Select Active Alert Policies**.
130+
1. In the **Select Active Alert Policies** window, select **Add Item**
131+
1. In the drop-down box that appears, select the Alert Policy that you created.
132+
1. Select the **Add Select Active Alert Policies** button.
111133
1. Select **Add Item**
112-
1. Under **Select Alerts** select a filter. If you're interested in all CVEs, select **Matching RegEx of Alertname**. In the text box that appears, enter **CVE**.
113-
1. Under **Select Alerts**, set the **Action** as **Send** and select **Apply**
114-
You should now see two alerts under **Policy Rules**.
115-
1. Select **Apply** to save thse policies.
116-
1. Select **Add Alert Policy**.
117134

118-
You've now set up F5 Distributed Cloud to send you security-related alerts from NGINX One Console.
135+
You've now set up F5 Distributed Cloud to send you alerts from NGINX One Console, to your email address. When the alert policy identifies an alert, it sends you an email from **[email protected]**.
119136

120137
## Summary
121138

122139
In this tutorial, you learned how to:
123140

124141
- Access the NGINX One Console
125142
- Connect an NGINX instance
126-
- Configure an Alert
143+
- Configure and activate an alert
127144

128-
You will now receive an email any time the NGINX One Console recognizes one of your connected instances has a configuration that is insecure or an NGINX CVE impacts it.
145+
You will now receive an email any time the F5 Distributed Cloud sees one or more of the alerts that you configued.
129146

130147
## Next steps
131148

0 commit comments

Comments
 (0)