Skip to content

Commit da4f7e1

Browse files
committed
Merge remote-tracking branch 'myfork/update-alert-migration-steps' into update-alert-migration-steps
2 parents ad60650 + 1775165 commit da4f7e1

File tree

40 files changed

+946
-664
lines changed

40 files changed

+946
-664
lines changed

content/_index.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,3 +50,11 @@ Learn how to deliver, manage, and protect your applications using F5 NGINX produ
5050
Managed NGINX service for your Google Cloud application stack.
5151
{{</card >}}
5252
{{</card-section>}}
53+
54+
{{<card-section showAsCards="true" title="Glossary">}}
55+
{{<card title="F5 NGINX Glossary" titleUrl="/glossary/glossary/" brandIcon="NGINX-product-icon.svg" isLanding="true">}}
56+
Glossary of common terms and definitions for all F5 NGINX products.
57+
{{</card >}}
58+
{{</card-section>}}
59+
60+

content/glossary/_index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
---
2+
title: "F5 NGINX Glossary"
3+
weight: 100
4+
---

content/glossary/glossary.md

Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
description: ''
3+
title: Glossary
4+
nd-docs: DOCS-602
5+
weight: 1000
6+
toc: true
7+
nd-content-type: reference
8+
---
9+
10+
This glossary defines terms used in F5 NGINX.
11+
12+
## General terms
13+
14+
{{< table >}}
15+
16+
| Term | Definition |
17+
| ---- | ---------- |
18+
| **Config Sync Group** / **Instance Group** | A group of NGINX systems (or instances) with identical configurations. They may also share the same certificates. However, the instances in a Config Sync Group could belong to different systems and even different clusters. Also known as an Instance Group in NGINX Instance Manager. For more information, see this explanation of [Important considerations]({{< ref "/nginx-one/nginx-configs/config-sync-groups/manage-config-sync-groups.md#important-considerations" >}}) |
19+
| **Control Plane** | The control plane is the part of a network architecture that manages and controls the flow or data or traffic (the Data Plane). It is responsible for system-level tasks such as routing and traffic management. |
20+
| **Data Plane** | The data plane is the part of a network architecture that carries user traffic. It handles tasks like forwarding data packets between devices and managing network communication. In the context of NGINX, the data plane is responsible for tasks such as load balancing, caching, and serving web content. |
21+
| **Instance** | An instance is an individual system with NGINX installed. You can group the instances of your choice in a Config Sync Group. When you add an instance to NGINX One Console, you need to use a data plane key. |
22+
| **Namespace** | In F5 Distributed Cloud, a namespace groups a tenant's configuration objects, similar to administrative domains. Every object in a namespace must have a unique name, and each namespace must be unique to its tenant. This setup ensures isolation, preventing cross-referencing of objects between namespaces. You'll see the namespace in the NGINX One Console URL as `/namespaces/<namespace name>/`. To switch an instance between namespaces, you have to deregister an instance from an old namespace, and register it on the new namespace. |
23+
| **NGINX Agent** | A lightweight software component installed on NGINX instances to enable communication with the NGINX One console. NGINX Agent also enables communication with NGINX Instance Manager. |
24+
| **Staged Configurations** | Also known as **Staged Configs**. Allows you to save "work in progress." You can create it from scratch, an Instance, another Staged Config, or a Config Sync Group. It does _not_ have to be a working configuration until you publish it to an instance or a Config Sync Group. You can even manage your **Staged Configurations** through our [API]({{< ref "/nginx-one/api/api-reference-guide/#tag/StagedConfigs" >}}). |
25+
| **Tenant** | A tenant in F5 Distributed Cloud is an entity that owns a specific set of configuration and infrastructure. It is fundamental for isolation, meaning a tenant cannot access objects or infrastructure of other tenants. Tenants can be either individual or enterprise, with the latter allowing multiple users with role-based access control (RBAC). |
26+
27+
{{< /table >}}
28+
29+
## Authentication and Authorization terms
30+
31+
{{< table >}}
32+
33+
| Term | Definition |
34+
| ---- | ---------- |
35+
| **Access Token** | Defined in OAuth2, this (optional) short lifetime token provides access to specific user resources as defined in the scope values in the request to the authorization server (can be a JSON token as well). |
36+
| **ID Token** | Specific to OIDC, the primary use of the token in JWT format is to provide information about the authentication operation's outcome. |
37+
| **Identity Provider (IdP)** | A service that authenticates users and verifies their identity for client applications. |
38+
| **JSON Web Token (JWT)** | An open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. |
39+
| **Protected Resource** | A resource that is hosted by the resource server and requires an access token to be accessed. |
40+
| **Refresh Token** | Coming from OAuth2 specs, the token is usually long-lived and may be used to obtain new access tokens. |
41+
| **Relying Party (RP)** | A client service required to verify user identity. |
42+
43+
{{< /table >}}
44+
45+
## Kubernetes and Ingress Controller terms
46+
47+
{{< include "nic/kubernetes-terminology.md" >}}
48+
49+
## F5 WAF for NGINX
50+
51+
This section defines terminology used when describing functionality of F5 WAF for NGINX.
52+
53+
It assumes you are familiar with various layer 7 (L7) hypertext transfer protocol (HTTP) concepts such as:
54+
55+
- Cookies
56+
- HTTP methods and status codes
57+
- HTTP headings, requests, responses, and parameters
58+
- Uniform Resource Identifier (URI)
59+
- Uniform Resource Location (URL)
60+
61+
{{< include "waf/terminology.md" >}}
62+
63+
## NGINX Alerts
64+
65+
To set up NGINX Alerts through the F5 Distributed Cloud, follow the procedure in [Set up security alerts]({{< ref "/nginx-one/secure-your-fleet/set-up-security-alerts/" >}}).
66+
67+
{{< include "/nginx-one/alert-labels.md" >}}
68+
69+
70+
## References
71+
72+
- [F5 Glossary](https://www.f5.com/glossary)
73+
- [F5 Distributed Cloud: Core Concepts](https://docs.cloud.f5.com/docs/ves-concepts/core-concepts)
74+

content/includes/agent/about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Real-time observability into NGINX One data plane instances:
1919
- Provides live monitoring and actionable insights into the performance, status, and health of NGINX One data plane
2020
instances, improving decision-making and operational efficiency.
2121
- NGINX Agent supports [OpenTelemetry](https://opentelemetry.io/) and the ability to
22-
[export the metrics data]({{< ref "/nginx-one/agent/metrics/configure-otel-metrics.md" >}}) for use in other applications.
22+
[export the metrics data]({{< ref "/nginx-one/agent/configure-otel-metrics.md" >}}) for use in other applications.
2323

2424

2525

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
files:
3+
- content/glossary/glossary.md
4+
- content/nic/glossary.md
5+
---
6+
7+
{{< table >}}
8+
9+
| Term | Definition |
10+
| ---- | ---------- |
11+
| **Ingress** | Refers to an *Ingress Resource*, a Kubernetes API object which allows access to [Services](https://kubernetes.io/docs/concepts/services-networking/service/) within a cluster. They are managed by an [Ingress Controller]({{< ref "/nic/glossary.md#ingress-controller">}}). *Ingress* resources enable the following functionality:<br>* **Load balancing**, extended through the use of Services<br>* **Content-based routing**, using hosts and paths<br>* **TLS/SSL termination**, based on hostnames<br><br>For additional information, please read the official [Kubernetes Ingress Documentation](https://kubernetes.io/docs/concepts/services-networking/ingress/). |
12+
| **Ingress Controller** | Ingress Controllers are applications within a Kubernetes cluster that enable [Ingress]({{< ref "/nic/glossary.md#ingress">}}) resources to function. They are not automatically deployed with a Kubernetes cluster, and can vary in implementation based on intended use, such as load balancing algorithms for Ingress resources. [The design of NGINX Ingress Controller]({{< ref "/nic/overview/design.md">}}) explains the technical details of NGINX Ingress Controller. |
13+
14+
{{< /table >}}

content/includes/waf/dockerfiles/amazon-plus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@
88
FROM amazonlinux:2023
99

1010
# Install NGINX Plus and F5 WAF for NGINX v5 module
11-
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=0644 \
11+
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
1212
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
1313
yum -y install wget ca-certificates shadow-utils \
1414
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/plus-amazonlinux2023.repo \
1515
&& echo "[app-protect-x-plus]" > /etc/yum.repos.d/app-protect-plus.repo \
1616
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-plus.repo \
1717
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-plus/amzn/2023/\$basearch/" >> /etc/yum.repos.d/app-protect-plus.repo \
18-
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.cert" >> /etc/yum.repos.d/app-protect-plus.repo \
18+
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-plus.repo \
1919
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-plus.repo \
2020
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-plus.repo \
2121
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-plus.repo \
@@ -33,4 +33,4 @@ STOPSIGNAL SIGQUIT
3333

3434
# Set default command
3535
CMD ["nginx", "-g", "daemon off;"]
36-
```
36+
```

content/includes/waf/dockerfiles/debian-plus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ARG OS_CODENAME=bookworm
1111
FROM debian:${OS_CODENAME}
1212

1313
# Install NGINX Plus and F5 WAF for NGINX v5 module
14-
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=0644 \
14+
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
1515
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
1616
apt-get update \
1717
&& apt-get install -y \
@@ -46,4 +46,4 @@ STOPSIGNAL SIGQUIT
4646

4747
# Set default command
4848
CMD ["nginx", "-g", "daemon off;"]
49-
```
49+
```

content/includes/waf/dockerfiles/oracle-plus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@
88
FROM oraclelinux:8
99

1010
# Install NGINX Plus and F5 WAF for NGINX v5 module
11-
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=0644 \
11+
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
1212
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
1313
dnf -y install wget ca-certificates yum-utils \
1414
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/nginx-plus-8.repo \
1515
&& echo "[app-protect-x-plus]" > /etc/yum.repos.d/app-protect-8-x-plus.repo \
1616
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
1717
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-plus/centos/8/\$basearch/" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
18-
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.cert" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
18+
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
1919
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
2020
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
2121
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-8-x-plus.repo \
@@ -34,4 +34,4 @@ STOPSIGNAL SIGQUIT
3434

3535
# Set default command
3636
CMD ["nginx", "-g", "daemon off;"]
37-
```
37+
```

content/includes/waf/dockerfiles/rhel8-plus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ FROM registry.access.redhat.com/ubi${UBI_VERSION}/ubi
1414
ARG UBI_VERSION
1515

1616
# Install NGINX Plus and F5 WAF for NGINX v5 module
17-
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=0644 \
17+
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
1818
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
1919
PKG_MANAGER=dnf; \
2020
if [ "${UBI_VERSION}" = "7" ]; then \
@@ -31,7 +31,7 @@ RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=064
3131
&& echo "[app-protect-x-plus]" > /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
3232
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
3333
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-plus/centos/${UBI_VERSION}/\$basearch/" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
34-
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.cert" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
34+
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
3535
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
3636
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
3737
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \

content/includes/waf/dockerfiles/rhel9-plus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@
88
FROM rockylinux:9
99

1010
# Install NGINX Plus and F5 WAF for NGINX v5 module
11-
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.cert,mode=0644 \
11+
RUN --mount=type=secret,id=nginx-crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
1212
--mount=type=secret,id=nginx-key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
1313
dnf -y install wget ca-certificates \
1414
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/dependencies.repo \
1515
&& wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/${NGINX_PLUS_REPO} \
1616
&& echo "[app-protect-x-plus]" > /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
1717
&& echo "name=nginx-app-protect repo" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
1818
&& echo "baseurl=https://pkgs.nginx.com/app-protect-x-plus/centos/${UBI_VERSION}/\$basearch/" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
19-
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.cert" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
19+
&& echo "sslclientcert=/etc/ssl/nginx/nginx-repo.crt" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
2020
&& echo "sslclientkey=/etc/ssl/nginx/nginx-repo.key" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
2121
&& echo "gpgcheck=0" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
2222
&& echo "enabled=1" >> /etc/yum.repos.d/app-protect-${UBI_VERSION}-x-plus.repo \
@@ -35,4 +35,4 @@ STOPSIGNAL SIGQUIT
3535

3636
# Set default command
3737
CMD ["nginx", "-g", "daemon off;"]
38-
```
38+
```

0 commit comments

Comments
 (0)