You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/app-protect-waf/configuration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -478,7 +478,7 @@ To access the application, curl the coffee and the tea services. We'll use the -
478
478
479
479
### Configuration Example of Virtual Server
480
480
481
-
Refer to github repo for [Virtual Server example](https://raw.githubusercontent.com/nginxinc/kubernetes-ingress/v3.2.1/examples/custom-resources/app-protect-waf/webapp.yaml).
481
+
Refer to GitHub repo for [Virtual Server example](https://raw.githubusercontent.com/nginxinc/kubernetes-ingress/v3.2.1/examples/custom-resources/app-protect-waf/webapp.yaml).
Copy file name to clipboardExpand all lines: docs/content/configuration/policy-resource.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,7 +143,7 @@ When you reference more than one rate limit policy, NGINX Ingress Controller wil
143
143
144
144
### BasicAuth
145
145
146
-
The basic auth policy configures NGINX to authenticate cllient requests using the [HTTP Basic authentication scheme](https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication).
146
+
The basic auth policy configures NGINX to authenticate client requests using the [HTTP Basic authentication scheme](https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication).
147
147
148
148
For example, the following policy will reject all requests that do not include a valid username/password combination in the HTTP header `Authentication`
Copy file name to clipboardExpand all lines: docs/content/installation/installation-with-helm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -327,7 +327,7 @@ The following tables lists the configurable parameters of the NGINX Ingress Cont
327
327
|`controller.extraContainers` | Extra (eg. sidecar) containers for the Ingress Controller pods. | [] |
328
328
|`controller.resources` | The resources of the Ingress Controller pods. | requests: cpu=100m,memory=128Mi |
329
329
|`controller.replicaCount` | The number of replicas of the Ingress Controller deployment. | 1 |
330
-
|`controller.ingressClass` | A class of the Ingress Controller. An IngressClass resource with the name equal to the class must be deployed. Otherwise, the Ingress Controller will fail to start. The Ingress Controller only processes resources that belong to its class - i.e. have the "ingressClassName" field resource equal to the class. The Ingress Controller processes all the VirtualServer/VirtualServerRoute/TransportServer resources that do not have the "ingressClassName" field for all versions of kubernetes. | nginx |
330
+
|`controller.ingressClass` | A class of the Ingress Controller. An IngressClass resource with the name equal to the class must be deployed. Otherwise, the Ingress Controller will fail to start. The Ingress Controller only processes resources that belong to its class - i.e. have the "ingressClassName" field resource equal to the class. The Ingress Controller processes all the VirtualServer/VirtualServerRoute/TransportServer resources that do not have the "ingressClassName" field for all versions of Kubernetes. | nginx |
331
331
|`controller.setAsDefaultIngress` | New Ingresses without an `"ingressClassName"` field specified will be assigned the class specified in `controller.ingressClass`. | false |
332
332
|`controller.watchNamespace` | Comma separated list of namespaces the Ingress Controller should watch for resources. By default the Ingress Controller watches all namespaces. Mutually exclusive with `controller.watchNamespaceLabel`. Please note that if configuring multiple namespaces using the Helm cli `--set` option, the string needs to wrapped in double quotes and the commas escaped using a backslash - e.g. `--set controller.watchNamespace="default\,nginx-ingress"`. | "" |
333
333
|`controller.watchNamespaceLabel` | Configures the Ingress Controller to watch only those namespaces with label foo=bar. By default the Ingress Controller watches all namespaces. Mutually exclusive with `controller.watchNamespace`. | "" |
Copy file name to clipboardExpand all lines: docs/content/installation/using-the-jwt-token-docker-secret.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,19 +35,19 @@ You will need the following information from [MyF5](https://my.f5.com) for these
35
35
1. Choose your desired [NGINX Ingress Controller Image](https://docs.nginx.com/nginx-ingress-controller/technical-specifications/#images-with-nginx-plus).
36
36
1. Log into the [MyF5 Portal](https://myf5.com/), navigate to your subscription details, and download the relevant .cert, .key and .JWT files.
37
37
1. Create a Kubernetes secret using the JWT token. You should use `cat` to view the contents of the JWT token and store the output for use in later steps.
38
-
1. Ensure there are no additional characters or extra whiespace that might have been accidently added. This will break authorization and prevent the NGINX Ingress Controller image from being downloaded.
38
+
1. Ensure there are no additional characters or extra whitespace that might have been accidentally added. This will break authorization and prevent the NGINX Ingress Controller image from being downloaded.
39
39
1. Modify your deployment (manifest or helm) to use the Kubernetes secret created in step three.
40
40
1. Deploy NGINX Ingress Controller into your Kubernetes cluster and verify successful installation.
41
41
42
42
## Using the JWT token in a Docker Config Secret
43
43
44
-
1. Create a kubernetes`docker-registry` secret type on the cluster, using the JWT token as the username and `none` for password (Password is unused). The name of the docker server is `private-registry.nginx.com`.
44
+
1. Create a Kubernetes`docker-registry` secret type on the cluster, using the JWT token as the username and `none` for password (Password is unused). The name of the docker server is `private-registry.nginx.com`.
It is important that the `--docker-username=<JWT Token>` contains the contents of the token and is not pointing to the token itself. Ensure that when you copy the contents of the JWT token, there are no additional characters or extra whitepaces. This can invalidate the token and cause 401 errors when trying to authenticate to the registry.
50
+
It is important that the `--docker-username=<JWT Token>` contains the contents of the token and is not pointing to the token itself. Ensure that when you copy the contents of the JWT token, there are no additional characters or extra whitespaces. This can invalidate the token and cause 401 errors when trying to authenticate to the registry.
51
51
52
52
53
53
1. Confirm the details of the created secret by running:
@@ -86,7 +86,7 @@ If you are using `helm` for deployment, there are two main methods: using *sourc
86
86
87
87
### Helm Source
88
88
89
-
The [Helm installation page for NGINX Ingess Controller](https://docs.nginx.com/nginx-ingress-controller/installation/installation-with-helm/#managing-the-chart-via-sources) has a section describing how to use sources: these are the unique steps for Docker secrets using JWT tokens.
89
+
The [Helm installation page for NGINX Ingress Controller](https://docs.nginx.com/nginx-ingress-controller/installation/installation-with-helm/#managing-the-chart-via-sources) has a section describing how to use sources: these are the unique steps for Docker secrets using JWT tokens.
90
90
91
91
1. Clone the NGINX [`kubernetes-ingress` repository](https://github.com/nginxinc/kubernetes-ingress).
92
92
1. Navigate to the `deployments/helm-chart` folder of your local clone.
@@ -98,7 +98,7 @@ You must change a few lines NGINX Ingress Controller with NGINX Plus to be deplo
98
98
1. Change the `repository` argument to the NGINX Ingress Controller image you intend to use.
99
99
1. Add an argument to `imagePullSecretName` to allow Docker to pull the image from the private registry.
100
100
101
-
The following codeblock shows snippets of the parameters you will need to change, and an example of their contents:
101
+
The following code block shows snippets of the parameters you will need to change, and an example of their contents:
Copy file name to clipboardExpand all lines: docs/content/releases.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ FIXES:
48
48
-[3798](https://github.com/nginxinc/kubernetes-ingress/pull/3798) Update VirtualServer template to generate an internal jwt auth location per policy applied.
49
49
-[3844](https://github.com/nginxinc/kubernetes-ingress/pull/3844) Fix gunzip support for VS and add python tests.
50
50
-[3870](https://github.com/nginxinc/kubernetes-ingress/pull/3870) Add Funcs() method to UpdateVirtualServerTemplate method. Thanks to [Bryan Hendryx](https://github.com/coolbry95).
51
-
-[3933](https://github.com/nginxinc/kubernetes-ingress/pull/3933) fix --enternal-service flag when using serviceNameOverride. Thanks to [Tim N](https://github.com/timnee).
51
+
-[3933](https://github.com/nginxinc/kubernetes-ingress/pull/3933) fix --external-service flag when using serviceNameOverride. Thanks to [Tim N](https://github.com/timnee).
52
52
53
53
CHANGES:
54
54
@@ -368,7 +368,7 @@ FEATURES:
368
368
-[2914](https://github.com/nginxinc/kubernetes-ingress/pull/2914) Support watching multiple namespaces.
369
369
-[2884](https://github.com/nginxinc/kubernetes-ingress/pull/2884) Include year in logs.
370
370
-[2993](https://github.com/nginxinc/kubernetes-ingress/pull/2993) Accept proxy protocol when TLS passthrough enabled.
371
-
-[3041](https://github.com/nginxinc/kubernetes-ingress/pull/3041) Support external name service for TansportServer.
371
+
-[3041](https://github.com/nginxinc/kubernetes-ingress/pull/3041) Support external name service for TransportServer.
372
372
-[2939](https://github.com/nginxinc/kubernetes-ingress/pull/2939) Add support for wildcard hostname in VirtualServer.
Copy file name to clipboardExpand all lines: docs/content/tutorials/ingress-path-regex-annotation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ toc: true
9
9
## Customizing NGINX Ingress Controller with Path-Regex Annotations
10
10
11
11
We suggest reading the NGINX [documentation on resolve location priority](https://docs.nginx.com/nginx/admin-guide/web-server/web-server/#nginx-location-priority)
12
-
to gain additional contenx about NGINX and NGINX Plus before using the ``path-regex`` annotation.
12
+
to gain additional context about NGINX and NGINX Plus before using the ``path-regex`` annotation.
It is crucial to make sure you install Istio **BEFORE** installing NGINX Ingress Controller. This ensures that the Istio sidecar is injected correctly into the NGINX Ingress controller pod.
0 commit comments