You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/includes/nginx-one/how-to/generate-data-plane-key.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,13 @@ files:
7
7
8
8
A data plane key is a security token that ensures only trusted NGINX instances can register and communicate with NGINX One.
9
9
10
-
To generate a data plane key:
10
+
To generate a data plane key, select **Manage > Instances > Add Instance**:
11
11
12
12
-**For a new key:** In the **Add Instance** pane, select **Generate Data Plane Key**.
13
13
-**To reuse an existing key:** If you already have a data plane key and want to use it again, select **Use existing key**. Then, enter the key's value in the **Data Plane Key** box.
Data plane keys are displayed only once and cannot be retrieved later. Be sure to copy and store this key securely.
17
17
18
-
Data plane keys expire after one year. You can change this expiration date later by [editing the key]({{< ref "nginx-one/connect-instances/create-manage-data-plane-keys.md#change-expiration-date" >}}).
19
-
20
-
If you [Revoke a data plane key]({{< ref "nginx-one/connect-instances/create-manage-data-plane-keys.md#revoke-data-plane-key" >}}) you disconnect all instances registered with that key.
18
+
Data plane keys expire after one year. You can change this expiration date later by [editing the key]({{< ref "nginx-one/connect-instances/create-manage-data-plane-keys.md#change-expiration-date" >}}). If you [revoke a data plane key]({{< ref "nginx-one/connect-instances/create-manage-data-plane-keys.md#revoke-data-plane-key" >}}) you disconnect all instances registered with that key.
Copy file name to clipboardExpand all lines: content/includes/nginx-one/how-to/install-nginx-agent.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,16 @@ files:
5
5
- content/nginx-one/getting-started.md
6
6
---
7
7
8
-
After entering your data plane key, you'll see a `curl` command similar to the one below. Copy and run this command on each NGINX instance to install NGINX Agent. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.
8
+
After entering your data plane key, you'll see a `curl` command to install NGINX Agent, similar to the one below. Copy and run this command on each NGINX instance. Once installed, NGINX Agent typically registers with NGINX One within a few seconds.
9
9
10
10
{{<call-out "important" "Connecting to NGINX One" >}}
11
-
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`). Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
11
+
Ensure that any firewall rules you have in place for your NGINX hosts allows network traffic to port `443` for all of the following IPs:
12
12
13
13
-`3.135.72.139`
14
14
-`3.133.232.50`
15
15
-`52.14.85.249`
16
+
17
+
NGINX Agent must be able to establish a connection to NGINX One Console's Agent endpoint (`agent.connect.nginx.com`).
Copy file name to clipboardExpand all lines: content/nginx-one/secure-your-fleet/secure.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ If you already have accessed F5 Distributed Cloud and have NGINX instances avail
27
27
28
28
### Confirm access to the F5 Distributed Cloud
29
29
30
-
Confirm an F5 Distributed Cloud tenant has been provisioned for you. Log in to MyF5 and review your subscriptions. You should see within one of your subscriptions "Distributed Cloud". This could be in either an NGINX subscription or a Distributed Cloud. If the above does not appear in any of your subscriptions, reach out to either your F5 Account Team or Customer Success Manager.
30
+
Confirm an F5 Distributed Cloud tenant has been provisioned for you. Log in to the [MyF5](https://my.f5.com) customer portal and review your subscriptions. You should see within one of your subscriptions "Distributed Cloud". This could be in either an NGINX subscription or a Distributed Cloud. If the above does not appear in any of your subscriptions, reach out to either your F5 Account Team or Customer Success Manager.
31
31
32
32
With access, you or someone in your organization should have an email from [email protected] asking you to update your password when the tenant was created. The account name referenced in the email in bold is the tenant name.
33
33
@@ -48,7 +48,7 @@ Alternatively, we also have instructions for [Deploying NGINX and NGINX Plus wit
48
48
## Connect at least one NGINX instance to the NGINX One Console
49
49
50
50
If you already have connected instances to the NGINX One Console, you can start to [Configure an active alert policy]({{< ref "/nginx-one/secure-your-fleet/secure.md#configure-an-active-alert-policy" >}}).
51
-
Otherwise, you need to generate a data plane key, add an instance, and install NGINX Agent. We assume this is the first time you are connecting an instance.
51
+
Otherwise, you need to add an instance, generate a data plane key, and install NGINX Agent. We assume this is the first time you are connecting an instance.
52
52
53
53
### Add an instance
54
54
@@ -85,8 +85,8 @@ To configure security-related alerts, follow these steps:
85
85
1. (Optional) Specify a label and description.
86
86
1. Under **Receiver**, select **Email** and enter your email address.
87
87
1. Select **Add Alert Receiver**
88
-
1.Your email receiver should now appear on the list of Alert Receivers.
89
-
1.Under the **Actions**column, select**Verify Email**.
88
+
Your alert receiver should now appear on the list of Alert Receivers.
89
+
1.Select the **Actions**ellipsis (...) for your receiver. Select**Verify Email**.
90
90
1. Select **Send email** to confirm.
91
91
1. You should receive a verification code in the email provided. Copy that code.
92
92
1. Under the **Actions** column, select **Enter verification code**.
@@ -105,13 +105,15 @@ Next, configure the policy that identifies when you'll get an alert.
105
105
1. Select **Add Item**.
106
106
1. Under **Select Alerts** select a filter. If you're interested in all NGINX alerts, select **Matching RegEx of Alertname**. In the text box that appears, enter **NGINX**.
107
107
1. Set the **Action as Send** and select **Apply**.
108
-
1. Select **Apply** again, and then select **Apply Alert Policy**.
109
108
110
109
Now set a second alert related to Common Vulnerabilities and Exposures (CVEs).
111
110
112
111
1. Select **Add Item**
112
+
1. Under **Select Alerts** select a filter. If you're interested in all CVEs, select **Matching RegEx of Alertname**. In the text box that appears, enter **CVE**.
113
113
1. Under **Select Alerts**, set the **Action** as **Send** and select **Apply**
114
-
1. Select **Save and Exit**
114
+
You should now see two alerts under **Policy Rules**.
115
+
1. Select **Apply** to save thse policies.
116
+
1. Select **Add Alert Policy**.
115
117
116
118
You've now set up F5 Distributed Cloud to send you security-related alerts from NGINX One Console.
0 commit comments