Skip to content

Commit 6cab581

Browse files
authored
Merge branch 'main' into consolidate-glossary-pages
2 parents 0ebc38e + 18fbafc commit 6cab581

File tree

11 files changed

+42
-75
lines changed

11 files changed

+42
-75
lines changed

config/_default/config.toml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,8 +148,6 @@ enableGitInfo = true
148148
"3.22.8"
149149
]
150150
github_repo = "https://github.com/nginx/documentation/"
151-
[params.featureFlags]
152-
disable_qualtrics = true
153151

154152
sectionPagesMenu = "docs"
155153

content/includes/nginx-plus/install/pin-to-version/pin-debian-ubuntu-R32.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,14 @@ To pin NGINX Plus to a specific version (for example, R33):
88
1. Update the repository base URL to the desired version:
99

1010
- **For Ubuntu**:
11-
12-
```shell
13-
https://pkgs.nginx.com/plus/R33/ubuntu
14-
```
11+
```shell
12+
https://pkgs.nginx.com/plus/R33/ubuntu
13+
```
1514

1615
- **For Debian**:
17-
18-
```shell
19-
https://pkgs.nginx.com/plus/R33/debian
20-
```
16+
```shell
17+
https://pkgs.nginx.com/plus/R33/debian
18+
```
2119

2220
3. Save the changes and exit.
2321

content/nginx/admin-guide/installing-nginx/installing-nginx-plus.md

Lines changed: 3 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -98,11 +98,7 @@ This article explains how to install NGINX Plus on different operating systems,
9898
sudo wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/nginx-plus-8.repo
9999
```
100100

101-
{{< details summary="Pin NGINX Plus to a specific version" >}}
102-
103-
{{< call-out "note">}}
104-
{{< include "nginx-plus/install/pin-to-version/pin-rhel8-R32.md" >}}
105-
{{< /call-out >}}
101+
{{< details summary="Pin NGINX Plus to a specific version" >}}{{< call-out "note">}}{{< include "nginx-plus/install/pin-to-version/pin-rhel8-R32.md" >}}{{< /call-out >}}
106102

107103
{{< /details >}}
108104

@@ -138,13 +134,7 @@ This article explains how to install NGINX Plus on different operating systems,
138134
sudo wget -P /etc/yum.repos.d https://cs.nginx.com/static/files/plus-9.repo
139135
```
140136

141-
{{< details summary="Pin NGINX Plus to a specific version" >}}
142-
143-
{{< call-out "note">}}
144-
{{< include "nginx-plus/install/pin-to-version/pin-rhel9-R32.md" >}}
145-
{{< /call-out >}}
146-
147-
{{< /details >}}
137+
{{< details summary="Pin NGINX Plus to a specific version" >}}{{< call-out "note">}}{{< include "nginx-plus/install/pin-to-version/pin-rhel9-R32.md" >}}{{< /call-out >}}{{< /details >}}
148138

149139
1. {{< include "nginx-plus/install/install-nginx-plus-package-dnf.md" >}}
150140

@@ -222,13 +212,7 @@ NGINX Plus can be installed on the following versions of Debian or Ubuntu:
222212
| sudo tee /etc/apt/sources.list.d/nginx-plus.list
223213
```
224214

225-
{{< details summary="Pin NGINX Plus to a specific version" >}}
226-
227-
{{< call-out "note">}}
228-
{{< include "nginx-plus/install/pin-to-version/pin-debian-ubuntu-R32.md" >}}
229-
{{< /call-out >}}
230-
231-
{{< /details >}}
215+
{{< details summary="Pin NGINX Plus to a specific version" >}}{{< call-out "note">}}{{< include "nginx-plus/install/pin-to-version/pin-debian-ubuntu-R32.md" >}}{{< /call-out >}}{{< /details >}}
232216

233217
1. Download the **nginx-plus** apt configuration to **/etc/apt/apt.conf.d**:
234218

content/nginxaas-azure/app-protect/configure-waf.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This guide explains how to configure the F5 WAF for NGINX security features.
1313

1414
## Configure
1515

16-
To use NGINX App Protect apply the following changes to the NGINX config file.
16+
To use F5 WAF for NGINX apply the following changes to the NGINX config file.
1717

1818
1. Load the F5 WAF for NGINX module on the main context:
1919

@@ -27,7 +27,7 @@ load_module modules/ngx_http_app_protect_module.so;
2727
app_protect_enforcer_address 127.0.0.1:50000;
2828
```
2929

30-
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for Nginx App Protect to work and must match 127.0.0.1:50000{{< /call-out >}}
30+
{{< call-out "note" >}} The app_protect_enforcer_address directive is a required directive for F5 WAF for NGINX to work and must match 127.0.0.1:50000{{< /call-out >}}
3131

3232

3333
3. Enable F5 WAF for NGINX with the `app_protect_enable` directives in the appropriate scope. The `app_protect_enable` directive may be set in the `http`, `server`, and `location` contexts.
@@ -44,7 +44,7 @@ app_protect_enable on;
4444
app_protect_policy_file /etc/app_protect/conf/NginxDefaultPolicy.json;
4545
```
4646

47-
Sample Config with App Protect configured:
47+
Sample Config with F5 WAF for NGINX configured:
4848

4949
```nginx
5050
user nginx;
@@ -85,8 +85,8 @@ http {
8585

8686
## Precompiled Policies
8787

88-
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in NGINX App Protect. These policies are supported in both the blocking and transparent enforcement modes.
89-
For more information on these policies refer the NGINX App Protect [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
88+
NGINXaaS for Azure ships with the two reference policies (Default and Strict) supported in F5 WAF for NGINX. These policies are supported in both the blocking and transparent enforcement modes.
89+
For more information on these policies refer the F5 WAF for NGINX [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
9090

9191
The following table shows the path to the precompiled policy file that needs to be used with the `app_protect_policy_file` directive:
9292

@@ -99,11 +99,11 @@ The following table shows the path to the precompiled policy file that needs to
9999
| Strict | Transparent | /etc/app_protect/conf/NginxStrictPolicy_transparent.json |
100100
{{< /table >}}
101101

102-
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the App Protect section.
102+
To view the contents of the available security policies, navigate to the azure portal and select the **Security Policies** tab in the F5 WAF for NGINX section.
103103

104104
## Custom policies
105105

106-
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to NGINX App Protect Instances using the API or Azure Portal.
106+
NGINXaas for Azure also supports custom security policies. You can create and modify custom security policies to deploy to F5 WAF for NGINX Instances using the API or Azure Portal.
107107

108108
### Manage custom policies
109109

@@ -121,7 +121,7 @@ In the policy editor:
121121
- The **File path** must start with the prefix "/etc/app_protect/conf/".
122122
- The **File path** extension must be ".json".
123123

124-
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the NGINX App Protect [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
124+
After your policy has been saved, you can then reference it in your NGINX configuration. For more information on policy configuration and syntax, refer to the F5 WAF for NGINX [configuration guide](https://docs.nginx.com/nginx-app-protect-waf/v5/configuration-guide/configuration/).
125125

126126
{{< call-out "note" >}}The **name** field within the security policy must be unique among the policies referenced in your NGINX configuration.{{< /call-out >}}
127127

content/nginxaas-azure/app-protect/enable-logging.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ type:
99

1010
## Overview
1111

12-
F5 NGINXaaS for Azure (NGINXaaS) supports exporting NGINX App Protect logs to an Azure Storage account or to a Log Analytics workspace.
12+
F5 NGINXaaS for Azure (NGINXaaS) supports exporting F5 WAF for NGINX logs to an Azure Storage account or to a Log Analytics workspace.
1313

1414
## Setting up operational logs
1515

16-
NGINX App Protect operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
16+
F5 WAF for NGINX operational logs are sent to the NGINX error logs. See [Enable NGINX Logs]({{< ref "/nginxaas-azure/monitoring/enable-logging/">}}) to configure error logs.
1717

1818
## Setting up security logs
1919

@@ -93,7 +93,7 @@ The following table shows the path to the log configuration file that needs to b
9393
| log_grpc_blocked | /etc/app_protect/conf/log_grpc_blocked.json |
9494
{{< /table >}}
9595

96-
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the App Protect section.
96+
To view the contents of the available log configuration, navigate to the azure portal and select the Log Configurations tab in the F5 WAF for NGINX section.
9797

9898
### Logging Destinations
9999

content/nginxaas-azure/app-protect/enable-waf.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ This guide explains how to enable F5 WAF for NGINX on a F5 NGINX as a Service fo
1414
## Before you start
1515
- F5 WAF for NGINX can only be enabled on NGINXaaS for Azure deployments with the **Standard v2** [plan]({{< ref "/nginxaas-azure/billing/overview.md" >}})
1616

17-
## Enable NGINX App Protect
17+
## Enable F5 WAF for NGINX
1818

19-
NGINX App Protect is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
19+
F5 WAF for NGINX is disabled by default and needs to be explicitly enabled on an NGINXaaS deployment. Follow these steps:
2020

2121
### Using the Microsoft Azure Portal
2222

@@ -26,7 +26,7 @@ Access the [Microsoft Azure portal](https://portal.azure.com)
2626

2727
2. Select NGINX app protect in the left menu.
2828

29-
3. Select **Enable App Protect**.
29+
3. Select **Enable F5 WAF for NGINX**.
3030

3131
## What's next
3232

content/nginxaas-azure/changelog/changelog.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ NGINXaaS now supports downloading certificate from Azure Key Vault via Private E
3939

4040
- {{% icon-feature %}} **Support for both precompiled and custom WAF policies in the same NGINX config**
4141

42-
NGINXaaS now allows both precompiled and custom policies for F5 NGINX App Protect WAF to be referenced within the same NGINX config. This removes a previous restriction.
42+
NGINXaaS now allows both precompiled and custom policies for F5 WAF for NGINX to be referenced within the same NGINX config. This removes a previous restriction.
4343

4444
## September 18, 2025
4545

content/nginxaas-azure/getting-started/create-deployment/deploy-azure-portal.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -65,22 +65,23 @@ You can start the NGINXaaS deployment process by visiting the [Create NGINXaaS](
6565
- If you plan on using an IPv6 address on the frontend, make sure the subnet is dual-stack, i.e., the subnet has both IPv4 and IPv6 address spaces. Attempting to use a subnet that is not dual-stack will cause deployment creation to fail.
6666
- Changes to a virtual network's DNS settings will not be applied automatically to your NGINXaaS deployment. To ensure DNS settings are applied, you must add any custom DNS servers to the VNET's DNS settings before creating an NGINXaaS deployment. As a workaround for existing deployments, we recommend using the [`resolver` directive](https://nginx.org/en/docs/http/ngx_http_core_module.html#resolver) to explicitly specify your name server(s) and the [`resolve` parameter](https://nginx.org/en/docs/http/ngx_http_upstream_module.html#resolve) to automatically re-resolve the domain name of the server without restarting NGINX.
6767

68-
{{< details summary="Resolver directive example" >}}
69-
70-
```nginx
71-
resolver 10.0.0.2 valid=10s;
72-
upstream backends {
73-
zone backends 64k;
74-
server backends.example.com:8080 resolve;
75-
}
76-
77-
server {
78-
location / {
79-
proxy_pass http://backends;
80-
}
68+
{{<details summary="Resolver directive example">}}
69+
70+
```nginx
71+
resolver 10.0.0.2 valid=10s;
72+
upstream backends {
73+
zone backends 64k;
74+
server backends.example.com:8080 resolve;
75+
}
76+
77+
server {
78+
location / {
79+
proxy_pass http://backends;
8180
}
82-
```
83-
{{< /details >}}
81+
}
82+
```
83+
84+
{{</details>}}
8485

8586

8687
1. Next, select **Tags**.

content/nginxaas-azure/loadbalancer-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The NLK controller monitors [Kubernetes Services](https://kubernetes.io/docs/con
4646

4747
### Example use cases
4848

49-
- You can use NGINXaaS for Azure to enforce rate limiting and application security with NGINX App Protect, then forward all accepted traffic to your Kubernetes applications.
49+
- You can use NGINXaaS for Azure to enforce rate limiting and application security with F5 WAF for NGINX, then forward all accepted traffic to your Kubernetes applications.
5050
- You can use NGINXaaS for Azure to receive traffic on `api.example.com` and route requests by URL path - for example, forwarding `/login` to a Kubernetes-based login service, `/graph` to a Kubernetes-hosted graph service, and `/process` to an application server on a standalone VM.
5151

5252
## Getting Started

content/nginxaas-azure/overview/feature-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Below is a feature breakdown with notes on support and limitations.
6161

6262
**Limitations:**
6363

64-
- Internal redirect and App Protect DoS are not available
64+
- Internal redirect and F5 WAF for NGINX DoS are not available
6565

6666
---
6767

0 commit comments

Comments
 (0)