Skip to content

Commit

Permalink
Corrected typos etc
Browse files Browse the repository at this point in the history
  • Loading branch information
Rafal Wegrzycki committed Aug 18, 2020
1 parent 0f6c715 commit 867a289
Show file tree
Hide file tree
Showing 6 changed files with 12 additions and 8 deletions.
2 changes: 1 addition & 1 deletion build/appprotect/DockerfileWithAppProtectForPlus
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ COPY internal/configs/version1/nginx-plus.ingress.tmpl \
# and use it as a certificate and key for the default server
# ADD default.pem /etc/nginx/secrets/default

# Uncomment the lines below if You want to install a custom CA certificate
# Uncomment the lines below if you want to install a custom CA certificate
# COPY build/appprotect/*.crt /usr/local/share/ca-certificates/
# RUN update-ca-certificates

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -119,7 +119,7 @@ COPY internal/configs/version1/nginx-plus.ingress.tmpl \
# and use it as a certificate and key for the default server
# ADD default.pem /etc/nginx/secrets/default

# Uncomment the lines below if You want to install a custom CA certificate
# Uncomment the lines below if you want to install a custom CA certificate
# COPY build/appprotect/*.crt /etc/pki/ca-trust/source/anchors/
# RUN update-ca-trust extract

Expand Down
2 changes: 1 addition & 1 deletion deployments/common/ap-policy-definition.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ spec:
type: object
type: array
type: object
blockingSettingsReference:
blockingSettingReference:
properties:
link:
pattern: ^http
Expand Down
2 changes: 2 additions & 0 deletions deployments/helm-chart/crds/ap-logconf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ metadata:
controller-gen.kubebuilder.io/version: v0.2.5
creationTimestamp: null
name: aplogconfs.appprotect.f5.com
labels:
app.kubernetes.io/name: "nginx-ingress"
spec:
group: appprotect.f5.com
names:
Expand Down
4 changes: 3 additions & 1 deletion deployments/helm-chart/crds/ap-policy.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ metadata:
controller-gen.kubebuilder.io/version: v0.2.5
creationTimestamp: null
name: appolicies.appprotect.f5.com
labels:
app.kubernetes.io/name: "nginx-ingress"
spec:
group: appprotect.f5.com
names:
Expand Down Expand Up @@ -259,7 +261,7 @@ spec:
type: object
type: array
type: object
blockingSettingsReference:
blockingSettingReference:
properties:
link:
pattern: ^http
Expand Down
8 changes: 4 additions & 4 deletions docs-web/app-protect/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ The table below categorizes some potential problems with the Ingress Controller
- Too many Ingress Resources with App Protect enabled. Check the `NGINX fails to start/reload section <#nginx-fails-to-start-or-reload>`_ of the Known Issues.
* - Reload time.
- The Ingress Controller NGINX Configuration timeout takes longer than usual.
- Check the HTTP resonse time to resources used in App Protect policy external references.
- Check the HTTP response time to resources used in App Protect policy external references.
- The servers providing policy snippets have an increased response time due to load, or network Latency.
```

Expand Down Expand Up @@ -108,10 +108,10 @@ This timeout should be more than enough to verify configurations. However, when

You can increase this timeout by setting the `nginx-reload-timeout` [cli-argument](/nginx-ingress-controller/configuration/global-configuration/command-line-arguments/#cmdoption-nginx-reload-timeout).

If You are using external references in Your Nginx App Protect policies, verify if the servers hosting the referenced resources are available and that their response time is as short as possible (see next paragraph).
If the references are not available during ingress controller startup the pod will fail to startup. In case the resources are not available during a reload, the relod will fail, and ingress controller will process traffic with the previous correct coonfiguration.
If you are using external references in your Nginx App Protect policies, verify if the servers hosting the referenced resources are available and that their response time is as short as possible (see next paragraph).
If the references are not available during ingress controller startup the pod will fail to startup. In case the resources are not available during a reload, the reload will fail, and ingress controller will process traffic with the previous correct configuration.

### Check the HTTP resonse time to resources used in App Protect policy external references.
### Check the HTTP response time to resources used in App Protect policy external references.

To check what servers host the external references:
```
Expand Down

0 comments on commit 867a289

Please sign in to comment.