Skip to content

Commit d602ee7

Browse files
mjangADubhlaoich
andcommitted
Apply suggestions from code review
Co-authored-by: Alan Dooley <[email protected]>
1 parent 8480284 commit d602ee7

File tree

1 file changed

+16
-27
lines changed

1 file changed

+16
-27
lines changed

content/nginx-one/k8s/add-ngf.md

Lines changed: 16 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -32,41 +32,26 @@ If you've created and recorded one or more data plane keys, you can edit or revo
3232

3333
If you've forgotten your data plane key, you can create a new one. Select **Manage > Data Plane Keys > Add Data Plane Key**.
3434

35-
For more options associated with data plane keys, see [Create and manage data plane keys]({{ ref "/nginx-one/connect-instances/create-manage-data-plane-keys" >}}).
35+
For more options associated with data plane keys, see [Create and manage data plane keys]({{< ref "/nginx-one/connect-instances/create-manage-data-plane-keys.md" >}}).
3636

3737
### Create a Kubernetes secret with the data plane key
38-
<!-- Maybe this is wrong. I'm assuming that we need to follow this step from the current version of https://docs.nginx.com/nginx-one/k8s/add-nic/#before-you-begin -->
39-
To create a Kubernetes secret with the data play key, use the following command:
38+
39+
To create a Kubernetes secret, you'll need:
40+
41+
- The Data Plane Key
42+
- To set up the secret in the same namespace as NGINX Gateway Fabric
43+
- Use the name `dataplane.key` as shown
44+
- A namespace. The default NGINX Gateway Fabric namespace is `nginx-gateway`
45+
46+
Once you have that information, run the following command:
47+
4048

4149
```shell
4250
kubectl create secret generic dataplane-key \
4351
--from-literal=dataplane.key=<Your Dataplane Key> \
4452
-n <namespace>
4553
```
4654

47-
### Install cert-manager
48-
49-
Add the Helm repository:
50-
51-
```shell
52-
helm repo add jetstack https://charts.jetstack.io
53-
helm repo update
54-
```
55-
56-
Install cert-manager:
57-
58-
```shell
59-
helm install \
60-
cert-manager jetstack/cert-manager \
61-
--namespace cert-manager \
62-
--create-namespace \
63-
--set config.apiVersion="controller.config.cert-manager.io/v1alpha1" \
64-
--set config.kind="ControllerConfiguration" \
65-
--set config.enableGatewayAPI=true \
66-
--set crds.enabled=true
67-
```
68-
69-
This also enables Gateway API features for cert-manager, which can be useful for [securing your workload traffic]({{< ref "/ngf/traffic-security/integrate-cert-manager.md" >}}).
7055

7156
## Install the Gateway API resources
7257
<!-- Corresponds to step 2 in the UX -->
@@ -119,7 +104,11 @@ kubectl wait --timeout=5m -n nginx-gateway deployment/ngf-nginx-gateway-fabric -
119104
## Verify a connection to NGINX One Console
120105

121106
After deploying NGINX Gateway Fabric with NGINX Agent, you can verify the connection to NGINX One Console.
122-
Log in to your F5 Distributed Cloud Console account. Select **NGINX One > Visit Service**. In the dashboard, go to **Manage > Instances**. You should see your instances listed by name. The instance name matches both the hostname and the pod name.
107+
Log in to your F5 Distributed Cloud Console account.
108+
109+
- Select **NGINX One > Visit Service**.
110+
- In the dashboard, select **Manage > Control Planes**. You should see your Control Planes listed by name, product, and version. Each control plane is associated with one or more instances.
111+
- Select the name of the Control Plane. In the **Instances** section, select the instance of your choice. You can review instance details, including the name of the **Control Plane**.
123112

124113
## Troubleshooting
125114

0 commit comments

Comments
 (0)