Skip to content

Commit 5bdd4ce

Browse files
authored
Update Service language for NGF (#1440)
Problem: The language around accessing the NGINX Service is outdated after the architecture change. Solution: Update this language to make it clear how the Service is deployed and accesssed.
1 parent 5827030 commit 5bdd4ce

File tree

3 files changed

+20
-14
lines changed

3 files changed

+20
-14
lines changed

content/includes/ngf/installation/expose-nginx-gateway-fabric.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,34 @@ weight: 300
44
nd-docs: "DOCS-1427"
55
---
66

7-
There are two options for accessing NGINX Gateway Fabric depending on the type of LoadBalancer service you chose during installation:
7+
When a Gateway resource is created, the NGINX Gateway Fabric control plane will provision an NGINX service in the same namespace as the Gateway. By default, this is a LoadBalancer service. This is not the same service that is deployed when NGINX Gateway Fabric is first installed. The NGINX Gateway Fabric control plane has its own ClusterIP service for internal communication with the NGINX data planes.
88

9-
- If the LoadBalancer type is `NodePort`, Kubernetes will randomly allocate two ports on every node of the cluster.
10-
To access the NGINX Gateway Fabric, use an IP address of any node of the cluster along with the two allocated ports.
9+
There are two options for accessing the NGINX service depending on the type of LoadBalancer service you chose during installation:
10+
11+
- If the Service type is `NodePort`, Kubernetes will randomly allocate two ports on every node of the cluster.
12+
To access NGINX, use an IP address of any node of the cluster along with the two allocated ports.
1113

1214
{{< call-out "tip" >}} Read more about the type NodePort in the [Kubernetes documentation](https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport). {{< /call-out >}}
1315

14-
- If the LoadBalancer type is `LoadBalancer`:
16+
- If the Service type is `LoadBalancer`:
1517

16-
- For GCP or Azure, Kubernetes will allocate a cloud load balancer for load balancing the NGINX Gateway Fabric pods.
17-
Use the public IP of the load balancer to access NGINX Gateway Fabric.
18+
- For GCP or Azure, Kubernetes will allocate a cloud load balancer for load balancing the NGINX pods.
19+
Use the public IP of the load balancer to access NGINX.
1820
- For AWS, Kubernetes will allocate a Network Load Balancer (NLB) in TCP mode with the PROXY protocol enabled to pass
1921
the client's information (the IP address and the port).
2022

21-
Use the public IP of the load balancer to access NGINX Gateway Fabric. To get the public IP which is reported in the `EXTERNAL-IP` column:
23+
Use the public IP of the load balancer to access NGINX. The NGINX Service exists in the same namespace that you deployed your Gateway in, and its name is `<gatewayName-gatewayClassName>`. To get the public IP which is reported in the `EXTERNAL-IP` column:
2224

2325
- For GCP or Azure, run:
2426

2527
```shell
26-
kubectl get svc nginx-gateway -n nginx-gateway
28+
kubectl get svc <gatewayName-gatewayClassName> -n <gateway-namespace>
2729
```
2830

29-
- In AWS, the NLB (Network Load Balancer) DNS (directory name system) name will be reported by Kubernetes instead of a public IP. To get the DNS name, run:
31+
- In AWS, the NLB (Network Load Balancer) DNS name will be reported by Kubernetes instead of a public IP. To get the DNS name, run:
3032

3133
```shell
32-
kubectl get svc nginx-gateway -n nginx-gateway
34+
kubectl get svc <gatewayName-gatewayClassName> -n <gateway-namespace>
3335
```
3436

3537
{{< call-out "note" >}} We recommend using the NLB DNS whenever possible, but for testing purposes, you can resolve the DNS name to get the IP address of the load balancer:
@@ -46,8 +48,6 @@ There are two options for accessing NGINX Gateway Fabric depending on the type o
4648
termination. Read the [Kubernetes documentation](https://kubernetes.io/docs/concepts/services-networking/service/#type-loadbalancer) to learn more.
4749
{{< /call-out >}}
4850

49-
{{< call-out "important" >}}By default Helm and manifests configure NGINX Gateway Fabric on ports `80` and `443`, affecting any gateway [listeners](https://gateway-api.sigs.k8s.io/references/spec/#gateway.networking.k8s.io/v1.Listener) on these ports. To use different ports, update the configuration. NGINX Gateway Fabric requires a configured [gateway](https://gateway-api.sigs.k8s.io/api-types/gateway/#gateway) resource with a valid listener to listen on any ports.{{< /call-out >}}
50-
5151
NGINX Gateway Fabric uses the created service to update the **Addresses** field in the **Gateway Status** resource. Using a **LoadBalancer** service sets this field to the IP address and/or hostname of that service. Without a service, the pod IP address is used.
5252

53-
This gateway is associated with the NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller">}}).
53+
This gateway is associated with NGINX Gateway Fabric through the **gatewayClassName** field. The default installation of NGINX Gateway Fabric creates a **GatewayClass** with the name **nginx**. NGINX Gateway Fabric will only configure gateways with a **gatewayClassName** of **nginx** unless you change the name via the `--gatewayclass` [command-line flag]({{< ref "/ngf/reference/cli-help.md#controller">}}).

content/ngf/install/helm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ kubectl wait --timeout=5m -n nginx-gateway deployment/ngf-nginx-gateway-fabric -
133133

134134
#### Service type
135135

136-
By default, the NGINX Gateway Fabric helm chart deploys a LoadBalancer Service.
136+
By default, the NGINX Gateway Fabric control plane deploys a LoadBalancer Service when a Gateway is created.
137137

138138
To use a NodePort Service instead:
139139

content/ngf/install/secure-certificates.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,12 @@ To complete this guide, you will need the following prerequisites:
2828
- Administrator access to a Kubernetes cluster.
2929
- [Helm](https://helm.sh) and [kubectl](https://kubernetes.io/docs/tasks/tools/#kubectl) must be installed locally.
3030

31+
## Install Gateway API CRDs
32+
33+
```shell
34+
kubectl kustomize "https://github.com/nginx/nginx-gateway-fabric/config/crd/gateway-api/standard?ref=v{{< version-ngf >}}" | kubectl apply -f -
35+
```
36+
3137
## Install cert-manager
3238

3339
Add the Helm repository:

0 commit comments

Comments
 (0)