Skip to content

Conversation

arpith-f5
Copy link
Contributor

@arpith-f5 arpith-f5 commented Sep 17, 2025

This commit updates the NGINXaaS documentation to add instructions for fetching certificates via private endpoints.

Proposed changes

Checklist

Before sharing this pull request, I completed the following checklist:

Footnotes

  1. Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to the style guide for guidance about placeholder content.

@github-actions github-actions bot added documentation Improvements or additions to documentation product/nginxaas-azure Issues related to NGINX as a Service for Azure labels Sep 17, 2025
- Access to AKV through a public or private endpoint. If public access to AKV needs to be restricted,
either [configure Network Security Perimeter]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#configure-network-security-perimeter-nsp" >}}) or [integrate with a private endpoint]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#integrate-with-private-endpoint" >}})

{{< call-out "important" >}}**Known Issue:** Updating managed identity on NGINXaaS deployment after creation may result in the managed identity not being correctly delegated to the dataplane, which can cause certificate fetch failures when public access is disabled. To avoid this issue, ensure that the managed identity that has access to AKV is assigned during NGINXaaS deployment creation. {{< /call-out >}}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is difficult to read. I might say:

Suggested change
{{< call-out "important" >}}**Known Issue:** Updating managed identity on NGINXaaS deployment after creation may result in the managed identity not being correctly delegated to the dataplane, which can cause certificate fetch failures when public access is disabled. To avoid this issue, ensure that the managed identity that has access to AKV is assigned during NGINXaaS deployment creation. {{< /call-out >}}
{{< call-out "important" >}}**Known Issue:** When public access is disabled, you may see certificate fetch failures. This can happen when you update managed identity on NGINXaaS deployment after creation. This may result in the managed identity not being correctly delegated to the dataplane.
To avoid this issue, when you create an NGINXaaS deployment, make sure that the managed identity that has access to AKV is assigned. {{< /call-out >}}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Alternative: if this is an edge case, set this up as a KB article.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are right perhaps the prerequisites page is not the best place to add this info. Move this to the known-issues page.

1. Get the resource ID of the key vault.
Please ensure the following environment variables are set before copying the below Azure CLI command.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Our style guide suggests that you shouldn't use please (unless the problem is "our fault"). And I think you can be more direct:

Suggested change
Please ensure the following environment variables are set before copying the below Azure CLI command.
Set the following environment variables before copying the following Azure CLI command.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Similar comment, several places

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The existing page used "please" in a bunch of places which is why I followed the same style. Modified everywhere to remove it.


To review older entries, visit the [Changelog archive]({{< ref "/nginxaas-azure/changelog-archive" >}}) section.

## TODO, 2025
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will you resolve this issue before marking this PR as "Ready to Review?"

This commit updates the NGINXaaS documentation to add instructions for fetching certificates via private endpoints.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation product/nginxaas-azure Issues related to NGINX as a Service for Azure
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants