-
Notifications
You must be signed in to change notification settings - Fork 113
feat: NGINXaaS - Certificate Fetch via Private Endpoint support #1137
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
- Access to AKV through a public or private endpoint. If public access to AKV needs to be restricted, | ||
either [configure Network Security Perimeter]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#configure-network-security-perimeter-nsp" >}}) or [integrate with a private endpoint]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#integrate-with-private-endpoint" >}}) | ||
|
||
{{< call-out "important" >}}**Known Issue:** Updating managed identity on NGINXaaS deployment after creation may result in the managed identity not being correctly delegated to the dataplane, which can cause certificate fetch failures when public access is disabled. To avoid this issue, ensure that the managed identity that has access to AKV is assigned during NGINXaaS deployment creation. {{< /call-out >}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is difficult to read. I might say:
{{< call-out "important" >}}**Known Issue:** Updating managed identity on NGINXaaS deployment after creation may result in the managed identity not being correctly delegated to the dataplane, which can cause certificate fetch failures when public access is disabled. To avoid this issue, ensure that the managed identity that has access to AKV is assigned during NGINXaaS deployment creation. {{< /call-out >}} | |
{{< call-out "important" >}}**Known Issue:** When public access is disabled, you may see certificate fetch failures. This can happen when you update managed identity on NGINXaaS deployment after creation. This may result in the managed identity not being correctly delegated to the dataplane. | |
To avoid this issue, when you create an NGINXaaS deployment, make sure that the managed identity that has access to AKV is assigned. {{< /call-out >}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Alternative: if this is an edge case, set this up as a KB article.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You are right perhaps the prerequisites page is not the best place to add this info. Move this to the known-issues page.
1. Get the resource ID of the key vault. | ||
Please ensure the following environment variables are set before copying the below Azure CLI command. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Our style guide suggests that you shouldn't use please (unless the problem is "our fault"). And I think you can be more direct:
Please ensure the following environment variables are set before copying the below Azure CLI command. | |
Set the following environment variables before copying the following Azure CLI command. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Similar comment, several places
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The existing page used "please" in a bunch of places which is why I followed the same style. Modified everywhere to remove it.
|
||
To review older entries, visit the [Changelog archive]({{< ref "/nginxaas-azure/changelog-archive" >}}) section. | ||
|
||
## TODO, 2025 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will you resolve this issue before marking this PR as "Ready to Review?"
This commit updates the NGINXaaS documentation to add instructions for fetching certificates via private endpoints.
This commit updates the NGINXaaS documentation to add instructions for fetching certificates via private endpoints.
Proposed changes
Checklist
Before sharing this pull request, I completed the following checklist:
Footnotes
Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to the style guide for guidance about placeholder content. ↩