Install NGINX Controller
NGINX Controller is NGINX’s control-plane solution that manages the NGINX data plane. Built on a modular architecture, NGINX Controller enables you to manage the entire lifecycle of NGINX Plus, whether it’s deployed as a load balancer, API gateway, or a proxy in a service mesh environment.
To get started, download and run the installer. The installer will:
- Perform prerequisite checks on your system and prompt for any missing dependencies.
- Prompt you to accept the terms of service agreement for NGINX Controller.
- Ask you for a series of parameters including Database, SMTP, Admin user, and FQDN settings.
- Place configuration and log files in appropriate file locations on your host system.
- Add extra repositories to the default package manager like
yumand install required packages.
- Launch NGINX Controller.
Open Source Software Dependencies
NGINX Controller uses a number of open source software packages in the product. You can find information about these dependencies in the NGINX Controller Technical Specifications.
Before installing NGINX Controller, review the following prerequisites.
NGINX Controller should be deployed on a secure, internal network only. We strongly recommend against exposing the NGINX Controller API to the internet.
Things you’ll need before installing NGINX Controller:
controller-installer-<version>.tar.gzpackage, downloaded from the MyF5 Customer Portal;
A license file for NGINX Controller, accessible via the MyF5 Customer Portal;
A dedicated environment (bare metal, VM, or cloud-hosted instance) on which to install NGINX Controller. For the supported Operating Systems and recommended specifications, see the NGINX Controller Technical Specifications guide;
When installing NGINX Controller, you can choose to use the internal PostgreSQL database, or you can provide your own external PostgreSQL database. If you choose to use the embedded, self-hosted database, you can skip this section. Continue reading if you’re providing your own PostgreSQL database.
Refer to the AskF5 KB article K49481224 for instructions on how to install PostgreSQL on CentOS 7 and Ubuntu 18.04 for use with NGINX Controller.
NGINX Controller supports the following versions of PostgreSQL:
- PostgreSQL 12.3 – works with NGINX Controller 3.9 and later.
- PostgreSQL 9.5 – works with NGINX Controller 3.0 and later.
The PostgreSQL database must be accessible from the NGINX Controller server. You can use a DNS-resolvable name or an IP address to connect to the database server (names in
/etc/hostsare not allowed).
Create the user with the
Configure PostgreSQL to allow SSL connections; client certificates should also be used for user authentication.
We strongly discourage disabling SSL for PostgreSQL for security reasons. Consult the Secure TCP/IP Connections with SSL topic in the PostgreSQL manual for instructions and details:
Required Linux Utilities
The following Linux utilities are required by the installation script. The script will let you know if any of the utilities are missing.
bash(4.0 or later)
envsubst(provided by the
gunzip(provided by the
jq(1.5 or later)
To install all of the required packages, run the install command that is appropriate for your OS.
sudo apt-get install awk bash conntrack coreutils curl ebtables gettext ethtool getent grep gzip iproute iptables jq less openssl sed socat tar util-linux
sudo yum install awk bash conntrack coreutils curl ebtables gettext ethtool getent grep gzip iproute iptables jq less openssl sed socat tar util-linux yum-plugin-versionlockNote:
jqpackage is available in the EPEL (Extra Packages for Enterprise Linux) repository. If you don’t have access to the
jqpackage, the NGINX Controller installer will provide local RPM files to install.
NGINX Controller will install Docker as part of the installation process. If you prefer to install Docker on the host yourself, install the following:
- Containerd.io 1.2.10
- Docker Community Edition (CE) 18.09.
To create container images on Red Hat Enterprise Linux, Red Hat requires you to register and entitle the host computer on which you’ll build them. In this case, the host is where you’re installing NGINX Controller. Once the host is registered with Red Hat, you can install Docker from the Red Hat Enterprise Linux Extras repository. See the Red Hat “Getting Started with Containers” guide for instructions.
Regardless of which operating system you use, you’ll need to enable Docker log rotation. This helps to ensure that the logs don’t consume all the free disk space on the server. For instructions on how to enable Docker log rotation, see the Docker guides How to set up log rotation post installation and JSON File logging driver.
Be sure to install NGINX Controller on a dedicated node that does not already have Kubernetes configured.
Before installing NGINX Controller, you must disable swap on the host; this is required by Kubernetes in order for the kubelet to work properly. Refer to your Linux distribution documentation for specific instructions for disabling swap for your system. For more information about this requirement, see the AskF5 knowledge base article K82655201 and the kubeadm installation guide in the Kubernetes documentation.
In NGINX Controller, Core-DNS creates three search domains that are determined at run-time and not in
cluster.local <any host resolv.conf search paths>
In general, changing the settings in NGINX Controller’s underlying Kubernetes cluster is not recommended. However, if you do change the cluster’s Pod config to allow additional search domains, you should not add more than three domains.
Install NGINX Controller
Install NGINX Controller on a dedicated node that does not already have Kubernetes configured. NGINX Controller does not support pre-configured Kubernetes implementations at this time. The installer for NGINX Controller will install and configure Kubernetes for you.
To install NGINX Controller, take the following steps:
Download the NGINX Controller installer package from the MyF5 Customer Portal.
Extract the installer package files:
tar xzf controller-installer-<version>.tar.gz
Run the install script:
cd controller-installer ./install.shNote:
If an HTTPS proxy is configured for the whole system, you should disable the proxy for the IP address and hostname of the host that you’re running the NGINX Controller install script on.
For example, run the command
The installation script walks through a series of steps and asks for the following input:
Config database configuration. Specify whether to use an embedded, self-hosted PostgreSQL database for the config database, or if you want to provide your own external PostgreSQL database. If you choose to provide your own database, make sure you’ve reviewed the PostgreSQL prerequisites.
Config database volume type: Specify the type of volume to use to store the config database: local, NFS, or AWS. We recommend choosing
localfor demo and trial purposes.See Also:
Refer to the NGINX Controller Technical Specifications Guide for more information about the volume options and requirements.
Analytics database volume type: Specify the type of volume to use to store the analytics database: local, NFS, or AWS. We recommend choosing
localfor demo and trial purposes.
EULA: Read the end-user license agreement. Type either
yto accept or
- SMTP Host: Provide the host name or IP address of an SMTP server. This is used to send password recovery emails. For trial purposes, if you don’t need to receive these communications, you can enter a value of “example.com” or something similar.
- SMTP Port: The port of the SMTP server.
- SMTP Authentication: Select
nto authenticate when connecting to the SMTP server.
- Use TLS for SMTP Communication: Select
nto use SSL for SMTP server connections.
- Do not reply email address: The sender’s email address. For example,
- First name: The first name for the initial admin user.
- Last name: The last name for the initial admin user.
- Email address: The contact email address for the initial admin user.
- Password: The initial admin’s password. Passwords must be 6-64 characters long and must include letters and digits.
FQDN: Fully qualified domain name (FQDN) – a resolvable domain name for the NGINX Controller server. You can use the FQDN to access the NGINX Controller web interface. Additionally, the FQDN is used by Controller Agents when connecting to NGINX Controller.
SSL/TLS certificates: Type
yto generate and use self-signed certs for running NGINX Controller over HTTPS, or type
nto provide your own certs.
Log in to NGINX Controller at
https://<Controller-FQDN>/login. Use the admin email address and password that you provided during the installation process.
Once the NGINX Controller installation has completed, you may safely delete the installer package that you downloaded and extracted.
License NGINX Controller
To add a license to NGINX Controller, take the following steps:
https://<Controller-FQDN>/platform/licenseand log in.
In the Upload a license section, select an upload option:
- Upload license file – Locate and select your license file in the file explorer.
- Paste your Association Token or license file – Paste your customer Association Token or the contents of your NGINX Controller license file. These are available on the MyF5 Customer Portal.
Select Save license.
To add a license using the NGINX Controller API, send a PUT request to the
/platform/licenseendpoint. Provide your CAT or NGINX Controller license as a base64-encoded string in the JSON request body.
Back Up Cluster Config and Encryption Keys
After installing NGINX Controller, you should back up the cluster config and encryption keys. You’ll need these if you ever need to restore the NGINX config database on top of a new NGINX Controller installation.
To back up the NGINX Controller cluster configuration and encryption keys, use the
/opt/nginx-controller/helper.sh cluster-config save
The file is saved to
For instructions on how to restore the cluster config, refer to the topic Backup & Restore Cluster Config and Encryption Keys.
Manage the NGINX Controller Process
To start, stop, restart, and check the status of the NGINX Controller process, use the
helper.sh script found at
./helper.sh controller start ./helper.sh controller stop ./helper.sh controller restart ./helper.sh controller status
Update NGINX Controller
To update the NGINX Controller software, take the steps below. When complete, you must also update the Controller Agent software on each monitored NGINX Plus instance.
We strongly recommend that you make a backup of the following information before proceeding, to avoid potential data and/or configuration loss:
Back up the NGINX Controller cluster configuration and encryption keys. These are required if you need to restore the config database on top of a new installation of NGINX Controller.
/opt/nginx-controller/helper.sh cluster-config save
Back up the Controller Agent
agent.conffile by copying it from its current location to a new location. This file is present on each NGINX Plus instance.
cp /etc/controller-agent/agent.conf <temporary location>
Download the installer package from the MyF5 Customer Portal.
Extract the installer package files:
tar xzf controller-installer-<version>.tar.gz
Run the update script:
cd controller-installer ./update.sh
If you are logged in to NGINX Controller using a web browser, sign out and log in again.
- To sign out, select your username in the upper right-hand corner, and then select “Sign Out”. For optimal performance, also flush your browser cache.
Restore your backup
cp <temporary location>/agent.conf /etc/controller-agent/
Update the Controller Agent on each NGINX Plus instance. For instructions, see the NGINX Controller Agent Installation Guide in the NGINX Controller onboard documentation.
After you upgrade NGINX Controller, you also need to update the NGINX Controller Agent to the latest version.
Uninstall NGINX Controller
To uninstall NGINX Controller, run the uninstall script:
Install NGINX Controller Agent
Install the Controller Agent on each NGINX Plus instance that you want to manage and monitor.
Take the following steps to add an existing Instance to NGINX Controller:
Open the NGINX Controller user interface and log in.
Select the NGINX Controller menu icon, then select Infrastructure.
On Infrastructure menu, select Instances.
On the Instances Overview page, select Create to add an Instance.
On the Create Instance page, select Add an existing instance.
Add a name for the Instance. If you don’t provide a name, the hostname of the Instance is used by default.
To add the Instance to an existing Location, select a Location from the list. Or select Create New to create a Location.Note:
Once set, the Location for an Instance cannot be changed. If you need to change or remove the Location for an Instance, you must remove the Instance from NGINX Controller, and then add it back.
(Optional) By default, registration of NGINX Plus Instances is performed over a secure connection. To use self-signed certificates with the Controller Agent, select Allow insecure server connections to NGINX Controller using TLS. For security purposes, we recommend that you secure the Controller Agent with signed certificates when possible.
Use SSH to connect and log in to the NGINX Instance that you want to connect to NGINX Controller.
wgetcommand that’s shown in the Installation Instructions section on the NGINX Instance to download and install the Controller Agent package. The
-loptions for the
install.shscript specify the Instance name and Location, respectively.Note:
Make sure you enter the commands to download and run the
install.shscript on the NGINX Plus system, and not on the NGINX Controller.
NGINX Controller 3.6 and earlier require Python 2.6 or 2.7. You’ll be prompted to install Python if it’s not installed already. Python is not required for NGINX Controller 3.7 and later.
After a few minutes, the NGINX Instance will appear on the Instances Overview page.
If NGINX Controller isn’t working how you expect, see the knowledge base article K03263142 for installation troubleshooting procedures.
Create a Support Package
You can create a support package for NGINX Controller that you can use to diagnose issues.
You will need to provide a support package if you open a ticket with NGINX Support via the MyF5 Customer Portal.
Take the following steps to create a support package:
Open a secure shell (SSH) connection to the NGINX Controller host and log in as an administrator.
helper.shutility with the
The support package is saved to:
Run the following command on the machine where you want to download the support package to:
scp <username>@<controller-host-ip>:/var/tmp/supportpkg-<timestamp>.tar.gz /local/path
Support Package Details
The support package is a tarball that includes NGINX Controller configuration information, logs, and system command output. Sensitive information, including certificate keys, is not included in the support package.
The support package gathers information from the following locations:
. ├── database │ ├── common.dump - full dump of the common database │ ├── common.dump_stderr - any errors when dumping the database │ ├── common-apimgmt-api-client-api-keys.txt - contents of apimgmt_api_client_api_keys table from the common database │ ├── common-apimgmt-api-client-groups.txt - contents of apimgmt_api_client_groups table from the common database │ ├── common-email-verification.txt - contents of email_verification table from the common database │ ├── common-oauth-clients.txt - contents of oauth_clients table from the common database │ ├── common-settings-license.txt - contents of settings_license table from the common database │ ├── common-settings-nginx-plus.txt - contents of settings_nginx_plus table from the common database │ ├── common-table-size.txt - list of all tables and their size in the common database │ ├── data-table-size.txt - list of all tables and their size in the data database │ ├── postgres-database-size.txt - size of every database │ ├── postgres-long-running-queries.txt - all queries running longer than 10 seconds │ ├── system.dump - full dump of the system database │ ├── system-account-limits.txt - contents of account_limits table from the system database │ ├── system-accounts.txt - contents of accounts table from the system database │ ├── system-deleted-accounts.txt - contents of deleted_accounts table from the system database │ ├── system-deleted-users.txt - contents of deleted_users table from the system database │ ├── system-users.txt - contents of users table from the system database │ └── system-table-size.txt - list of all tables and their size in the system database ├── k8s - output of `kubectl cluster-info dump -o yaml` augmented with some extra info │ ├── apiservices.txt - output of `kubectl get apiservice` │ ├── kube-system - contents of the kube-system namespace │ │ ├── coredns-5c98db65d4-6flb9 │ │ │ ├── desc.txt - pod description │ │ │ ├── logs.txt - current logs │ │ │ └── previous-logs.txt - previous logs, if any │ │ ├── ... │ │ ├── daemonsets.yaml - list of daemonsets │ │ ├── deployments.yaml - list of deployments │ │ ├── events.yaml - all events in this namespace │ │ ├── namespace.yaml - details of the namespace, including finalizers │ │ ├── pods.txt - output of `kubectl get pods --show-kind=true -o wide` │ │ ├── pods.yaml - list of all pods │ │ ├── replicasets.yaml - list of replicasets │ │ ├── replication-controllers.yaml - list of replication controllers │ │ ├── resources.txt - all Kubernetes resources in this namespace │ │ └── services.yaml - list of services │ ├── nginx-controller - contents of the nginx-controller namespace │ │ ├── apigw-8fb64f768-9qwcm │ │ │ ├── desc.txt - pod description │ │ │ ├── logs.txt - current logs │ │ │ └── previous-logs.txt - previous logs, if any │ │ ├── ... │ │ ├── daemonsets.yaml - list of daemonsets │ │ ├── deployments.yaml - list of deployments │ │ ├── events.yaml - all events in this namespace │ │ ├── namespace.yaml - details of the namespace, including finalizers │ │ ├── pods.txt - output of `kubectl get pods --show-kind=true -o wide` │ │ ├── pods.yaml - list of all pods │ │ ├── replicasets.yaml - list of replicasets │ │ ├── replication-controllers.yaml - list of replication controllers │ │ ├── resources.txt - all Kubernetes resources in this namespace │ │ ├── services.yaml - list of services │ ├── nodes.txt - output of `kubectl describe nodes` │ ├── nodes.yaml - list of nodes │ ├── resources.txt - all non-namespaced Kubernetes resources (including PersistentVolumes) │ └── version.yaml - Kubernetes version ├── logs - copy of /var/log/nginx-controller/ │ └── nginx-controller-install.log ├── os │ ├── cpuinfo.txt - output of `cat /proc/cpuinfo` │ ├── df-h.txt - output of `df -h` │ ├── df-i.txt - output of `df -i` │ ├── docker-container-ps.txt - output of `docker container ps` │ ├── docker-images.txt - output of `docker images` │ ├── docker-info.txt - output of `docker info` │ ├── docker-stats.txt - output of `docker stats --all --no-stream` │ ├── docker-version.txt - output of `docker version` │ ├── du-mcs.txt - output of `du -mcs /opt/nginx-controller/* /var/log /var/lib` │ ├── env.txt - output of `env` │ ├── firewall-cmd.txt - output of `firewall-cmd --list-all` │ ├── free.txt - output of `free -m` │ ├── hostname-all-fqdns.txt - output of `hostname --all-fqdns` │ ├── hostname-fqdn.txt - output of `hostname --fqdn` │ ├── hostname.txt - output of `hostname` │ ├── hostsfile.txt - output of `cat /etc/hosts` │ ├── ip-address.txt - output of `ip address` │ ├── ip-neigh.txt - output of `ip neigh` │ ├── ip-route.txt - output of `ip route` │ ├── iptables-filter.txt - output of `iptables -L -n -v` │ ├── iptables-mangle.txt - output of `iptables -L -n -v -t mangle` │ ├── iptables-nat.txt - output of `iptables -L -n -v -t nat` │ ├── iptables-save.txt - output of `iptables-save` │ ├── journal-kubelet.txt - output of `journalctl -q -u kubelet --no-pager` │ ├── lspci.txt - output of `lspci -vvv` │ ├── netstat-nr.txt - output of `netstat -nr` │ ├── ps-faux.txt - output of `ps faux` │ ├── pstree.txt - output of `pstree` │ ├── ps.txt - output of `ps aux --sort=-%mem` │ ├── resolvconf.txt - output of `cat /etc/resolv.conf` │ ├── selinux-mode.txt - output of `getenforce` │ ├── ss-ltunp.txt - output of `ss -ltunp` │ ├── swapon.txt - output of `swapon -s` │ ├── sysctl.txt - output of `sysctl -a --ignore` │ ├── systemd.txt - output of `journalctl -q --utc` │ ├── top.txt - output of `top -b -o +%CPU -n 3 -d 1 -w512 -c` │ ├── uname.txt - output of `uname -a` │ ├── uptime.txt - output of `cat /proc/uptime` │ └── vmstat.txt - output of `cat /proc/vmstat` ├── timeseries │ ├── table-sizes.stat - stat table containing controller table sizes │ ├── events.csv - events table dump in csv │ ├── events.sql - events table schema │ ├── metrics_1day.csv - metrics_1day table dump in csv │ ├── metrics_1day.sql - metrics_1day table schema │ ├── metrics_1hour.csv - metrics_1hour table dump in csv │ ├── metrics_1hour.sql - metrics_1hour table schema │ ├── metrics_5min.csv - metrics_5min table dump in csv │ ├── metrics_5min.sql - metrics_5min table schema │ ├── metrics.csv - metrics table dump in csv │ ├── metrics.sql - metrics table schema │ ├── system-asynchronous-metrics.stat - shows info about currently executing events or consuming resources │ ├── system-events.stat - information about the number of events that have occurred in the system │ ├── system-metrics.stat - system metrics │ ├── system-parts.stat - information about parts of a table in the MergeTree family │ ├── system-settings.stat - information about settings that are currently in use │ └── system-tables.stat - information about all the tables └── version.txt - Controller version information
This documentation applies to the following versions of NGINX Controller Documentation:
3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 3.12.