Configure policy sources
NGINX Gateway Fabric supports three policy source types for fetching compiled WAF bundles: F5 NGINX Instance Manager, F5 NGINX One Console, and direct HTTP/HTTPS URLs. For a quick start walkthrough using the HTTP source, see Get started with F5 WAF for NGINX.
Before configuring a policy source, ensure that WAF is enabled on the NginxProxy — either per Gateway or globally via Helm values.
By default, NGINX Gateway Fabric retries transient fetch failures up to 3 times with exponential backoff, and each fetch attempt times out after 30 seconds. You can tune these using theretryAttemptsandtimeoutfields onpolicySourceorlogSource.
Use this option when you manage WAF policies through NGINX Instance Manager. For details on creating and compiling policies in NGINX Instance Manager, see How WAF policy management works and Create a security policy bundle.
Workflow:
- Author and compile a policy in NGINX Instance Manager using the NGINX Instance Manager console or API. Verify that compilation succeeded before proceeding — NGINX Gateway Fabric cannot detect compilation failures in NGINX Instance Manager.
- Create a Secret with your NGINX Instance Manager credentials.
- Create a
WAFPolicyreferencing the compiled policy by name.
NGINX Instance Manager supports HTTP Basic Auth (username and password) or Bearer Token authentication. NGINX Gateway Fabric infers the authentication method from the keys present in the Secret:
kubectl apply -f - <<EOF
apiVersion: v1
kind: Secret
metadata:
name: nim-credentials
type: Opaque
stringData:
username: "<NIM_USERNAME>"
password: "<NIM_PASSWORD>"
EOFTo use a Bearer Token instead, create the Secret with a token key:
kubectl apply -f - <<EOF
apiVersion: v1
kind: Secret
metadata:
name: nim-credentials
type: Opaque
data:
token: <BASE64_ENCODED_TOKEN>
EOFThe following WAFPolicy targets the Gateway and protects all attached routes:
kubectl apply -f - <<EOF
apiVersion: gateway.nginx.org/v1alpha1
kind: WAFPolicy
metadata:
name: gateway-base-protection
spec:
type: NIM
targetRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: gateway
policySource:
# insecureSkipVerify: true # testing only - do not use in production
nimSource:
url: https://nim.example.com
policyName: ngfBlocking
auth:
secretRef:
name: nim-credentials
securityLogs:
- destination:
type: syslog
syslog:
server: syslog-svc.default.svc.cluster.local:514
logSource:
defaultProfile: log_illegal
EOFReplace https://nim.example.com with your NGINX Instance Manager base URL, and ngfBlocking with your compiled policy name.
To skip TLS certificate verification when fetching bundles (for testing only - not recommended for production), uncomment 'insecureSkipVerify: true'.
To pin a specific policy version, usepolicyUIDinstead ofpolicyName. Find the UID in the NGINX Instance Manager console or API. A pinned UID always resolves to the same compiled bundle, so polling should be disabled to avoid unnecessary network requests.
To apply a different policy to a specific route — for example, a data-guard policy — create a route-level WAFPolicy:
kubectl apply -f - <<EOF
apiVersion: gateway.nginx.org/v1alpha1
kind: WAFPolicy
metadata:
name: route-protection-http
spec:
type: NIM
targetRefs:
- group: gateway.networking.k8s.io
kind: HTTPRoute
name: customers
policySource:
nimSource:
url: https://nim.example.com
policyName: ngfDataguard
auth:
secretRef:
name: nim-credentials
securityLogs:
- destination:
type: syslog
syslog:
server: syslog-svc.default.svc.cluster.local:514
logSource:
defaultProfile: log_illegal
EOFThis policy overrides the gateway-level policy for the customers route only. Any other routes attached to the gateway continue to use the gateway-level ngfBlocking policy.
Use this option when you manage WAF policies through F5 NGINX One Console. For details on creating and compiling policies in NGINX One Console, see Manage policies.
Workflow:
- Author and compile a policy in the NGINX One Console console or API. If no compiled bundle for a given policy exists yet, NGINX Gateway Fabric triggers compilation via the NGINX One Console API when it first reconciles the WAFPolicy and waits for it to complete.
- Create a Secret with your NGINX One Console API token.
- Create a
WAFPolicyreferencing the compiled policy.
NGINX One Console uses APIToken authentication. Create a Secret with a token key:
kubectl apply -f - <<EOF
apiVersion: v1
kind: Secret
metadata:
name: n1c-credentials
type: Opaque
data:
token: <BASE64_ENCODED_TOKEN>
EOFThe following example uses policyObjectID to reference the policy directly. You can use policyName instead if you prefer to reference by name:
kubectl apply -f - <<EOF
apiVersion: gateway.nginx.org/v1alpha1
kind: WAFPolicy
metadata:
name: gateway-base-protection
spec:
type: N1C
targetRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: gateway
policySource:
n1cSource:
url: https://<tenant>.console.ves.volterra.io
namespace: default
policyObjectID: pol_12345_WTHGmDEX9qnbVjQ
policyVersionID: pv_Tm__12345oWmJgwxiKlHAg
auth:
secretRef:
name: n1c-credentials
securityLogs:
- destination:
type: syslog
syslog:
server: syslog-svc.default.svc.cluster.local:514
logSource:
n1cSource:
url: https://<tenant>.console.ves.volterra.io
namespace: default
profileObjectID: "lp_8s8uZxLpThWwEGF7LTn_rA"
auth:
secretRef:
name: n1c-credentials
EOFReplace <tenant> with your NGINX One Console tenant hostname. The namespace field refers to the NGINX One Console namespace where the policy resides.
To pin a specific policy version, setpolicyVersionID. A pinned version always resolves to the same compiled bundle, so polling should be disabled to avoid unnecessary network requests. If you use onlypolicyNameorpolicyObjectIDwithout a version pin, the latest compiled bundle is fetched on each reconciliation or poll cycle.
Use this option when you compile WAF policies using the F5 WAF compiler CLI or a CI/CD pipeline and host the resulting bundle on an HTTP/HTTPS server. For details on using the compiler, see Build and use the compiler tool.
For a complete walkthrough including policy compilation and a bundle server deployment, see Get started with F5 WAF for NGINX.
For production environments, you would typically host compiled bundles on an HTTPS server with authentication. See Configure WAF settings for details on adding credentials, custom CA certificates, and checksum verification to your policySource.
When using NGINX Instance Manager or NGINX One Console as your policy source, be aware that neither management console currently displays WAF policy deployments to NGINX Gateway Fabric, nor does it show which compiled bundle versions NGINX Gateway Fabric has fetched.
This is by design: NGINX Gateway Fabric pulls compiled bundles from the management plane using a pull model and deploys them directly in Kubernetes using native Kubernetes manifests, rather than through the NGINX Instance Manager or NGINX One Console console. This workflow ensures that policies can be created, compiled, and made available to NGINX Gateway Fabric via API without requiring console-managed deployment flows.
Policy association visibility for NGINX Instance Manager and NGINX One Console will be added in a future release. In the meantime, use kubectl describe wafpolicy <name> to check deployment status.
Although the NGINX One Console console does not display which policies are deployed to NGINX Gateway Fabric data planes, you can export WAF security events to the NGINX One Console security dashboard. This gives your security operations team visibility into blocked attacks, violations, and traffic patterns directly in the console.
To enable this, configure a securityLogs entry that sends events to the NGINX Agent’s built-in OpenTelemetry collector, which forwards them to NGINX One Console. Use a log profile compiled for the NGINX One Console security dashboard:
kubectl apply -f - <<EOF
apiVersion: gateway.nginx.org/v1alpha1
kind: WAFPolicy
metadata:
name: gateway-base-protection
spec:
targetRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: gateway
type: N1C
policySource:
n1cSource:
url: https://<tenant>.console.ves.volterra.io
namespace: default
policyName: "ngfExample"
auth:
secretRef:
name: n1c-credentials
securityLogs:
- destination:
type: syslog
syslog:
server: localhost:1514
logSource:
n1cSource:
url: https://<tenant>.console.ves.volterra.io
namespace: default
profileName: "secops_dashboard"
auth:
secretRef:
name: n1c-credentials
EOFThe localhost:1514 syslog destination points to the NGINX Agent’s OpenTelemetry collector receiver, which runs as a sidecar in the NGINX Pod. The agent forwards the security events to the NGINX One Console console, where they appear in the security monitoring dashboard.
TheprofileName: "secops_dashboard"log profile must exist in your NGINX One Console namespace. This profile is required for events to appear correctly in the NGINX One Console security dashboard.