Install NGINX Ingress Controller with App Protect
Note: The NGINX Kubernetes Ingress Controller integration with NGINX App Protect requires the use of NGINX Plus.
This document provides an overview of the steps required to use NGINX App Protect with your NGINX Ingress Controller deployment. You can visit the linked documents to find additional information and instructions.
You can also install the Ingress Controller with App Protect by using Helm. Use the
controller.appprotect.* parameters of the chart.
Take the steps below to create the Docker image that you’ll use to deploy NGINX Ingress Controller with App Protect in Kubernetes.
When running the
makecommand to build the image, be sure to use the
debian-image-nap-plustarget. For example:
make debian-image-nap-plus PREFIX=<your Docker registry domain>/nginx-plus-ingress
Alternatively, if you want to run on an OpenShift cluster, you can use the
If you intend to use external references in NGINX App Protect policies, you may want to provide a custom CA certificate to authenticate with the hosting server. In order to do so, place the
*.crtfile in the build folder and uncomment the lines that follow this comment:
#Uncomment the lines below if you want to install a custom CA certificate
Take the steps below to set up and deploy the NGINX Ingress Controller and App Protect module in your Kubernetes cluster.
Important: You must have an admin role to configure RBAC in your Kubernetes cluster.
Enable the App Protect module by adding the
enable-app-protectcli argument to your Deployment or DaemonSet file.
For more information, see the Configuration guide and the NGINX Ingress Controller with App Protect examples on GitHub.