Skip to content

Commit b20d91c

Browse files
committed
chore: Refactored icon usage to use new shortcode
1 parent bc55551 commit b20d91c

File tree

52 files changed

+237
-155
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+237
-155
lines changed

_banners/agent-v3-release.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
{{< banner "notice" "NGINX Agent 3.0 is now available" >}}
22

3+
The documentation in this section is for **NGINX Agent version 2.x**. For NGINX Agent 3.x content visit the [NGINX One Console documentation]({{< ref "/nginx-one/agent/" >}})
34

4-
F5 NGINX One Console and NGINX Instance Manager (NIM) do not currently support Agent 3.x. If you are using NGINX One Console or NGINX Instance Manager in your environment, upgrade to the latest Agent 2.x version by following the [Upgrade NGINX Agent](/nginx-agent/installation-upgrade/upgrade/) guide.
5+
F5 NGINX Instance Manager (NIM) does not currently support NGINX Agent 3.x. NGINX Instance Manager customers can upgrade to the latest NGINX Agent 2.x version by following the [Upgrade NGINX Agent](/nginx-agent/installation-upgrade/upgrade/) guide.
56

67
Please see the [Technical specifications](/nginx-agent/technical-specifications/) for product compatibility.
78

content/agent/installation-upgrade/container-environments/docker-images.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ git clone git@github.com:nginx/agent.git
7777

7878
### Download the NGINX Plus certificate and key {#myf5-download}
7979

80-
{{< fa "circle-info" "text-muted" >}} **This step is required if you are using NGINX Plus. If you are using NGINX open source, you can skip this section.**
80+
{{< icon "circle-info" "text-muted" >}} **This step is required if you are using NGINX Plus. If you are using NGINX open source, you can skip this section.**
8181

8282
In order to build a container image with NGINX Plus, you must provide the SSL certificate and private key files provided with your NGINX Plus license. These files grant access to the package repository from which the script will download the NGINX Plus package.
8383

content/controller/platform/access-management/manage-active-directory-auth-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Take the steps below to create a new Authentication Provider by using the NGINX
8080

8181
## Set up an Microsoft Entra Auth Provider {#set-up-entra}
8282

83-
{{< fa "arrow-circle-right" >}} **Introduced in NGINX Controller ADC v3.22**
83+
{{< icon "arrow-circle-right" >}} **Introduced in NGINX Controller ADC v3.22**
8484

8585
In the previous section, you selected **Microsoft Entra** from the **Authentication Provider Type** list. Next, you'll set up the Auth Provider so it can connect to Microsoft Entra.
8686

content/includes/agent/about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ Additionally, it collects system-level data, including CPU usage, memory consump
4040
deep observability into NGINX's behavior, enabling teams to troubleshoot issues effectively, optimize performance, and
4141
maintain high availability.
4242

43-
Collected metrics can be seamlessly exported to NGINX One Console or integrated with third-party data aggregators.
43+
By default, the OpenTelemetry Collector is configured to send metrics to NGINX One Console.

content/mesh/guides/monitoring-and-tracing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ To use NGINX Service Mesh with your Prometheus deployment:
5757
If you are deploying NGINX Plus Ingress Controller with the NGINX Service Mesh, add the `nginx-plus-ingress` scrape config as well.
5858
Consult the [Metrics]( {{< ref "/mesh/tutorials/kic/deploy-with-kic.md#nginx-plus-ingress-controller-metrics" >}} ) section of the NGINX Ingress Controller Deployment tutorial for more information about the metrics collected.
5959

60-
- {{< fa "download" >}} {{< link "/examples/nginx-mesh-sidecars-scrape-config.yaml" "`nginx-mesh-sidecars-scrape-config.yaml`" >}}
61-
- {{< fa "download" >}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml" "`nginx-plus-ingress-scrape-config.yaml`" >}}
60+
- {{< icon "download" >}} {{< link "/examples/nginx-mesh-sidecars-scrape-config.yaml" "`nginx-mesh-sidecars-scrape-config.yaml`" >}}
61+
- {{< icon "download" >}} {{< link "/examples/nginx-plus-ingress-scrape-config.yaml" "`nginx-plus-ingress-scrape-config.yaml`" >}}
6262

6363
{{< see-also >}}
6464
For more information on how to view and understand the metrics that we track, see our [Prometheus Metrics]({{< ref "prometheus-metrics.md" >}}) guide.

content/mesh/guides/secure-traffic-mtls.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ SPIRE uses a mechanism called "Upstream Authority" to interface with PKI systems
6060
In order to use a proper PKI, you must first choose one of the upstream authorities NGINX Service Mesh supports:
6161

6262
- [disk](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_disk.md): Requires certificates and private key be on disk.
63-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/disk.yaml" "disk.yaml" >}}
63+
- Template: {{< icon "download" >}} {{< link "/examples/upstream-ca/disk.yaml" "disk.yaml" >}}
6464

6565
- The minimal configuration to successfully deploy the mesh using the `disk` upstream authority looks like this:
6666

@@ -73,7 +73,7 @@ In order to use a proper PKI, you must first choose one of the upstream authorit
7373
```
7474
7575
- [aws_pca](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_aws_pca.md): Uses [Amazon Certificate Manager Private Certificate Authority (ACM PCA)](https://docs.aws.amazon.com/acm-pca/latest/userguide/PcaWelcome.html) to manage certificates.
76-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/aws_pca.yaml" "aws_pca.yaml" >}}
76+
- Template: {{< icon "download" >}} {{< link "/examples/upstream-ca/aws_pca.yaml" "aws_pca.yaml" >}}
7777
7878
- Here is the minimal configuration to deploy the mesh using the `aws_pca` upstream authority:
7979

@@ -102,7 +102,7 @@ In order to use a proper PKI, you must first choose one of the upstream authorit
102102
{{< /note >}}
103103

104104
- [awssecret](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_awssecret.md): Loads CA credentials from AWS SecretsManager.
105-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/awssecret.yaml" "awssecret.yaml" >}}
105+
- Template: {{< icon "download" >}} {{< link "/examples/upstream-ca/awssecret.yaml" "awssecret.yaml" >}}
106106

107107
- Here is the minimal configuration to deploy the mesh using the `awssecret` upstream authority:
108108

@@ -120,10 +120,10 @@ In order to use a proper PKI, you must first choose one of the upstream authorit
120120
{{< /important >}}
121121

122122
- [vault](https://github.com/spiffe/spire/blob/v0.12.3/doc/plugin_server_upstreamauthority_vault.md): Uses Vault PKI Engine to manage certificates.
123-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/vault.yaml" "vault.yaml" >}}
123+
- Template: {{< icon "download" >}} {{< link "/examples/upstream-ca/vault.yaml" "vault.yaml" >}}
124124

125125
- [cert-manager](https://github.com/spiffe/spire/blob/v1.0.0/doc/plugin_server_upstreamauthority_cert_manager.md): Uses an instance of `cert-manager` running in Kubernetes to request intermediate signing certificates for SPIRE server.
126-
- Template: {{< fa "download" >}} {{< link "/examples/upstream-ca/cert-manager.yaml" "cert-manager.yaml" >}}
126+
- Template: {{< icon "download" >}} {{< link "/examples/upstream-ca/cert-manager.yaml" "cert-manager.yaml" >}}
127127

128128
- Here is the minimal configuration to deploy the mesh using the `cert-manager` upstream authority:
129129

@@ -247,7 +247,7 @@ spire-server-0 2/2 Running 0 24h
247247

248248
We'll use the [Istio `bookinfo`](https://istio.io/docs/examples/bookinfo/) example to test that traffic is, in fact, encrypted with mTLS enabled.
249249

250-
- {{< fa "download" >}} {{< link "/examples/bookinfo.yaml" "`bookinfo.yaml`" >}}
250+
- {{< icon "download" >}} {{< link "/examples/bookinfo.yaml" "`bookinfo.yaml`" >}}
251251

252252
1. Enable [automatic sidecar injection]( {{< ref "/mesh/guides/inject-sidecar-proxy.md#automatic-proxy-injection" >}} ) for the `default` namespace.
253253
1. Deploy the `bookinfo` application:

content/mesh/guides/smi-traffic-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ In this example, `GET` requests to the destination service from `source-1` will
170170
The burst of 10 and a delay of `nodelay` means that 10 excess requests over the rate will be forwarded to the destination service immediately.
171171
Requests from sources other than `source-1`, or requests from `source-1` that are _not_ `GET` requests, will not be rate limited.
172172

173-
> You can download the schema for the RateLimit CRD here: {{< fa "download" >}} [`rate-limit-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/ratelimit.yaml)
173+
> You can download the schema for the RateLimit CRD here: {{< icon "download" >}} [`rate-limit-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/ratelimit.yaml)
174174

175175
The rate limit spec contains the following fields:
176176

content/mesh/reference/api-usage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ kubectl edit meshconfig nginx-mesh-config -n nginx-mesh
2222

2323
This will open your default text editor to make changes. To see the configurable fields, download the custom resource definition:
2424

25-
{{< fa "download" >}} [`meshconfig-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/meshconfig.yaml)
25+
{{< icon "download" >}} [`meshconfig-schema.yaml`](https://github.com/nginxinc/nginx-service-mesh/blob/main/helm-chart/crds/meshconfig.yaml)
2626

2727
{{< warning >}}
2828
If the `meshconfig` resource is deleted, or the `spec.meshConfigClassName` field is removed or changed, then the global mesh configuration cannot be updated, and unexpected behavior may occur.

content/mesh/tutorials/accesscontrol-walkthrough.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,10 @@ The access control mode can be [set to `deny` at the global level]( {{< ref "/me
1919
1. Enable [automatic sidecar injection]( {{< ref "/mesh/guides/inject-sidecar-proxy.md#automatic-proxy-injection" >}} ) for the `default` namespace.
2020
1. Download all of the example files:
2121

22-
- {{< fa "download" >}} {{< link "/examples/dest-svc.yaml" >}}
23-
- {{< fa "download" >}} {{< link "/examples/access.yaml" >}}
24-
- {{< fa "download" >}} {{< link "/examples/driver-allowed.yaml" >}}
25-
- {{< fa "download" >}} {{< link "/examples/driver-disallowed.yaml" >}}
22+
- {{< icon "download" >}} {{< link "/examples/dest-svc.yaml" >}}
23+
- {{< icon "download" >}} {{< link "/examples/access.yaml" >}}
24+
- {{< icon "download" >}} {{< link "/examples/driver-allowed.yaml" >}}
25+
- {{< icon "download" >}} {{< link "/examples/driver-disallowed.yaml" >}}
2626

2727
## Objectives
2828

@@ -352,7 +352,7 @@ Traffic can be filtered via sets that are classified via ServiceAccounts. But [T
352352
For exact matches, be sure to use regular expression anchors. To exactly match the header value `hello`, be sure to use `^hello$`; otherwise, additional headers that contain the sequence `hello` will be allowed.
353353
{{< /tip>}}
354354
{{< tip>}}
355-
For an expanded example showing configuration for an application using a headless service, checkout our example for clustered application traffic policies {{< fa "download" >}} {{< link "/examples/clustered-application.yaml" >}}
355+
For an expanded example showing configuration for an application using a headless service, checkout our example for clustered application traffic policies {{< icon "download" >}} {{< link "/examples/clustered-application.yaml" >}}
356356
{{< /tip>}}
357357

358358
## Resources

content/mesh/tutorials/deploy-example-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ type:
1414

1515
In this tutorial, we will use the `bookinfo` example app Deployment.
1616

17-
- {{< fa "download" >}} {{< link "examples/bookinfo.yaml" "examples/bookinfo.yaml" >}}
17+
- {{< icon "download" >}} {{< link "examples/bookinfo.yaml" "examples/bookinfo.yaml" >}}
1818

1919
{{< note >}}
2020
Notice in the above yaml:

0 commit comments

Comments
 (0)