Today at NGINX Sprint 2.0, we're announcing how we'll support our vision for the future of moderns app with a bigger presence in the open source community, including participation in the community Kubernetes project, new OSS projects, and the Modern Apps Reference Architecture.
NGINX Unit 1.23.0 and 1.24.0 introduce support for the SNI extension to TLS, definition of OpenSSL configuration commands, MIME filtering and path restrictions for static content, and multiple Python scripts in one app. Also, you no longer need to modify Node.js apps to run them in Unit.
The NGINX Controller App Security add-on for Controller API Management provides an app-centric, self-service way for app teams to boost their API security with integrated WAF protection. Security teams can still define policies and monitor APIs for compliance.
NGINX App Protect Denial of Service (DoS) protects your modern applications against sophisticated application-level (Layer 7) DoS attacks, including GET and POST flooding, Slowloris, Slow read, slow POST, Challenge Collapsar, NAT-disguised, and targeted SSL/TLS attacks.
How to Visualize NGINX Plus with Prometheus and Grafana
The built-in live activity monitoring dashboard tracks NGINX Plus metrics in real time, and can get additional insight from visualizations of performance over time. In this demo and blog we show how to generate time-series graphs of NGINX Plus metrics using Prometheus and Grafana.
Implementing OpenID Connect Authentication for Kubernetes with Okta and NGINX Ingress Controller
The Ingress controller is an ideal location for centralized authentication and authorization in Kubernetes. We show how to implement single sign-on with NGINX Ingress Controller as the relaying party and Okta as the identity provider in the OIDC Authorization Code Flow.
Reducing Kubernetes Costs by 70% in the Cloud with NGINX, Opsani, and Prometheus
With Opsani you can optimize NGINX Ingress Controller performance in the cloud. Powered by machine learning, Opsani processes metrics collected by Prometheus to ensure that the right amount of resources is consumed for higher performance and lower cost.
A Guide to Choosing an Ingress Controller, Part 3: Open Source vs. Default vs. Commercial
As you evaluate Ingress controllers, you’ll notice they fall into three categories: open source, default, or commercial. Learn the pros and cons for each here.
Bringing F5 and NGINX WAF Policies into Controller App Security
With NGINX Controller App Security for version 3.20 of the Application Delivery Module, you can now import your custom F5 Advanced WAF and NGINX App Protect WAF policies and distribute them across all your managed deployments. We call this Bring Your Own NGINX App Protect WAF Policy.
A Guide to Choosing an Ingress Controller, Part 2: Risks and Future-Proofing
Learn about risks you might introduce by selecting the wrong Ingress controller, and key areas where you can future-proof your selection.
Building Smaller Container Images
Small is beautiful when it comes to containers in test and dev environments: they take less time to build, use less memory, and have a smaller attack surface. We explore tools and provides instructions for building images that are a small as possible.
Protecting Your Apps From Layer 7 Dos Attacks with NGINX App Protect Denial of Service
Modern DoS attacks against application logic at Layer 7 are hidden in encrypted channels, making them hard to detect. NGINX App Protect Denial of Service measures client behavior and server stress to detect and mitigate Layer 7 DoS attacks.
A Guide to Choosing an Ingress Controller, Part 1: Identify Your Requirements
An Ingress controller can be one of the most powerful tools in your Kubernetes stack. Learn how to determine your ingress requirements so you can select the best option.
Safer Configuration Management with NGINX Controller
NGINX Controller makes app deployments safer and more scalable by ensuring that all functional components and associated certificates are configured correctly and consistently. Learn how its configuration object model ensures that changes don't harm availability or performance.