Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

N1C CSG unmanaged certificates#1597

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Draft
sylwang wants to merge3 commits intomain
base:main
Choose a base branch
Loading
fromcsg-unmanaged-cert-doc
Draft

Conversation

@sylwang
Copy link
Contributor

Proposed changes

Checklist

Before sharing this pull request, I completed the following checklist:

Footnotes

  1. Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to thestyle guide for guidance about placeholder content.

@sylwangsylwang requested review froma team ascode ownersDecember 17, 2025 22:45
@github-actionsgithub-actionsbot added documentationImprovements or additions to documentation product/nginx-one-consoleIssues related to NGINX One Console labelsDec 17, 2025
@github-actions
Copy link

Deploy Preview will be available once build job completes!

NameLink
😎 Deploy Previewhttps://frontdoor-test-docs.nginx.com/previews/docs/1597/

@mjang
Copy link
Contributor

@sylwang overall, this is excellent. I plan to comment on a few details.

But first, a "big picture" question. I know that you can have unmanaged certs with an instance. I'm tempted to recommend moving unmanaged-certificates.md to the content/nginx-one-console/nginx-configs/certificates directory

sylwang reacted with thumbs up emoji

Copy link
Contributor

@mjangmjang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Hi@sylwang , you're an excellent writer. My suggested changes mostly relate to F5 styles.


Unmanaged certificates are SSL/TLS certificates that you install and manage manually on NGINX instances. Unlike managed certificates that are uploaded and distributed through the NGINX One Console, unmanaged certificates are installed directly on individual instances and referenced by their file paths in NGINX configuration files. You are responsible for distributing, updating, and maintaining these certificates across your infrastructure.

###Unmanaged certificates in Config Sync Groups
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Markdown format rule (look up MD022)

Suggested change
###Unmanaged certificates in Config Sync Groups
###Unmanaged certificates in Config Sync Groups

Unmanaged certificates are SSL/TLS certificates that you install and manage manually on NGINX instances. Unlike managed certificates that are uploaded and distributed through the NGINX One Console, unmanaged certificates are installed directly on individual instances and referenced by their file paths in NGINX configuration files. You are responsible for distributing, updating, and maintaining these certificates across your infrastructure.

###Unmanaged certificates in Config Sync Groups
Config Sync Groups (CSGs) in NGINX One Console ensure configuration consistency across connected NGINX instances. While managed certificates uploaded through the Console are automatically synchronized and tracked, unmanaged certificates follow a different model that provides visibility without automated management.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Moving phrase to the start of the next paragraph.

Suggested change
Config Sync Groups (CSGs) in NGINX One Console ensure configuration consistency across connected NGINX instances. While managed certificates uploaded through the Console are automatically synchronized and tracked, unmanaged certificates follow a different model that provides visibility without automated management.
Config Sync Groups (CSGs) in NGINX One Console ensure configuration consistency across connected NGINX instances. While managed certificates uploaded through the Console are automatically synchronized and tracked, unmanaged certificates follow a different model.

When you use unmanaged certificates in a CSG, NGINX One Console does not synchronize the certificate files themselves. However, it tracks their metadata to help you verify consistency across instances and understand the state of your certificates.

##How unmanaged certificates work in Config Sync Groups

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Suggestion (not a requirement): add an intro to the subsections that follow:

Suggested change
If you have unmanaged certificates with CSGs, consider the following factors:


##Requirements for unmanaged certificates

To use unmanaged certificates effectively in Config Sync Groups, you must:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Suggested change
To use unmanaged certificates effectively in Config Sync Groups, you must:
To use unmanaged certificates effectively in Config Sync Groups, you must address these issues:

-**User responsibility**: Take full responsibility for certificate distribution, updates, and consistency

##Important considerations

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Suggested change
NGINX One Console still helps you track unmanaged certificates:


If certificate file paths differ between instances:

- CSG publication may fail
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Just checking. Is it CSG or certificate publication that can fail?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

If it is CSG publication that can fail, I'd change current line 44 (comment added there)

###Synchronization limitations

-**No automated sync**: Unmanaged certificates are not synchronized by the Console
-**Manual updates**: You must manually update certificates on each instance when they expire or need rotation
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

For consistency:

Suggested change
-**Manual updates**:You must manuallyupdate certificateson each instance when they expire or need rotation
-**Manual updates**:Certificates mustbemanuallyupdatedon each instance


Monitor the**Config Sync Status** column. It can help you ensure that your configurations are consistently applied across all instances in a group.

##Working with unmanaged certificates
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

We avoid gerunds (-ing words) in section titles. Exception: troubleshooting

Suggested change
##Working with unmanaged certificates
##Work with unmanaged certificates

- Certificates are identified by their content and associated instance
- The CSG displays separate certificate entries in the configuration

If certificate file paths differ between instances:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

If it's actually CSG publication that may fail, I suggest revising this to:

Suggested change
Ifcertificatefile paths differbetween instances:
Ifcertificates are identical, but theirfile paths differby instance:


###Certificate inconsistencies

If you see multiple entries for what should be the same certificate:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I see you've numbered these options. In general, I number steps when users have to do them, in order.

If ordering is not required, I'd replace the numbers with bullets

@mjang
Copy link
Contributor

mjang commentedDec 19, 2025
edited
Loading

FYI, I'll be working Dec 22, 23, 29, 30, 31. I might be the only writer available during these days -- and I have no problem merging on my own, once we've addressed these suggestions.

@mjangmjang marked this pull request as draftDecember 19, 2025 22:29
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@mjangmjangmjang left review comments

At least 2 approving reviews are required to merge this pull request.

Assignees

No one assigned

Labels

documentationImprovements or additions to documentationproduct/nginx-one-consoleIssues related to NGINX One Console

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@sylwang@mjang

[8]ページ先頭

©2009-2025 Movatter.jp