Skip to content

Conversation

@ADubhlaoich
Copy link
Member

Proposed changes

This commit reworks the manifest installation document to instead become
a folder, with each individual page within covering exactly one use
case. The new structure guides a user completely from end to end on the
process necessary for installing NGINX Gateway Fabric NGINX Open Source
or NGINX Plus without using multiple documents.

It also includes general improvements to specification discoverability,
allowing readers to more easily find what parts of the Gateway API
specification are supported and what to expect from future releases.

Checklist

Before sharing this pull request, I completed the following checklist:

Footnotes

  1. Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to the style guide for guidance about placeholder content.

vepatel and others added 16 commits September 30, 2025 16:38
…s, Configmap, VirtualServer (#1468)

* feat: Add client-body-buffer-size directive to NIC Ingress Annotations, Configmap, VirtualServer

* update descriptions based off pr changes
This commit reworks the manifest installation document to instead become
a folder, with each individual page within covering exactly one use
case. The new structure guides a user completely from end to end on the
process necessary for installing NGINX Gateway Fabric NGINX Open Source
or NGINX Plus without using multiple documents.

It also includes general improvements to specification discoverability,
allowing readers to more easily find what parts of the Gateway API
specification are supported and what to expect from future releases.
@github-actions github-actions bot added documentation Improvements or additions to documentation product/ngf Issues related to NGINX Gateway Fabric product/nic Issues related to NGINX Ingress Controller labels Dec 9, 2025
@github-actions
Copy link

github-actions bot commented Dec 9, 2025

Deploy Preview will be available once build job completes!

Name Link
😎 Deploy Preview https://frontdoor-test-docs.nginx.com/previews/docs/1551/

@ADubhlaoich ADubhlaoich changed the title feat: Rework Manifest installation paths feat: Rework Manifest installation cases Dec 9, 2025
@ADubhlaoich
Copy link
Member Author

Pushed my latest changes.

Running into issues testing the NGINX Plus deployment: there's no problems in the actual installation process, but the pod never becomes ready due to a crash loop.

The nature of the deployment makes me assume it could be related to the license for the pod.

@ADubhlaoich
Copy link
Member Author

The Plus deployment case now works as expected: I'd been trying to create consistency with Gateway Fabric and Ingress Controller processes.

The latter installs everything (including secrets) to the default namespace, whereas NGINX Gateway Fabric confines it all to its own namespace.

@ADubhlaoich ADubhlaoich linked an issue Dec 10, 2025 that may be closed by this pull request
ADubhlaoich and others added 2 commits December 11, 2025 10:59
Co-authored-by: Jon Torre <78599298+JTorreG@users.noreply.github.com>
@ADubhlaoich
Copy link
Member Author

ADubhlaoich commented Dec 11, 2025

@sjberman I have resolved a few bits of feedback and responded to everything else.

This is a pattern that is being applied to all onboarding documentation: a user can follow each document in full vertical sequence to deploy in less than 10 minutes.

The only nuance is if they want to install experimental, which is not presumed as a default use case - for which they have a separate document explaining and providing replacement URLs for installation steps.

Outside of the existing Manifest installation document, none of the other onboarding documentation has been changed yet as I opted to replicate steps in-place as a proof of concept: this same pattern has already been applied to NGINX Ingress Controller's Helm documentation:

https://docs.nginx.com/nginx-ingress-controller/install/helm/

My intent is to rewrite all onboarding documentation to reduce each page to covering exactly one use case, delineating between OSS and Plus.

Users have an idea of what kind of deployment they're going to use off the bat, so giving them extra optional dials on an individual document (Choosing between OSS and Plus and whether or not to use experimental) adds extra friction to each journey, and may also be a reason some people think NGINX Gateway Fabric cannot be used without a Plus license.

If there are technical nuances that need to be addressed that detail is incredibly important (Such as the note about cert-manager - I successfully deployed OSS and Plus with these procedures 5 times without issue), but otherwise I don't think we should be prioritizing maintainer time over user time or clarity.

If examples risk being outdated, we can periodically update them - the docs team is even working on procedures to schedule investigating and testing product documentation regularly, so that we can trust they are still accurate.

We should not avoid maintaining reference information like Technical specifications on the basis that they might become outdated or will have to be updated with each release, because that information is critically important for end users.

@sjberman
Copy link
Contributor

@ADubhlaoich I agree the value of including the Tech specs, and also don't want to avoid including them. However, saying that they "might get outdated" is optimistic. They will get outdated. We have problems updating it in our own repo where those dependency updates actually happen. It's a manual chore that I wish we could automate in our own README because we often forget to do it.

We can leave it in and update our release process doc to mention updating this at release time, which might be the best option for us. But in between that cadence, it will probably lag behind.

@ADubhlaoich
Copy link
Member Author

After conferring with the rest of the documentation team, I will be preparing whole documents for the experimental use case, which will be applied to other deployments as part of a design pattern.

I have yet to test the nuances of the cert-manager installation, and will do so after the content work.

@ADubhlaoich
Copy link
Member Author

ADubhlaoich commented Dec 22, 2025

Discovered a missing parameter from the old Manifest documentation when installing the API resources: adding it to the new use case resolves as expected.

Finished testing the open source experimental deployment: tearing down my test deployment and trying the plus experimental deployment use case now.

@ADubhlaoich
Copy link
Member Author

Found an incorrect URL for the NGINX Plus experimental deployment: works as expected!

All that's left is testing the Let's Encrypt certificate documentation to see if it works with a "default" contemporary cert-manager installation, though one of the requirements for testing is... challenging.

@ADubhlaoich ADubhlaoich requested a review from mjang January 15, 2026 11:43

{{% /tab %}}

{{% tab name="AWS NLB" %}}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why only this example?

Copy link
Member Author

@ADubhlaoich ADubhlaoich Jan 22, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe this was the only existing non-default example that currently existed for OSS with experimental.

This PR has been open for so long I have lost context.

```text
NAME TYPE DATA AGE
nplus-license Opaque 1 31s
regcred kubernetes.io/dockerconfigjson 1 22s
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be nginx-plus-registry-secret

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This output is from running the actual commands in the documents: please provide an edit suggestion to whatever section of YAML is creating this inaccuracy.

```text
NAME TYPE DATA AGE
nplus-license Opaque 1 31s
regcred kubernetes.io/dockerconfigjson 1 22s
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be nginx-plus-registry-secret

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This output is from running the actual commands in the documents: please provide an edit suggestion to whatever section of YAML is creating this inaccuracy.


## Install the Gateway API resources

{{< call-out "note" >}} If you have already installed Gateway API resources in your cluster, ensure they are a version [supported by NGINX Gateway Fabric]({{< ref "/ngf/overview/technical-specifications.md" >}}) {{< /call-out >}}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section is in an include now, right?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It appears to be, but I will need to review if the contents are identical, or if I realized there was differences that meant the include was non-functional.

This PR has been open for so long I have lost context.

nd-product: FABRIC
---

This page describes how to use Manifests to uninstall NGINX Gateway Fabric, its custom resource definitions, and its Gateway API resources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We're technically not using manifests to uninstall, we're just using a few manual kubectl commands.

@ADubhlaoich ADubhlaoich requested a review from sjberman January 22, 2026 10:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation product/ngf Issues related to NGINX Gateway Fabric product/nic Issues related to NGINX Ingress Controller

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Audit]: Install NGF with Manifests

9 participants