Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 1 addition & 5 deletions content/nginxaas-azure/app-protect/configure-waf.md
Original file line number Diff line number Diff line change
Expand Up @@ -125,14 +125,10 @@ After your policy has been saved, you can then reference it in your NGINX config

{{< call-out "note" >}}The **name** field within the security policy must be unique among the policies referenced in your NGINX configuration.{{< /call-out >}}

{{< call-out "warning" >}}Referencing both custom and precompiled policies in your NGINX configuration is not supported at this time.
As a workaround, make a copy of the default policy you want to use, then add it as a custom policy with a different name.
{{< /call-out >}}

The **Custom Policies** tab shows the status of your custom policies (Compilation and Application Status). Custom policies are automatically compiled when created or modified. Policies that are applied to the NGINX configuration cannot be deleted until they are first removed from the configuration.

It is highly recommended to use logging to monitor the performance of F5 WAF for NGINX and to help diagnose problems. See [Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}}) for directions to configure security and operational logs.

## What's next

[Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}})
[Enable F5 WAF for NGINX Logs]({{< ref "/nginxaas-azure/app-protect/enable-logging.md" >}})
4 changes: 4 additions & 0 deletions content/nginxaas-azure/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,10 @@ Users can now test the availability of specific IP addresses from their deployme

NGINXaaS now supports downloading certificate from Azure Key Vault via Private Endpoints. This will allow users to increase network security by disabling public access on their Key Vault. For more information, please visit [Integrate with Private Endpoint]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#integrate-with-private-endpoint" >}})

- {{% icon-feature %}} **Support for both precompiled and custom WAF policies in the same NGINX config**

NGINXaaS now allows both precompiled and custom policies for F5 NGINX App Protect WAF to be referenced within the same NGINX config. This removes a previous restriction.

## September 18, 2025

- {{% icon-feature %}} **Notification on update to deployments using the Stable Upgrade Channel**
Expand Down
6 changes: 0 additions & 6 deletions content/nginxaas-azure/known-issues.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,12 +17,6 @@ Updating managed identities on an NGINXaaS deployment after creation may result

**Workaround**: To avoid this issue, when you create an NGINXaaS deployment, make sure that the managed identity with access to AKV is assigned during initial creation. If managed identities need to be updated after creation, enable public access to AKV or [configure Network Security Perimeter]({{< ref "/nginxaas-azure/quickstart/security-controls/certificates.md#configure-network-security-perimeter-nsp" >}})

### {{% icon-bug %}} Custom and precompiled security policies cannot both be referenced in an NGINX configuration

When using F5 WAF for NGINX, you can only reference default or custom security policies in your NGINX configuration, not both.

**Workaround**: Make a copy of the default policy you want to use, then add it as a custom policy with a different name.

### {{% icon-bug %}} Terraform fails to apply due to validation errors, but creates "Failed" resources in Azure (ID-4424)

Some validation errors are caught later in the creation process, and can leave behind "Failed" resources in Azure. An example initial failure might look like:
Expand Down