You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/ngf/installation/installing-ngf/upgrading-ngf.md
+18-20Lines changed: 18 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -7,35 +7,35 @@ product: NGF
7
7
docs: DOCS-0000
8
8
---
9
9
10
-
This guide provides step-by-step instructions for upgrading NGINX Gateway Fabric from version 1.x to 2.0, highlighting key architectural changes, expected downtime, and important considerations for custom resource definitions.
10
+
This guide provides step-by-step instructions for upgrading NGINX Gateway Fabric from version 1.x to 2.x, highlighting key architectural changes, expected downtime, and important considerations for custom resource definitions.
11
11
12
12
---
13
13
14
14
### Upgrade from v1.x to v2.0
15
15
16
-
To upgrade NGINX Gateway Fabric from version 1.6.2 to the latest version 2.0.0, you must uninstall the existing NGINX Gateway Fabric CRDs and deployment, and perform a fresh installation. This will cause brief downtime during the upgrade process.
16
+
To upgrade NGINX Gateway Fabric from version 1.x to the new architecture in version 2.x, you must uninstall the existing NGINX Gateway Fabric CRDs and deployment, and perform a fresh installation. This will cause brief downtime during the upgrade process.
17
17
18
18
{{<note>}} You do not need to uninstall the Gateway API CRDs during the upgrade. These resources are compatible with the new NGINX Gateway Fabric version. {{</note>}}
For additional customization options during the helm installation process, take a look at [Installation with Helm](../../installation/installing-ngf/helm.md).
52
+
For additional customization options during the helm installation process, take a look at [Installation with Helm]({{< ref "../../installation/installing-ngf/helm.md" >}}).
53
53
54
-
#### Install using Manifests
54
+
{{<tabsname="install-manifests">}}
55
55
56
-
Follow these steps to install NGINX Gateway Fabric v2.0.0 using manifests:
56
+
Follow these steps to install NGINX Gateway Fabric v2.x using manifests:
57
57
58
58
1. First, apply the new CRDs with the following command:
For additional customization options during the installation process using manifests, take a look at [Installation with Manifests](../../installation/installing-ngf/manifests.md)
70
+
For additional customization options during the installation process using manifests, take a look at [Installation with Manifests]({{< ref "../../installation/installing-ngf/manifests.md" >}})
71
71
72
72
---
73
73
74
74
### Architecture changes
75
75
76
76
With this release, NGINX Gateway Fabric adopts a new architecture that separates the control plane and data plane into independent deployments. This separation improves scalability, security, and operational clarity.
77
77
78
-
The control plane is a Kubernetes controller built with `controller-runtime`. It watches Gateway API and Kubernetes resources (e.g., Services, Endpoints, Secrets) and dynamically provisions NGINX data plane deployments for each Gateway.
78
+
The control plane is a Kubernetes controller that watches Gateway API and Kubernetes resources (e.g., Services, Endpoints, Secrets) and dynamically provisions NGINX data plane deployments for each Gateway.
79
79
80
80
NGINX configurations are generated by the control plane and securely delivered to the data planes via gRPC, using the NGINX Agent. TLS is enabled by default, with optional integration with `cert-manager`.
81
81
82
82
Each data plane pod runs NGINX alongside the Agent, which applies config updates and handles reloads without shared volumes or signals. This design ensures dynamic, per-Gateway traffic management and operational isolation.
83
83
84
84
New fields have been added to the `NginxProxy` resource to configure infrastructure-related settings for data plane deployments. You can modify the `NginxProxy` resource at either the Gateway or GatewayClass level. These new fields provide the flexibility to customize deployment and service configurations.
85
85
86
-
For detailed instructions on how to modify these settings, refer to the [Configure infrastructure-related settings](../../how-to/data-plane-configuration.md#configure-infrastructure-related-settings) guide.
86
+
For detailed instructions on how to modify these settings, refer to the [Configure infrastructure-related settings]({{< ref "../../how-to/data-plane-configuration.md#configure-infrastructure-related-settings" >}}) guide.
87
87
88
88
---
89
89
90
-
### Key links for the version 2.0.0 update
90
+
### Key links for the version 2.x update
91
91
92
-
- To read more on [modifying data plane configuration](../../how-to/data-plane-configuration.md)
93
-
- To read more on [modifying control plane configuration](../../how-to/control-plane-configuration.md)
94
-
- To adding secure [authentication to control plane and data planes](./control-plane-certs.md)
95
-
- For detailed information on [architecture changes](../../overview//gateway-architecture.md)
96
-
- For detailed [API reference](../../reference/api.md)
92
+
- To read more on [modifying data plane configuration]({{< ref "../../how-to/data-plane-configuration.md" >}})
93
+
- To adding secure [authentication to control plane and data planes]({{< ref "./control-plane-certs.md" >}})
94
+
- For detailed [API reference]({{< ref "../../reference/api.md" >}})
0 commit comments