Skip to content

Commit 62df7d8

Browse files
committed
More
1 parent a8a00c0 commit 62df7d8

File tree

2 files changed

+54
-1
lines changed

2 files changed

+54
-1
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Secure your fleet
33
description:
4-
weight: 350
4+
weight: 450
55
url: /nginx-one/secure-your-fleet
66
---
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: "Set up security alerts"
3+
weight: 500
4+
toc: true
5+
type: how-to
6+
product: NGINX One
7+
docs: DOCS-000
8+
---
9+
10+
The F5 Distributed Cloud generates alerts from all its services including NGINX One. You can configure rules to send those alerts to a receiver of your choice. These instructions walk you through how to configure an email notification when we see new CVEs or detect security issues with your NGiNX instances.
11+
12+
This page describes basic steps to set up an email alert. For authoritative documentation, see
13+
[Alerts - Email & SMS](https://flatrender.tora.reviews/docs-v2/shared-configuration/how-tos/alerting/alerts-email-sms).
14+
15+
## Configure alerts to be sent to your email
16+
17+
To configure security-related alerts, follow these steps:
18+
19+
1. Navigate to the F5 Distributed Cloud Console at https://INSERT_YOUR_TENANT_NAME.console.ves.volterra.io.
20+
1. Find **Audit Logs & Alerts** > **Alerts Management**
21+
1. Select **Add Alert Receiver**
22+
1. Configure the **Alert Receivers**
23+
1. Enter the name of your choice
24+
1. (Optional) Specify a label and description
25+
1. Under **Receiver**, select Email and enter your email address.
26+
1. Select **Save and Exit**.
27+
1. Your Email receiver should now appear on the list of Alert Receivers.
28+
1. Under the Actions column, select Verify Email.
29+
1. Select **Send email** to confirm
30+
1. You should receive a verification code in the email provided. Copy that code.
31+
1. Under the Actions column, select **Enter verification code**.
32+
1. Paste the code and select **Verify receiver**.
33+
34+
## Configure Alert Policy
35+
36+
Next, configure the policy that identifies when you'll get an alert.
37+
38+
1. Navigate to **Alerts Management > Alert Policiei**.
39+
1. Select Add Alert Policy.
40+
1. Enter the name of your choice
41+
1. (Optional) Specify a label and description
42+
1. Under Alert Reciever Configuration > Alert Receivers, select the Alert Receiver you just created
43+
1. Under Policy Rules select Configure.
44+
1. Select Add Item.
45+
1. Under Select Alerts (TBD)
46+
1. Set the Action as Send and select Apply
47+
48+
Now set a second alert related to Common Vulnerabilities and Exposures (CVEs).
49+
50+
1. Select Add Item.
51+
1. Under Select Alerts {adding additional Alert type for CVE).
52+
1. Set the Action as Send and select Apply.
53+
1. Select **Save and Exit**.

0 commit comments

Comments
 (0)