Kubernetes Ingress with NGINX: Production Routing and TLS
- Author :Liam K.
- Date :March 08, 2026
- Time :24 minutes
Production ingress is where application reliability and platform reliability meet. NGINX Ingress configuration affects latency, TLS behavior, error handling, and blast radius during incidents, so it needs the same engineering discipline as application code.
The goal is to make routing predictable under change: clear ownership, safe defaults, and runbooks for certificate failures, backend outages, and bad rewrites.
1. Traffic model and ownership
Define who owns global ingress policy versus team-specific routes. Platform teams should own controller lifecycle, TLS policy, and WAF integration, while service teams own host/path contracts and backend SLOs.
2. Baseline ingress resource
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: api-ingress
annotations:
nginx.ingress.kubernetes.io/proxy-read-timeout: "30"
nginx.ingress.kubernetes.io/proxy-send-timeout: "30"
spec:
[...]3. TLS and certificate lifecycle
Use cert-manager with clear issuer boundaries per environment. Track renewal windows and alert on expiration risk before user traffic is impacted.
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: api-example-com
spec:
secretName: api-example-com-tls
dnsNames:
- api.example.com
[...]4. Failure handling and safe rollouts
Treat ingress changes like production code changes. Validate rewrite rules in staging, run canary traffic, and keep explicit rollback commands for broken host/path mappings.
kubectl apply -f ingress.yaml
kubectl describe ingress api-ingress -n production
kubectl get events -n production --sort-by=.lastTimestamp | tail -n 305. Observability and security controls
- Track request rate, upstream latency, and 4xx/5xx by host and path.
- Enable access logs with correlation IDs for end-to-end tracing.
- Limit request body size and enforce sensible timeout boundaries.
- Keep network policies and namespace boundaries aligned with ingress exposure.
"Ingress reliability comes from disciplined route ownership, certificate hygiene, and tested rollback paths."
Technical Author

System administrator and technical writer specializing in server infrastructure, security and deployment. Creating comprehensive guides to help you master server administration.
Related Guides
March 08, 2026
March 08, 2026