What is F5 NGINX Ingress Controller?

Enhancing the management of north-south network traffic in Kubernetes is essential for achieving reliable and consistent performance at scale while ensuring that your applications remain fast. By adopting sophisticated application-focused configurations that incorporate role-based access control (RBAC) and self-service capabilities, you can create security guardrails that empower your teams to manage their applications with both security and agility. This strategy promotes multi-tenancy and reusability, leading to more straightforward configurations and added advantages. With a native, type-safe, and well-structured configuration approach, functionalities such as circuit breaking, advanced routing, header manipulation, mTLS authentication, and web application firewall (WAF) can be streamlined effectively. Moreover, if you're already leveraging NGINX, the NGINX Ingress resources can facilitate a smooth transition of your existing configurations from other environments, significantly improving your operational efficiency. In addition to simplifying network management, this empowerment allows your development teams to accelerate their innovation processes, driving greater value for your organization. By optimizing these components, you can create an environment that is not only secure but also highly responsive to the demands of modern applications.

Pricing

Free Trial Offered?:
Yes

Screenshots and Video

Company Facts

Company Name:
F5
Date Founded:
1996
Company Location:
United States
Company Website:
www.f5.com/products/nginx/nginx-ingress-controller

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Webinars
Video Library
Support
Standard Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

F5 NGINX Ingress Controller Categories and Features

Load Balancing Software

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers