Listing Thumbnail

    F5 NGINX Ingress Controller (Premium Edition)

     Info
    Sold by: NGINX, Inc. 
    Deployed on AWS
    Free Trial
    NGINX Ingress Controller (based on NGINX Plus) combines the speed and performance of NGINX with the trust and security behind the power of F5. NGINX Ingress Controller is high-performing, production-ready, and suitable for long-term deployment. We focus on providing stability across releases, with features that can be deployed at enterprise scale.
    4.5

    Overview

    Play video

    NGINX Ingress Controller is a best-in-class traffic management solution for cloud-native apps in Kubernetes and containerized environments in Amazon EKS. Get your free 30-day trial today!

    In a CNCF survey, nearly two-thirds of respondents reported using the NGINX Ingress Controller (more than all other controllers combined) and NGINX Ingress Controller has been downloaded more than 10 million times on DockerHub. Combining the speed and performance of NGINX with the trust and security behind the power of F5, NGINX Ingress Controller is synonymous with high-performing, scalable, and secure modern apps in production.

    This is the official implementation of NGINX Ingress Controller (based on NGINX Plus) from NGINX. It is high-performance, production-ready, and suitable for long-term deployment. We focus on providing stability across releases, with features that can be deployed at enterprise scale. Included in this subscription is NGINX's award-winning support.

    Highlights

    • Advanced app-centric configuration: Use role-based access control and self-service to set up security guardrails, so your teams can manage their apps securely and with agility. Enable multi-tenancy, reusability, simpler configs, and more.
    • Visibility and performance monitoring: Pinpoint undesirable behaviors and performance bottlenecks to simplify troubleshooting and make fixes faster.

    Details

    Delivery method

    Supported services

    Delivery option
    EKSDelivery

    Latest version

    Operating system
    Linux

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 30 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    F5 NGINX Ingress Controller (Premium Edition)

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (1)

     Info
    Dimension
    Description
    Cost/unit/hour
    Hours
    Container Hours
    $0.53

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    EKSDelivery

    Supported services: Learn more 
    • Amazon EKS
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Additional details

    Usage instructions

    This container requires Kubernetes and can be deployed to EKS. Review the installation instructions https://docs.nginx.com/nginx-ingress-controller/installation/  and utilize the deployment resources available https://github.com/nginxinc/kubernetes-ingress/tree/v3.7.2/deployments  Use this image instead of building your own.

    Support

    Vendor support

    To engage our support team, please first activate your account at http://www.myf5.com , where you'll be able to register and open a support case. For info on MyF5 support, please see our complete help article at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Application Development, Network Infrastructure, Security
    Top
    25
    In Application Stacks
    Top
    25
    In Network Infrastructure

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Kubernetes Traffic Management
    NGINX Plus-based ingress controller for managing traffic in Kubernetes and containerized environments in Amazon EKS
    Role-Based Access Control
    Role-based access control implementation enabling secure app management with self-service configuration capabilities
    Multi-Tenancy Support
    Multi-tenancy architecture allowing multiple teams to manage applications within shared infrastructure with isolation
    Performance Monitoring and Visibility
    Built-in visibility and performance monitoring capabilities for identifying performance bottlenecks and troubleshooting application behavior
    Enterprise-Scale Deployment
    Production-ready architecture designed for enterprise-scale deployments with stability across releases and long-term operational support
    Reverse Proxy and HTTP Acceleration
    Reverse proxy and HTTP accelerator that speeds up websites and reduces streaming latency for content delivery
    Content Caching Technology
    Caching technology that reduces backend server load by up to 99% while delivering all types of content faster
    Integrated Load Balancing and API Gateway
    Integrated functionality combining content cache, reverse proxy, load balancer, API gateway, web server, and SSL terminator
    Origin Shield Protection
    Origin shield mechanism that helps web services thrive under pressure and protects against traffic spikes
    Multi-Protocol Content Delivery
    Support for delivering websites, APIs, and video content with performance acceleration capabilities
    AI-Powered Data Management
    F5 AI Data Fabric enables generation of insights, management, and governance for data from different applications and products across multiple data lakes and data sources.
    Multi-Cloud Network Connectivity
    Global hub-and-spoke transit orchestration for connecting all cloud properties including public, private, network and edge clouds.
    Integrated Security Stack
    Unified software stack combining router, load balancer, network firewall, web application firewall (WAF), API security and API gateway capabilities.
    Layer 3-7 DDoS Protection
    L3-L7 DDoS defense capabilities for protecting applications and APIs deployed across distributed environments.
    Unified Management Portal
    Single SaaS-based console for SecOps, NetOps, and DevOps to manage and deploy virtual networks, connections, distributed applications, and API security.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    26 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    81%
    15%
    4%
    0%
    0%
    6 AWS reviews
    |
    20 external reviews
    External reviews are from G2  and PeerSpot .
    Suleiman Mohammed

    Routing for long-lived data connections has improved but protocol-aware checks still need work

    Reviewed on May 19, 2026
    Review from a verified AWS customer

    What is our primary use case?

    NGINX Ingress Controller  serves as the front door into our Kubernetes  clusters that we use for databases. We run a bunch of internal, facing customer APIs and we need something that would do reliable routing without us handling configs and reloading them ourselves. We also lean on it for TCP and UDP load balancing through Transport Server. We have a couple of database-adjacent things like Postgres connection endpoints, a Redis  service, and we want to expose them through it rather than standing up separate entities.

    The decision to use NGINX Ingress Controller  for those database-adjacent services, like the Postgres connection endpoints, is actually a big part of why I care about this working well. Transport Server is what we use to expose data services that are not HTTP. We have Postgres read-replica endpoints and Redis  cache that we front through Transport Server for load balancing and TCP load balancing. The thing I always keep in mind is the connection draining and long-lived connections. Databases do not behave the same way as when you have a stateless server like stateless HTTP. A web request is done in fifty milliseconds; a Postgres connection might be open for hours. For example, MySQL  has about eight hours for connections to be open until the engine kills them.

    My main use case with NGINX Ingress Controller is focused on the connection side, where most of my scar tissue with this thing is. The core NGINX  Ingress is fundamentally built around the HTTP request-response model. For connection pooling placements, I never let NGINX Ingress Controller manage database connection concurrency. We do have other connection poolers and load balancing. NGINX Ingress Controller is not a connection pooler; it does not understand the database protocol, transaction boundaries, prepared statements, or any of those sorts of things that a connection pooler manages. So in front of Postgres, we always run pgBouncer between the app and the database. The ingress is just doing some TCP load balancing to get to the pooler or the right replica. I think the mistake people make is thinking the ingress can take the place of a pooler, which it really cannot. It can, but it will just pass through every connection, and you will exhaust the max connections of the DB, even if you have set it to ten thousand.

    What is most valuable?

    The best feature that NGINX Ingress Controller offers for my use case is the Transport Server CRD and the dynamic reconfiguration offered with NGINX Plus . This is the number one feature by a wide margin for me. On Plus, endpoint changes update the upstream through the API without a config reload. For anything fronting a database or a connection pooler, this is the difference between rock-solid, long-lived connections and mysterious resets that you have every time a pod reschedules. Another thing is the policy CRD, rate limiting, and access control. This acts as protection for the data tier. You can put a rate limit at the ingress, so one misbehaving client cannot stampede a service and blow up the connection count, just trying to keep things managed and optimal.

    This shift away from manual config management has made my team's productivity and efficiency much easier. There was real improvement, but I will be specific about where the speed came from because it is not where people usually assume. Before, exposing a new service or changing a route meant human editing NGINX config, getting it reviewed by whoever owned the edge, and a careful reload during a safe window. That was a ticket and wait process, realistically a day or more of latency for something trivial because it is queued behind whoever owned the config. For databases and data services, it is slower to stand up. Exposing a new Postgres endpoint or a pooler through Transport Server is not just a merge-it thing. It is deliberately so. It involves proxy protocol being wired end-to-end so we keep client attribution. Timeout settings are tuned way up so idle pooled connections do not get ripped. Health check semantics that actually mean something for a database rather than just a TCP connection, and capacity-wise, considering connection counts hitting max connection, it is just more complex with more things involved. The honest summary is that deployment of routing changes got much faster, mostly by removing the human bottleneck rather than any technical speed-up. Deployment of database exposure intentionally did not get faster, and should not, but it got reproducible, reviewable, and instantly revertible. So when you make them, you are able to take them back. For the data tier, the reliability gain mattered far more than raw speed ever would have.

    What needs improvement?

    NGINX Ingress Controller can be improved, and my team's concern would be database protocol-aware health checks for Transport Server since that is what NGINX is more focused on. Right now, even on Plus, a Transport Server health check is essentially a TCP connect or maybe a basic send-expect. For a database, that is a weak signal. The listener being up tells you almost nothing about whether Postgres is actually serving, whether a replica is lagging, or whether it is in recovery. I would love a way to define a health check that does something protocol-aware, even something as simple as you open a connection, run a SELECT one, which is the most popular test, and expect a row for Postgres or a PING for Redis. Without that, I am relying on the database's own infrastructure to pull bad replicas, and the ingress will happily continue routing to a replica that answers TCP but is serving stale reads. Better idle connection management for long-lived stream connections can also be improved. A pooled database connection sitting idle between transactions is healthy in my opinion, but the proxy's instinct is to reap idle connections. You can crank timeouts way up, but that is a blunt instrument.

    I would like to add that specifically for databases, the need for improvement becomes clearer. Every client connection through NGINX becomes a backend connection, one-to-one. A client connection through NGINX and a client connection through a connection pooler are sitting because they are going to get sent to the backend connection. It does not multiplex; it does not understand transaction boundaries. It cannot reuse a connection across clients. If you put it in front of Postgres without a real pooler behind it, you have just built a very efficient way to exhaust the max connection. The architecture is always client, ingress, connection pooler which is either pgBouncer or ProxySQL, then the actual engine which is Postgres or MySQL . Never let it be clients straight to the database. NGINX Ingress Controller's mode is one client connection to one backend connection with no multiplexing and no protocol awareness, which would be an issue for you.

    For how long have I used the solution?

    I have been using NGINX Ingress Controller for three years now.

    What do I think about the stability of the solution?

    NGINX Ingress Controller is stable, and I would say there are different stability stories when talking about how it behaves in front of databases. NGINX Ingress Controller is stable itself. NGINX's data plane is rock solid. I do not really experience any reliability issues.

    What do I think about the scalability of the solution?

    For scalability, HTTP scales very well horizontally. It is straightforward. More controller pods behind the LB, and NGINX handles higher requests and connection volumes per pod efficiently. It scales really well.

    How are customer service and support?

    For NGINX Ingress Controller's customer support, I experience community support for the open-source side which means GitHub  issues, project documentation, Slack, and community channels. On NGINX Plus side, there is paid commercial support. They are obviously available to help with issues that I have, and I have encountered great engineers. Overall, it is a great experience.

    What was our ROI?

    I have seen a return on investment, but I do not have the actual numbers. The return is an avoided cost story, not a revenue or savings line. The clearest return is incidents that stopped happening. We used to have multiple incidents, but they stopped happening before we moved data tier parts to NGINX Plus. We had a recurring category of incidents. I would not say fewer employees; I would push back on that being the sense of it. NGINX Ingress Controller's ROI is real, but that is all I have to say, to be honest.

    What's my experience with pricing, setup cost, and licensing?

    I do not have much to say on the pricing, setup cost, and licensing front. There is a different functional team for managing costs and licensing in the environment. I can say a few things from my experience, though. The core dynamics and core features for databases involve the paywall. The paywall is what concerns me. I am not really sure about every other cost, but the decision lies with the other functional team.

    Which other solutions did I evaluate?

    Before NGINX Ingress Controller, we came off community ingress NGINX, and before that, plain HAProxy  managed by hand for the database parts. We evaluated a few solutions such as HAProxy , ingress, Traefik, and Envoy . The decision came down to CRD-based config ownership plus a paid escape hatch for the reload problem on the database parts. This is purely a review based on its interaction with databases. The platform engineering team uses NGINX Ingress Controller for various important aspects of covering all of the tech platform and services that we manage.

    What other advice do I have?

    My advice for others looking into using NGINX Ingress Controller, especially for the database side of things, is to be aware that the ingress is deliberately a stateless system. Every problem you will have comes from forgetting something. Internalize that the ingress does not understand the database. Never let it act as a connection pooler. Always put a real pooler behind it. The architecture is always client, ingress, your connection pooler which is either pgBouncer or ProxySQL, then your actual engine which is Postgres or MySQL. Never let it be clients straight to the database. NGINX Ingress Controller's mode is one client connection to one backend connection with no multiplexing and no protocol awareness, which would be a major issue for you. I have given this product a rating of seven out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Srivenkata Atti

    Traffic routing has become reliable and secure while SSL termination protects private clusters

    Reviewed on May 19, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Our main use case for NGINX Ingress Controller  is that we are using it in our EKS and our open source Kubernetes  as a controller where it handles our traffic.

    A specific example of how we use NGINX Ingress Controller  to handle our traffic is that we are configuring the Kubernetes  cluster as a private endpoint only, so it will not be accessible through the internet for anyone. We are securing it through a private endpoint only, so we are using NGINX Ingress Controller for handling the traffic. We are configuring NGINX Ingress Controller as pods, and then we are configuring the Ingress rules for that to serve which traffic is coming from the load balancer and to where the traffic will be routed. We are configuring the Ingress rules based on the rules, and it will route to the different services, and from the services, it will route to the different pods and deployments. Using that, we will configure the SSL certificate for the security, and in NGINX Ingress Controller only, it will handle the certificate termination. SSL termination will happen within the controller. It is very reliable for us.

    What is most valuable?

    The best features NGINX Ingress Controller offers include SSL termination, where it handles the certificate terminations, and if I had to pick a favorite feature, that would be it.

    NGINX Ingress Controller has positively impacted our organization by improving security when it comes to the certificate. As I mentioned, SSL termination is one of the points where it improves. When it comes to handling the traffic, where we are configuring the Ingress rules, we can say that it is very highly improved for us. Even though the traffic is very high, it will be handled very well, routing the traffic based on the Ingress rules to the particular service and to the particular pod.

    What needs improvement?

    When it comes to how NGINX Ingress Controller can be improved, I think we can add documentation as one of the points. We can improve it so that everyone can directly refer to the particular document in a precise way, and we will be getting very specific information. When we have any specific issues, it will be much easier for us to troubleshoot things. Documentation is one of the points, and everything is so far good for me.

    For how long have I used the solution?

    We are using NGINX Ingress Controller for the past two to three years.

    What do I think about the stability of the solution?

    NGINX Ingress Controller is stable and has been reliable for me over time.

    What do I think about the scalability of the solution?

    NGINX Ingress Controller's scalability is good and can handle increased load easily.

    How are customer service and support?

    The customer support for NGINX Ingress Controller is good; I have reached them a few times, and it was good.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing NGINX Ingress Controller.

    What other advice do I have?

    The advice I would give to others looking into using NGINX Ingress Controller is that we are using this for the past three to four years, and it is very reliable for us and it can handle the traffic based on our load as well. So I can suggest it to them when they are starting with new clusters and thinking to opt for any controllers for their cluster. I can directly suggest it. I would rate this product an 8 out of 10.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Vijay Siricilla

    Reverse proxying has simplified secure API routing and now supports efficient microservice traffic

    Reviewed on May 19, 2026
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for NGINX Ingress Controller  is that I commonly use it as a reverse proxy.

    I have used NGINX Ingress Controller  for SAP API calls, so whenever I am using these API calls on my frontend application, I don't want to expose the SAP server details. Therefore, I normally ingress it through NGINX Ingress Controller, mapping all these APIs to the SAP APIs, and from the frontend, I have access to it as a local post, effectively hiding all the SAP server URLs. A specific use case includes sales order APIs and posting something into SAP to get the business partner details from SAP, and similar actions.

    What is most valuable?

    NGINX Ingress Controller offers primarily reverse proxying capabilities, and the proxy feature stands out for me due to some performance benefits, definitely security as the first thing, and also the load balancing aspect and the ability to route traffic to multiple servers.

    NGINX Ingress Controller has positively impacted my organization by definitely improving my team's efficiency in terms of multiple load balancers and complex routing rules we can configure there, resulting in a single, easy-to-manage layer. Hence, routing, SSL termination, and rate limiting contribute to making us much faster and efficient.

    What needs improvement?

    NGINX Ingress Controller can be improved by implementing faster deployment of new services, simplifying SSL or TLS management, and enhancing faster troubleshooting by providing more logs. While I have debug logs, using more techniques to reduce the mean time to resolution would be beneficial.

    For how long have I used the solution?

    I have been using NGINX Ingress Controller for ten years.

    What do I think about the stability of the solution?

    NGINX Ingress Controller is stable.

    What do I think about the scalability of the solution?

    In the Kubernetes  environment, NGINX Ingress Controller scales very well.

    What was our ROI?

    As a developer, I can definitely say that NGINX Ingress Controller improves performance in terms of load balancing, especially in a microservices environment with many APIs. I don't have closely related metrics, but in a past microservices environment where I had fifty or more services, maintaining around one thousand to one thousand five hundred APIs was very hard without ingress. However, with ingress, it is easier to maintain them, and I think it doesn't charge more than thirty dollars a month for usage.

    What other advice do I have?

    NGINX Ingress Controller is pretty standard and very lightweight, making it highly recommendable to use in local development environments, and it is especially useful in test environments for enabling SSL and rate limiting.

    On a scale of one to ten, I would rate NGINX Ingress Controller around eight point five, near to nine, due to the ease of setup, although there is a slight learning curve with some advanced features. The documentation is good and reliable, and it performs well as it is lightweight and handles traffic loads sufficiently. While debugging, the logs are generally helpful, debugging complex routing can sometimes be tricky, so I may need to have more NGINX  internals to be logged. Overall, scalability, performance, and upgrades are all good, and using it in Kubernetes  integrates very well.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Mohammad Alauddin

    Ingress control has streamlined microservice access and has improved secure traffic management

    Reviewed on May 18, 2026
    Review from a verified AWS customer

    What is our primary use case?

    NGINX Ingress Controller  is my main tool for managing access in our Kubernetes  clusters, where we have multiple clusters, and for the access of different microservices, we use NGINX Ingress Controller .

    For a specific example of how we use NGINX Ingress Controller with our services, we have multiple front-end and back-end services, including back-end APIs, and some services need to be exposed publicly through an ingress resource, so we use NGINX Ingress Controller to expose those services publicly by applying an ingress resource on that service.

    In addition to my main use case with NGINX Ingress Controller, we also use custom resource definitions, CRDs for Transport Server and Transport Servers mainly, and Virtual Routes.

    What is most valuable?

    The best features NGINX Ingress Controller offers for my use cases include ingress resources and different annotations that allow us to expose a publicly accessible URL by whitelisting IPs and so on.

    The annotations that we utilize with NGINX Ingress Controller help our team by allowing us to block or whitelist IPs for certain publicly accessible services, ensuring that only specific public IPs can access those ingress URLs while blocking others.

    NGINX Ingress Controller has positively impacted my organization in that all my ingress resources, services, and internal and external communications between different services are quite smooth, and we can control our service exposure and service access easily using NGINX Ingress Controller, which makes my organization really happy.

    What needs improvement?

    I think NGINX Ingress Controller could be improved by adding many features and functions regarding firewalls, similar to what a professional API gateway offers, so those functionalities can be integrated with NGINX Ingress Controller.

    I gave it a rating of 9 out of 10 because I noticed that there are some things that need improvement or additional features and functionalities, such as more firewall-related options that can be added.

    For how long have I used the solution?

    I have been using NGINX Ingress Controller for almost three years or more.

    What do I think about the stability of the solution?

    In my experience, NGINX Ingress Controller is stable; so far, it has been quite good.

    What do I think about the scalability of the solution?

    NGINX Ingress Controller demonstrates quite good and straightforward scalability.

    How are customer service and support?

    Over the last couple of years regarding customer support for NGINX Ingress Controller, I have not encountered any scenarios where we needed customer support, so I have not felt any requirement for customer support so far.

    Which solution did I use previously and why did I switch?

    Previously, we used Istio  for service mesh, and we decided to switch to NGINX Ingress Controller due to the complexity of Istio  and version conflicts between the Kubernetes  cluster and Istio.

    What was our ROI?

    I have seen a return on investment with NGINX Ingress Controller since the time saved is considerable, especially because it is simple to use.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing is good, but I am not sure about those aspects since I am using the community edition.

    Which other solutions did I evaluate?

    Before choosing NGINX Ingress Controller, I evaluated other options such as Traefik.

    What other advice do I have?

    My advice for others looking into using NGINX Ingress Controller would be that it is easier to use and anyone can explore and use it. I would rate this product 9 out of 10.

    Ibrahim Ghazi

    Routing critical banking traffic with flexible automation has reduced costs and improved support

    Reviewed on May 18, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for NGINX Ingress Controller  involved a banking application that was a cluster of Kubernetes  where they wanted to monitor if the ingress controller could act as a load balancer.

    I set it up for their banking application by initially working with the community edition of NGINX Ingress Controller . We then proposed NGINX Plus  to them, which is now acquired by F5.

    What is most valuable?

    The best features that NGINX Ingress Controller offers in my experience are that the ingress controller can perform content-based routing and SSL termination, which is usually not available on software-only solutions and typically comes with hardware-based solutions.

    Content-based routing and SSL termination have helped our customers significantly. For example, one customer, a bank, needed to utilize their own GPT which had two instances, one on the cloud and one on-premises. They had to route between the on-premises and cloud instances, which we could not have accomplished without the ingress controller.

    NGINX Ingress Controller has positively impacted my organization and my customers because, since F5 acquired NGINX , the support is quite responsive. When you contact them, they immediately respond to the problems we have.

    A specific example is that we usually open cases based on priority, and when we set a priority for a site down, the engineer came within approximately fifteen minutes. This response time was excellent.

    What needs improvement?

    NGINX Ingress Controller itself is a great product, but when considering a complete solution, there are limitations. NGINX Ingress Controller does not provide the security and web application security features that come with full application delivery controllers, such as WAF  and AWAF.

    NGINX Ingress Controller can be improved in terms of security and WAF  features, but it should remain lightweight as it is currently. This lightweight characteristic is a very significant advantage that prevents any overheads on the systems running the applications.

    Additionally, there should be a dashboard for NGINX that shows all the metrics and monitoring information. For example, monitoring solutions such as DataDog have one pod in the entire environment that takes all information from all other pods and displays it on a dashboard. If there were an NGINX pod that could monitor the applications as well, it would be a great addition.

    For how long have I used the solution?

    I have used it for some customers who were already using it while they were on Kubernetes  environments with containerized applications. They wanted to deploy F5 as a load balancer for the Kubernetes environments. We proposed NGINX Ingress Controller for their Kubernetes environments and F5 as a load balancer for their monolithic applications.

    What do I think about the stability of the solution?

    In my experience, NGINX Ingress Controller is quite reliable and I have not faced any downtime or reliability issues.

    What do I think about the scalability of the solution?

    NGINX Ingress Controller's scalability is excellent. The scaling of containerized environments became really easy when we use NGINX Ingress Controller. Before that, it was really difficult to maintain all the scaling up and scaling down manually. We had to manually determine if the number of users increased to a specific limit, then scale up to more pods, and if concurrent sessions reduced, then reduce the pods. However, with the ingress controller, we can do this automatically.

    How are customer service and support?

    Customer support for NGINX Ingress Controller is great. When I reported that there was a connection mismatch between a customer's existing environment and their DR, the technician came within fifteen minutes. This response was excellent.

    Which solution did I use previously and why did I switch?

    I previously used the default ingress controller for Kubernetes before switching to NGINX Ingress Controller. This switch helped me because the configuration is really easy on NGINX compared to other software.

    What was our ROI?

    I have seen a return on investment with NGINX Ingress Controller because most organizations, especially small organizations or SMBs, don't buy a specific load balancer, such as F5 load balancer or Fortinet ADC . They go with a software-based load balancing solution. This represents a huge cost-cutting opportunity for them. Since the acquisition by F5, having support on NGINX is really great. Even the organizations that need to ensure they have support can take NGINX Ingress Controller as their go-to solution.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for NGINX Ingress Controller is that we discussed the pricing with our distributor in Pakistan, which is Awan Distribution. The setup cost does not involve any capital expenditure. It is basically a license through a subscription model. The subscription renews regularly. I believe this is a better licensing model rather than selling the product once and then doing a subscription for services. It is better to go with subscription-based models.

    Which other solutions did I evaluate?

    Before choosing NGINX Ingress Controller, I considered evaluating other options such as HAProxy . The configuration on HAProxy  was really cumbersome and HAProxy also did not have any support. NGINX was my best option.

    What other advice do I have?

    I suggest that it would be great if we could integrate NGINX Ingress Controller with F5 so we can see all the pods and all the applications running in the cluster environments or containerized environments on the F5 interface.

    I would rate NGINX Ingress Controller as an eight on a scale of one to ten. The reason I give it an eight instead of a higher or lower score is that since the acquisition by F5, the prices of NGINX Plus have increased drastically, which is a downside. However, I gave a good number, more than five, because NGINX usually comes up to the mark when we talk about application load balancing and communication between containers. If a container dies and comes up again with a new IP, then NGINX Ingress Controller automatically routes the traffic to it instead of sending the traffic to the wrong container that is no longer present.

    My advice for others looking into using NGINX Ingress Controller is that if they are deploying it in their production environment, they should take the support from F5 for NGINX Plus because without the support, they are really stuck. If they get a problem and cannot resolve it, they have to take downtimes. My overall rating for this product is eight out of ten.

    View all reviews