Ingress — a K8s resource describing HTTP(S) routing: which host/path goes to which Service. Requires an Ingress Controller (ingress-nginx, Traefik, HAProxy Ingress). cert-manager automatically issues Let's Encrypt certs. Controller annotations add rate-limit, CORS, basic-auth without a separate sidecar.
Below: details, example, related terms, FAQ.
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: api
annotations:
cert-manager.io/cluster-issuer: letsencrypt
nginx.ingress.kubernetes.io/limit-rps: "10"
spec:
ingressClassName: nginx
tls:
- hosts: [api.example.com]
secretName: api-tls
rules:
- host: api.example.com
http:
paths:
- path: /
pathType: Prefix
backend:
service: { name: api-svc, port: { number: 80 } }The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeLoadBalancer — one external IP per Service (expensive in cloud). Ingress — one LB for the whole cluster + L7 routing to multiple Services.
New clusters — consider it. Existing — Ingress is stable and production-grade, migration is not a priority.
No, you can paste TLS secrets by hand. But with 3+ domains cert-manager saves hours per month.