All Products
Search
Document Center

Enterprise Distributed Application Service:Create an NGINX Ingress for an application

Last Updated:Mar 10, 2026

When your containerized application needs to accept external HTTP or HTTPS traffic, an NGINX Ingress maps incoming requests to the right backend Service based on domain name and URL path. In Enterprise Distributed Application Service (EDAS), you create and manage Ingress resources directly from the console.

Prerequisites

Before you begin, make sure you have:

Limits

  • Do not modify Ingress resources that EDAS manages automatically. These resources are labeled with edas-domain: edas-admin or edas-domain.

  • EDAS Standard Edition allows a maximum of five routing rules with a sampling rate greater than 10%.

  • EDAS Professional Edition and Platinum Edition have no sampling rate limits.

Create an NGINX Ingress

  1. Log on to the EDAS console.

  2. In the left-side navigation pane, choose Traffic Management > Application Routing.

  3. On the Application Routing (Kubernetes Ingress) page, select a region and a microservice namespace.

  4. Click CreateNginx Ingress.

  5. In the CreateNginx Ingress panel, configure the following parameters:

    ParameterDescription
    K8s ClusterThe Kubernetes cluster in which to create the Ingress.
    K8s namespaceThe Kubernetes namespace. Common values: default (used when no namespace is specified), kube-system (system-created objects), and kube-public (readable by all users, including unauthenticated users).
    Redirect to HTTPSTurn on to redirect all HTTP requests to HTTPS.
    Application route nameA unique name within the namespace. Use lowercase letters, digits, and hyphens (-). The name must start with a letter and end with a letter or digit.
  6. Click Add forwarding rule and configure routing rules:

    Note Note: Each domain-path combination maps to exactly one Service, but a single Service can serve multiple domain-path combinations. You can add multiple forwarding rules to an Ingress, and different Ingresses can share the same rules.
    ParameterDescription
    domain nameThe domain name that external clients use to reach the Service.
    PathThe URL path to match. Must start with a forward slash (/).
    ApplicationThe target application in the cluster.
    Service nameThe backend Service to receive matched traffic.
    Service portThe port on which the Service listens.
  7. (Optional) Click Advanced Options to set the Sampling Rate for request tracing. The sampling rate controls the percentage of requests that Application Real-Time Monitoring Service (ARMS) traces. Valid values: 0 to 100. Default: 0 (no tracing). A value of 100 traces all requests. To view trace IDs, go to the Log Analysis tab on the Ingress monitoring page.

  8. (Optional) To enable TLS termination for HTTPS traffic, turn on Open The TLS and select a Secret that contains the TLS certificate from the secrets drop-down list. If no Secret exists, click New key to create one. For details, see Create a Secret.

  9. Click Yes.

    Create an Ingress for an application

After the Ingress is created, it appears in the Ingress list. From the list, you can view details, modify routing rules, monitor traffic, or delete the Ingress.

Verify the Ingress

In a browser address bar, enter the domain name and path from the routing rule (for example, example.com/api). A successful response from the backend application confirms that the Ingress is routing traffic correctly.

How Ingress routing works

When you create a Kubernetes cluster in EDAS, an Ingress controller is automatically deployed. This controller acts as a reverse proxy that continuously watches for Ingress resources and enforces their routing rules.

Three components handle traffic routing in a Kubernetes cluster:

  • Service -- Represents an application running across a set of Pods.

  • Ingress -- Defines rules that map incoming HTTP or HTTPS requests to backend Services based on domain name and path.

  • Ingress controller -- A reverse proxy that reads Ingress rules and forwards traffic to the matching Service. The Service then distributes requests to its Pods.

Relationships between Services, Ingresses, and the Ingress controller

What to do next