Summary
In this chapter, we learned how to use different ingress controllers, such as NGINX, Traefik, and Contour. These ingress controllers are the most used ones, starting with NGINX, then Traefik, and finally Contour, which is based on Envoy. This chapter showed you how to use NGINX, Traefik, and Contour to solve common daily tasks in real production environments. The examples covered the use of TLS, routes, and some basic limit rates to access your applications. This chapter covered the last topic necessary to start with practical applications of all these technologies in the next chapter.