PodWarden
User ManualPodWarden

Ingress

Ingress rules with domain routing, TLS certificates, and health checks

PodWarden ingress page
Ingress rules with domain routing, TLS status, and health check actions

What you see

URL: /ingress

The ingress page lists all ingress rules that route external traffic to workloads running in your clusters. Each rule maps a domain (and optional path) to a backend service, with TLS certificate management handled automatically.

Fields / columns

ColumnDescription
DomainThe fully qualified domain name for this rule (e.g. app.example.com)
PathURL path prefix (defaults to /)
Target serviceThe Kubernetes service and namespace that receives traffic
PortThe backend service port
TLSTLS certificate status. A BE label appears next to the lock icon when backend HTTPS is enabled
GatewayThe gateway or ingress controller handling this rule

Gateway filtering

PodWarden ingress rules filtered by gateway host
Ingress rules filtered to show only rules routed through a specific gateway host

Use the gateway filter dropdown to show only rules routed through a specific gateway host. This is useful when managing multiple gateways or reviewing which domains are handled by each ingress controller.

Available actions

ActionWhereWhat it does
CreateList page toolbarOpens the ingress rule form. Specify domain, path, target service, port, and gateway
EditRule rowModify the rule's domain, path, target, or gateway
DeleteRule rowRemoves the ingress rule from PodWarden and the cluster
ApplyRule rowApplies or re-applies the ingress rule to the cluster (generates and applies the Kubernetes Ingress manifest)
Check DNSRule rowVerifies that the domain's DNS records resolve to the expected IP address
Check HTTPRule rowSends an HTTP request to the domain and reports the response status
Check TLSRule rowValidates the TLS certificate (issuer, expiry, chain completeness)

Create ingress rule

PodWarden create ingress rule modal
Create a new ingress rule with domain, backend type, gateway host, and TLS settings

The create form lets you configure:

FieldDescription
DomainThe FQDN to route traffic for. Select a registered domain or enter a custom one
PathURL path prefix (default /)
Backend typeManaged (K8s workload) or Manual (IP:port)
DeploymentWhich running workload to route to (managed type only)
Backend addressTarget IP:port or hostname:port (manual type only)
Backend portThe container port to forward to
Gateway hostWhich gateway node handles this rule
Enable TLSAutomatic Let's Encrypt certificates (enabled by default)
Backend uses HTTPSEnable when the backend serves HTTPS instead of HTTP. Required for apps like Kasm, Portainer, and Proxmox that don't have an HTTP fallback. When enabled, Traefik connects to the backend via HTTPS with certificate verification skipped (for self-signed certs). See the HTTPS Backends guide for details and a list of common apps that need this
Backend timeoutCustom timeout in seconds for slow backends (optional)
NotesFreeform notes (optional)

Edit ingress rule

PodWarden edit ingress rule modal
Edit an existing ingress rule with all fields pre-populated

Click the edit icon on any rule row to modify its configuration. All fields are pre-populated with the current values.

Status badges

TLS status

BadgeMeaning
validTLS certificate is present and not expired
pendingCertificate has been requested but not yet issued (e.g. ACME challenge in progress)
expiredCertificate has passed its expiry date
noneNo TLS configured for this rule
errorCertificate provisioning failed
BEShown next to the TLS icon when "Backend uses HTTPS" is enabled

DNS status

BadgeMeaning
okDomain resolves to the expected IP
mismatchDomain resolves to a different IP than expected
not foundNo DNS record found for the domain

Related docs

Ingress