Advanced Disciplines
Ingress, Egress, and the Borders of the Mesh
Ingress is not a convenience; it is the public boundary of your system. Egress is the boundary you forget until it becomes the breach.
Text
Authored as doctrine; evaluated as operations.
Doctrine
Traffic is authority. Whoever controls ingress and egress controls exposure, identity, and failure modes.
Kubblai doctrine: borders must be explicit, monitored, and deliberately constrained.
Ingress is a controller, not a YAML object
Ingress resources are declarations. The real system is the ingress controller: its configuration model, its reload behavior, its failure semantics, and its capacity under load.
Treat the ingress controller like any other critical system component: observe it, scale it, and test it under failure.
- Know your ingress class and how it maps to controllers.
- Understand configuration reload and whether it is disruptive.
- Budget for TLS and request processing overhead.
Egress: the ungoverned perimeter
Most clusters start with effectively unrestricted egress. At small scale, it feels productive. At real scale, it is how secrets leave, malware phones home, and data exfiltration becomes plausible.
If you enforce ingress but ignore egress, you have governed half a boundary.
- Prefer explicit egress allow-lists for sensitive namespaces.
- Instrument DNS and egress destinations; visibility precedes control.
- Treat outbound proxying as a platform component with SLOs.
Operational failure modes
Border systems fail in recognizable ways; design for them.
- Ingress 503s due to readiness/endpoint mismatch; don’t debug at L7 first—prove endpoints.
- Controller overload: config reload storms, CPU saturation, queueing latency.
- TLS certificate rotation failures; treat cert lifecycle as operations, not ceremony.
- Egress restrictions that break dependencies; roll out with telemetry.
Canonical Link
Canonical URL: /library/ingress-egress-and-the-borders-of-the-mesh
Related Readings
Advanced Disciplines
LibraryNetwork Policy and the Discipline of Isolation
Isolation is not paranoia; it is how you keep a single compromised workload from becoming a platform incident.
Sacred Systems
LibraryCNI as the Nervous System of the Cluster
Your CNI is not plumbing. It is a distributed system with its own control plane, performance ceiling, and failure modes.
Advanced Disciplines
LibraryRuntime Security and the Defense of the Sacred Plane
Security is not a feature; it is an operational discipline. Controls must be enforceable and survivable under load.