That’s the power an ingress resource can give you when paired with SSH access and a proxy.
Ingress resources are Kubernetes objects that manage external access to services inside a cluster. They define rules for routing traffic based on hostnames, paths, and protocols. When combined with SSH, the ingress resource becomes a secure gateway—not just for HTTP or HTTPS—but for direct, authenticated access to internal workloads. The SSH access proxy layer ensures every connection passes through a controlled, auditable entry point.
Using an ingress resource for SSH requires precise configuration. You define ingress rules that point to a service running your SSH proxy. This proxy manages sessions, keys, and permissions. Tools like NGINX Ingress Controller or Traefik can be extended to route TCP streams, not just HTTP, allowing SSH traffic into the cluster without exposing raw node ports.
Security is the priority. The ingress resource should enforce TLS wherever possible. SSH keys must be rotated and stored securely. The proxy should integrate with your existing identity systems, ensuring only approved users gain access. Logging must capture every connection and command to meet compliance standards.