Kubernetes Ingress NGINX Reaches End of Life in March, Leaving Half of Cloud Native Environments Facing Urgent Migration
The community-maintained Ingress NGINX controller goes read-only in March 2026. With no future security patches and four new CVEs disclosed in February, organizations running roughly half of all Kubernetes ingress traffic must now choose between Gateway API and alternative controllers.
Overview
The Kubernetes project is days away from one of the most consequential infrastructure retirements in its history. In March 2026, the community-maintained Ingress NGINX controller will be officially retired, ending all releases, bug fixes, and security patches for software that currently powers roughly half of all cloud native environments, according to Kubernetes Steering Committee. The move caps years of maintainer burnout, mounting security debt, and a failed attempt to build a replacement, and it forces hundreds of thousands of organizations into an urgent migration with no drop-in substitute.
Why the Retirement Is Happening
Despite its near-ubiquitous adoption, Ingress NGINX has been sustained by what the Kubernetes project describes as “only one or two people doing development work, on their own time, after work hours and on weekends,” according to the original retirement announcement. The SIG Network and Security Response Committee reported that they “exhausted efforts to find additional support to make Ingress NGINX sustainable.”
The controller’s broad flexibility compounded the staffing problem. Features that were once considered strengths — particularly the ability to inject arbitrary NGINX configuration directives through “snippets” annotations — evolved into what maintainers now characterize as serious security vulnerabilities. As InfoQ reported, these design decisions created “insurmountable technical debt” that the skeleton crew of volunteers could not remediate at the pace modern cloud native security demands.
An attempt to develop a replacement controller called InGate alongside the Gateway API community never progressed far enough to reach maturity. InGate will also be retired, as noted in the Kubernetes blog.
The Security Dimension
The urgency of migration is underscored by a pattern of critical vulnerabilities. In March 2025, researchers disclosed CVE-2025-1974, dubbed “IngressNightmare,” a CVSS 9.8 flaw that enabled unauthenticated remote code execution and complete cluster takeover, as documented by Datadog Security Labs. Then in early February 2026, four additional HIGH-severity CVEs were disclosed: CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514, according to the same Datadog analysis.
The Kubernetes Steering Committee’s January 2026 statement was blunt in its assessment. “To be abundantly clear: choosing to remain with Ingress NGINX after its retirement leaves you and your users vulnerable to attack,” the committee wrote. The statement also warned that “existing deployments will continue to work, so unless you proactively check, you may not know you are affected until you are compromised.”
Organizations can determine whether their clusters are affected by running:
kubectl get pods --all-namespaces --selector app.kubernetes.io/name=ingress-nginx
Migration Options
The retirement presents organizations with several paths forward, none of which qualify as direct drop-in replacements.
Gateway API is the primary recommendation from the Kubernetes community. Described by Google’s open source blog as “Ingress 2.0,” Gateway API offers a role-based design that separates concerns between infrastructure providers, cluster operators, and application developers. It supports HTTP, TCP, UDP, and gRPC protocols natively and builds security features directly into the API rather than relying on risky configuration snippets. The Kubernetes SIG has published an ingress2gateway tool that can convert many Ingress NGINX annotations to Gateway API equivalents, though manual review remains necessary before production deployment.
Alternative Ingress controllers offer a more incremental path. F5’s open-source NGINX Ingress Controller, which predates the community project and carries an Apache 2.0 license, claims to power approximately 40 percent of Kubernetes ingress deployments and provides direct annotation mappings for most existing configurations. Other actively maintained controllers include Contour (CNCF-backed, Envoy-based), Kong Gateway, Cilium, Istio, Traefik, and HAProxy — all of which now support Gateway API as well.
Cloud-managed load balancers are a third option for organizations already invested in managed Kubernetes services from GKE, EKS, or AKS. These leverage the cloud provider’s native Layer 7 controllers and eliminate the need to maintain ingress infrastructure entirely.
What We Don’t Know
Several uncertainties complicate migration planning. The exact number of organizations that have already begun migration is unknown, and there is no public data on how many production clusters still depend exclusively on the retiring controller. The timeline for feature parity between Ingress NGINX’s more advanced configurations and Gateway API remains unclear; some specialized NGINX modules and annotations lack direct equivalents. It is also uncertain whether any of the current HIGH-severity CVEs will receive patches before the March cutoff, or whether new vulnerabilities discovered after retirement will remain permanently unaddressed.
Analysis
The Ingress NGINX retirement illustrates a recurring tension in open source infrastructure: the gap between widespread adoption and sustainable maintenance. A component used by roughly half of all cloud native environments was sustained by one or two volunteers working nights and weekends. The Kubernetes project’s acknowledgment that the controller “powered billions of requests in data centres and home laboratories worldwide” makes the staffing failure all the more striking.
The retirement also serves as a forcing function for Gateway API adoption. While Gateway API reached general availability in late 2023, migration has been gradual. With Ingress NGINX going dark, organizations that deferred the transition now face compressed timelines and the overhead of running parallel controllers during migration.
For platform engineering teams, the immediate priority is auditing existing clusters. The Kubernetes Steering Committee has recommended that organizations update their risk registers to classify unmaintained controllers as unacceptable and implement monitoring alerts that flag any remaining Ingress NGINX deployments. Teams should also add CI checks that prevent new Ingress NGINX introductions.
The broader lesson extends beyond Kubernetes networking. Critical infrastructure components that depend on volunteer labor remain structurally fragile regardless of adoption levels. The Ingress NGINX story, coming on the heels of similar burnout-driven crises in other foundational projects, reinforces the case that the cloud native ecosystem has yet to solve the maintainer sustainability problem.