Skip to content

Update NGINX Ingress Controller to 5.1.1 #546

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Aug 15, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# To re-generate a bundle for another specific version without changing the standard setup, you can:
# - use the VERSION as arg of the bundle target (e.g make bundle VERSION=0.0.2)
# - use environment variables to overwrite this value (e.g export VERSION=0.0.2)
VERSION ?= 3.2.2
VERSION ?= 3.2.3

# CHANNELS define the bundle channels used in the bundle.
# Add a new line here if you would like to change its default config. (E.g CHANNELS = "candidate,fast,stable")
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ The following table shows the relation between the versions of the two projects:

| NGINX Ingress Controller | NGINX Ingress Operator |
| ------------------------ | ---------------------- |
| 5.1.x | 3.2.2 |
| 5.1.x | 3.2.3 |
| 5.0.x | 3.1.0 |
| 4.0.x | 3.0.1 |
| 3.7.x | 2.4.2 |
Expand Down Expand Up @@ -79,7 +79,7 @@ See [upgrade docs](./docs/upgrades.md)

We publish NGINX Ingress Operator releases on GitHub. See our [releases page](https://github.com/nginx/nginx-ingress-helm-operator/releases).

The latest stable release is [3.2.2](https://github.com/nginx/nginx-ingress-helm-operator/releases/tag/v3.2.2). For production use, we recommend that you choose the latest stable release.
The latest stable release is [3.2.3](https://github.com/nginx/nginx-ingress-helm-operator/releases/tag/v3.2.3). For production use, we recommend that you choose the latest stable release.

## Development

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ metadata:
"image": {
"pullPolicy": "IfNotPresent",
"repository": "nginx/nginx-ingress",
"tag": "5.1.0-ubi"
"tag": "5.1.1-ubi"
},
"ingressClass": {
"create": true,
Expand Down Expand Up @@ -223,7 +223,7 @@ metadata:
capabilities: Basic Install
categories: Monitoring, Networking
certified: "true"
containerImage: quay.io/nginx/nginx-ingress-operator:3.2.2
containerImage: quay.io/nginx/nginx-ingress-operator:3.2.3
createdAt: "2025-07-14T09:46:03Z"
description: The NGINX Ingress Operator is a Kubernetes/OpenShift component which
deploys and manages one or more NGINX/NGINX Plus Ingress Controllers
Expand All @@ -245,7 +245,7 @@ metadata:
labels:
operatorframework.io/arch.amd64: supported
operatorframework.io/arch.arm64: supported
name: nginx-ingress-operator.v3.2.2
name: nginx-ingress-operator.v3.2.3
namespace: placeholder
spec:
apiservicedefinitions: {}
Expand Down Expand Up @@ -466,7 +466,7 @@ spec:
- --metrics-bind-address=127.0.0.1:8080
- --leader-elect
- --leader-election-id=nginx-ingress-operator
image: quay.io/nginx/nginx-ingress-operator:3.2.2
image: quay.io/nginx/nginx-ingress-operator:3.2.3
livenessProbe:
httpGet:
path: /healthz
Expand Down Expand Up @@ -523,4 +523,4 @@ spec:
minKubeVersion: 1.26.0
provider:
name: NGINX Inc
version: 3.2.2
version: 3.2.3
2 changes: 1 addition & 1 deletion config/manager/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@ kind: Kustomization
images:
- name: controller
newName: quay.io/nginx/nginx-ingress-operator
newTag: 3.2.2
newTag: 3.2.3
2 changes: 1 addition & 1 deletion config/manifests/bases/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,4 @@ resources:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
commonAnnotations:
containerImage: quay.io/nginx/nginx-ingress-operator:3.2.2
containerImage: quay.io/nginx/nginx-ingress-operator:3.2.3
2 changes: 1 addition & 1 deletion config/samples/charts_v1alpha1_nginxingress.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ spec:
customPorts: []
image:
repository: nginx/nginx-ingress
tag: "5.1.0-ubi"
tag: "5.1.1-ubi"
# digest: "sha256:CHANGEME"
pullPolicy: IfNotPresent
lifecycle: {}
Expand Down
14 changes: 7 additions & 7 deletions docs/manual-installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,14 +7,14 @@ This will deploy the operator in the `nginx-ingress-operator-system` namespace.
1. Clone the `nginx-ingress-operator` repo:

```shell
git clone https://github.com/nginx/nginx-ingress-helm-operator/ --branch v3.2.2
git clone https://github.com/nginx/nginx-ingress-helm-operator/ --branch v3.2.3
cd nginx-ingress-helm-operator/
```

2. To deploy the Operator and associated resources to all environments, run:

```shell
make deploy IMG=nginx/nginx-ingress-operator:3.2.2
make deploy IMG=nginx/nginx-ingress-operator:3.2.3
```

2. Check that the Operator is running:
Expand All @@ -30,11 +30,11 @@ This will deploy the operator in the `nginx-ingress-operator-system` namespace.

In order to deploy NGINX Ingress Controller instances into OpenShift environments, a new SCC is required to be created on the cluster which will be used to bind the specific required capabilities to the NGINX Ingress service account(s). To do so for NIC deployments, please run the following command (assuming you are logged in with administrator access to the cluster):

`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.2/resources/scc.yaml`
`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.3/resources/scc.yaml`

Alternatively, to create an SCC for NIC daemonsets, please run this command:

`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.2/resources/scc-daemonset.yaml`
`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.3/resources/scc-daemonset.yaml`

You can now deploy the NGINX Ingress Controller instances.

Expand All @@ -44,19 +44,19 @@ You can now deploy the NGINX Ingress Controller instances.
You can use the operator (including the kube-rbac-proxy) images from your own private registry.
1. Tag the images for your private registry
```shell
docker tag quay.io/nginx/nginx-ingress-operator:3.2.2 <my-private-registry>/nginx-ingress-operator:3.2.2
docker tag quay.io/nginx/nginx-ingress-operator:3.2.3 <my-private-registry>/nginx-ingress-operator:3.2.3
docker tag quay.io/brancz/kube-rbac-proxy:v0.18.0 <my-private-registry>/kube-rbac-proxy:v0.18.0
```

2. Push the image to your private registry
```shell
docker push <my-private-registry>/nginx-ingress-operator:3.2.2
docker push <my-private-registry>/nginx-ingress-operator:3.2.3
docker push <my-private-registry>/kube-rbac-proxy:v0.18.0
```

3. Follow step 1 above but in step 1.2 you can run
```shell
make deploy IMG=<my-private-registry>/nginx-ingress-operator:3.2.2 KRP_IMAGE_BASE=<my-private-registry>/kube-rbac-proxy
make deploy IMG=<my-private-registry>/nginx-ingress-operator:3.2.3 KRP_IMAGE_BASE=<my-private-registry>/kube-rbac-proxy
```
**Note: If you need to use a different `kube-rbac-proxy` version than the default, use the `KRP_IMAGE_TAG` variable**

Expand Down
2 changes: 1 addition & 1 deletion docs/nginx-ingress-controller.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ spec:
customPorts: []
image:
repository: nginx/nginx-ingress
tag: "5.1.0-ubi"
tag: "5.1.1-ubi"
# digest: "sha256:CHANGEME"
pullPolicy: IfNotPresent
lifecycle: {}
Expand Down
4 changes: 2 additions & 2 deletions docs/openshift-installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,10 +23,10 @@ Additional steps:

In order to deploy NGINX Ingress Controller instances into OpenShift environments, a new SCC is required to be created on the cluster which will be used to bind the specific required capabilities to the NGINX Ingress service account(s). To do so for NIC deployments, please run the following command (assuming you are logged in with administrator access to the cluster):

`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.2/resources/scc.yaml`
`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.3/resources/scc.yaml`

Alternatively, to create an SCC for NIC daemonsets, please run this command:

`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.2/resources/scc-daemonset.yaml`
`kubectl apply -f https://raw.githubusercontent.com/nginx/nginx-ingress-helm-operator/v3.2.3/resources/scc-daemonset.yaml`

You can now deploy the NGINX Ingress Controller instances.
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
image:
pullPolicy: IfNotPresent
repository: nginx/nginx-ingress
tag: 5.1.0-ubi
tag: 5.1.1-ubi
ingressClass:
name: nginx
kind: deployment
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
image:
pullPolicy: IfNotPresent
repository: nginx/nginx-ingress
tag: 5.1.0-ubi
tag: 5.1.1-ubi
ingressClass:
name: nginx
kind: deployment
Expand Down
8 changes: 4 additions & 4 deletions helm-charts/nginx-ingress/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
apiVersion: v2
appVersion: 5.1.0
appVersion: 5.1.1
description: NGINX Ingress Controller
home: https://github.com/nginx/kubernetes-ingress
icon: https://raw.githubusercontent.com/nginx/kubernetes-ingress/v5.1.0/charts/nginx-ingress/chart-icon.png
icon: https://raw.githubusercontent.com/nginx/kubernetes-ingress/v5.1.1/charts/nginx-ingress/chart-icon.png
keywords:
- ingress
- nginx
Expand All @@ -12,6 +12,6 @@ maintainers:
name: nginx
name: nginx-ingress
sources:
- https://github.com/nginx/kubernetes-ingress/tree/v5.1.0/charts/nginx-ingress
- https://github.com/nginx/kubernetes-ingress/tree/v5.1.1/charts/nginx-ingress
type: application
version: 2.2.1
version: 2.2.2
2 changes: 1 addition & 1 deletion helm-charts/nginx-ingress/values-icp.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ controller:
nginxplus: true
image:
repository: mycluster.icp:8500/kube-system/nginx-plus-ingress
tag: "5.1.0"
tag: "5.1.1"
nodeSelector:
beta.kubernetes.io/arch: "amd64"
proxy: true
Expand Down
2 changes: 1 addition & 1 deletion helm-charts/nginx-ingress/values-plus.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,4 @@ controller:
nginxplus: true
image:
repository: nginx-plus-ingress
tag: "5.1.0"
tag: "5.1.1"
33 changes: 17 additions & 16 deletions helm-charts/nginx-ingress/values.schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -134,10 +134,11 @@
},
"interval": {
"type": "string",
"pattern": "^[0-9]+[mhd]$",
"pattern": "^[0-9]+[smh]$",
"default": "1h",
"title": "The usage report interval Schema",
"examples": [
"60s",
"1m",
"1h",
"24h"
Expand Down Expand Up @@ -350,10 +351,10 @@
},
"tag": {
"type": "string",
"default": "5.6.0",
"default": "5.8.0",
"title": "The tag of the App Protect WAF v5 Enforcer image",
"examples": [
"5.6.0"
"5.8.0"
]
},
"digest": {
Expand Down Expand Up @@ -390,7 +391,7 @@
"examples": [
{
"repository": "private-registry.nginx.com/nap/waf-enforcer",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
}
]
Expand Down Expand Up @@ -424,10 +425,10 @@
},
"tag": {
"type": "string",
"default": "5.6.0",
"default": "5.8.0",
"title": "The tag of the App Protect WAF v5 Config Manager image",
"examples": [
"5.6.0"
"5.8.0"
]
},
"digest": {
Expand Down Expand Up @@ -464,7 +465,7 @@
"examples": [
{
"repository": "private-registry.nginx.com/nap/waf-config-mgr",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
}
]
Expand Down Expand Up @@ -697,10 +698,10 @@
},
"tag": {
"type": "string",
"default": "5.1.0",
"default": "5.1.1",
"title": "The tag of the Ingress Controller image",
"examples": [
"5.1.0"
"5.1.1"
]
},
"digest": {
Expand Down Expand Up @@ -737,7 +738,7 @@
"examples": [
{
"repository": "nginx/nginx-ingress",
"tag": "5.1.0",
"tag": "5.1.1",
"pullPolicy": "IfNotPresent"
}
]
Expand Down Expand Up @@ -1860,15 +1861,15 @@
"port": 50000,
"image": {
"repository": "private-registry.nginx.com/nap/waf-enforcer",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
},
"securityContext": {}
},
"configManager": {
"image": {
"repository": "private-registry.nginx.com/nap/waf-config-mgr",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
},
"securityContext": {
Expand Down Expand Up @@ -1908,7 +1909,7 @@
"customPorts": [],
"image": {
"repository": "nginx/nginx-ingress",
"tag": "5.1.0",
"tag": "5.1.1",
"digest": "",
"pullPolicy": "IfNotPresent"
},
Expand Down Expand Up @@ -2503,15 +2504,15 @@
"port": 50000,
"image": {
"repository": "private-registry.nginx.com/nap/waf-enforcer",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
},
"securityContext": {}
},
"configManager": {
"image": {
"repository": "private-registry.nginx.com/nap/waf-config-mgr",
"tag": "5.6.0",
"tag": "5.8.0",
"pullPolicy": "IfNotPresent"
},
"securityContext": {
Expand Down Expand Up @@ -2551,7 +2552,7 @@
"customPorts": [],
"image": {
"repository": "nginx/nginx-ingress",
"tag": "5.1.0",
"tag": "5.1.1",
"digest": "",
"pullPolicy": "IfNotPresent"
},
Expand Down
8 changes: 4 additions & 4 deletions helm-charts/nginx-ingress/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ controller:

# usageReport:
# endpoint: "product.connect.nginx.com" # Endpoint for usage report
# interval: 1h
# interval: 1h # Interval for usage report, must be between 60s and 24h,
# proxyHost: "proxy.example.com:3138" # Proxy server for usage report, with optional port
# proxyCredentialsSecretName: "proxy-credentials" # Secret containing proxy credentials, must contain a `username` and `password` field

Expand Down Expand Up @@ -84,7 +84,7 @@ controller:
repository: private-registry.nginx.com/nap/waf-enforcer

## The tag of the App Protect WAF v5 Enforcer image.
tag: "5.6.0"
tag: "5.8.0"
## The digest of the App Protect WAF v5 Enforcer image.
## If digest is specified it has precedence over tag and will be used instead
# digest: "sha256:CHANGEME"
Expand All @@ -100,7 +100,7 @@ controller:
repository: private-registry.nginx.com/nap/waf-config-mgr

## The tag of the App Protect WAF v5 Configuration Manager image.
tag: "5.6.0"
tag: "5.8.0"
## The digest of the App Protect WAF v5 Configuration Manager image.
## If digest is specified it has precedence over tag and will be used instead
# digest: "sha256:CHANGEME"
Expand Down Expand Up @@ -172,7 +172,7 @@ controller:
repository: nginx/nginx-ingress

## The tag of the Ingress Controller image. If not specified the appVersion from Chart.yaml is used as a tag.
# tag: "5.1.0"
# tag: "5.1.1"
## The digest of the Ingress Controller image.
## If digest is specified it has precedence over tag and will be used instead
# digest: "sha256:CHANGEME"
Expand Down
2 changes: 1 addition & 1 deletion tests/nginx-ingress-controller-oss.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
image:
pullPolicy: Always
repository: nginx/nginx-ingress
tag: 5.1.0
tag: 5.1.1
ingressClass:
name: nginx
kind: deployment
Expand Down