- TechOps Examples
- Posts
- Kubernetes Ingress Vs Gateway API
Kubernetes Ingress Vs Gateway API
TechOps Examples
Hey — It's Govardhana MK 👋
Along with a use case deep dive, we identify the remote job opportunities, top news, tools, and articles in the TechOps industry.
👋 Before we begin... a big thank you to today's sponsor PERFECTSCALE
[FREE WEBINAR] Let’s be real—AI is changing the game, but most IT teams aren’t ready for what’s coming.
AI adoption is booming, but with great innovation comes great complexity:
→ Are you prepared for AI infrastructure costs that are 4-10x higher than standard workloads?
→ Do you know how many “Shadow AI” deployments exist in your organization right now?
→ Can your DevOps and platform teams keep up with the surge in AI-generated code and technical debt?
Join the practical discussion!
IN TODAY'S EDITION
🧠 Use Case
Kubernetes Ingress Vs Gateway API
🚀 Top News
👀 Remote Jobs
Northflank is hiring a Cloud Infrastructure Engineer
Remote Location: Worldwide
N-iX is hiring a Senior DevOps Engineer
Remote Location: India, Europe, South America, Ukraine
📚️ Resources
📢 Reddit Threads
🛠️ TOOL OF THE DAY
github-actions-log-checker - A security tool for scanning GitHub Actions logs for exposed secrets and credentials.
🧠 USE CASE
Kubernetes Ingress Vs Gateway API
If you’re still deploying Kubernetes workloads using Ingress and haven’t explored the Gateway API yet, you might be missing out on more flexible traffic control and multi-protocol support.
Let’s go beyond the usual definitions and dive into practical distinctions that impact real deployments.
1. Ingress

Most Kubernetes deployments today use Ingress to expose HTTP(S) traffic. It works, but it has notable caveats:
Tied to HTTP: No built in support for TCP, UDP, or gRPC.
Cluster scoped: You configure Ingress at the cluster level, making it less flexible for multi-team or multi-tenant scenarios.
Limited Extensibility: Annotations and custom CRDs are needed for advanced use cases like rate limiting, header modifications, and multi-tenancy.
No Fine grained Routing Control: Ingress only supports host/path-based routing, meaning complex routing logic often needs workarounds with annotations or controller specific features.
Network Policies Conflicts: Ingress does not inherently respect NetworkPolicy configurations, leading to cases where traffic gets routed despite restrictive policies.
2. Gateway API

The Gateway API is not just a replacement for Ingress, it’s an evolution that provides multi-protocol support, better delegation, and extensibility.
Here’s what makes it a game changer:
Multi protocol support: Native support for HTTP, TCP, UDP, and gRPC (
HTTPRoute
,TCPRoute
,UDPRoute
). This means you can define traffic rules beyond just HTTP(S).Namespace scoped delegation: Unlike Ingress, Gateway API allows defining multiple Gateways within a namespace, making it ideal for multi-tenant architectures.
Separation of Concerns: In Ingress, application teams often depend on cluster admins to configure traffic policies. With Gateway API, cluster admins manage Gateways while app teams manage their own
HTTPRoute
,TCPRoute
, orUDPRoute
objects.Policy Enforcement: Supports first class policy objects like rate limiting, traffic splitting, retry policies, and more (without relying on annotations).
Standardization Across Vendors: Unlike Ingress, which has different behaviors depending on the controller (NGINX, Traefik, etc.), the Gateway API aims to standardize behaviors across implementations.
When to Use What?
Scenario | Use Ingress | Use Gateway API |
---|---|---|
Basic web apps (HTTP/S only) | ✅ | ✅ |
Multi-team, multi-tenant setups | ❌ | ✅ |
TCP, UDP, gRPC traffic | ❌ | ✅ |
Fine grained routing & delegation | ❌ | ✅ |
Avoiding controller specific annotations | ❌ | ✅ |
Enterprise scale traffic policies | ❌ | ✅ |
Practical Migration Considerations
Thinking of migrating from Ingress to Gateway API?
Here are key steps to ensure a smooth transition:
If you rely heavily on annotations (e.g., rate limiting, redirects), map them to Gateway API equivalent policies.
Not all controllers fully support Gateway API yet. Kong, Traefik, Istio, and Contour have good support, but check for missing features.
You can run both Ingress and Gateway API in parallel and migrate gradually.
Test with
HTTPRoute
,TCPRoute
, andUDPRoute
configurations before full cutover.Ensure NetworkPolicy rules align with Gateway API routing.
My 2 Cents:
If your workload is simple HTTP based traffic, Ingress still gets the job done. But if you’re dealing with much more complex traffic, the Gateway API is the future. Start experimenting with it in a non prod environment and stay ahead of the curve!
On a side note, AI is changing the game, but most us aren’t ready for what’s coming.
We are bringing a FREE WEBINAR - a practical discussion to equip DevOps and platform teams with AI transformation.
Join to understand why systems thinking is more crucial than ever.
25 Blogs to Learn 25 Kubernetes Concepts:
1) Kubernetes Architecture: techopsexamples.com/p/kubernetes-a…
2) POD Lifecycle: techopsexamples.com/p/kubernetes-p…
3) etcd Setup: techopsexamples.com/p/how-to-setup…
4) etcd Locks: techopsexamples.com/p/understandin…
5) crashloopbackoff: techopsexamples.com/p/kubernetes-c…
6) OOMKilled:… x.com/i/web/status/1…— Govardhana Miriyala Kannaiah (@govardhana_mk)
3:01 PM • Mar 13, 2025
You may even like: