Kubernetes is declarative, modular, and cloud-agnostic. Until you hit the networking layer. For years, the Ingress API served as the default way to expose applications. It was enough to get started — simple TLS, host/path routing. But the moment you scale to multi-cluster, multi-team, or regulated environments, its limitations become painfully clear.
That’s where Gateway API comes in. It’s not just ingress v2 — it’s a better design for Kubernetes networking: role-based, portable, and production-grade.
This post outlines what Gateway API offers, how it works, and how we’re helping real-world customers move from patchwork ingress setups to standardised, scalable, and observable traffic management.
Ingress works well for basic use cases. But in the real world, teams end up relying on fragile, controller-specific features:
We’ve worked with teams running 20+ EKS clusters where inconsistencies in annotations and controller versions made standardisation almost impossible. Application teams couldn’t safely make changes. Platform teams couldn’t automate confidently.
Gateway API solves these pain points by introducing a clean separation of responsibilities:
GatewayClass defines the controller type (e.g., envoy, istio)Gateway defines listeners, addresses, and TLSThis means platform teams manage infrastructure. Application teams own routing rules. And both do so with clear, versioned APIs.
GatewayClass --> Gateway <-- HTTPRoute | GRPCRoute
A single Gateway can serve many Routes, and policies (timeouts, retries, mirrors) are now part of the spec — not annotations.
Gateway API doesn’t stop at ingress. With GAMMA (Gateway API for Mesh Management), you can now attach HTTPRoute directly to a Service to control east–west traffic. This means one API for both ingress and service-to-service traffic.
HTTPRoute
|
Service (mesh internal)
This is especially valuable for teams using service mesh frameworks like Istio or Linkerd. Instead of writing custom YAML or mesh-specific DSLs, they define timeouts, retries, and route splits with the same Gateway API.
In one customer case, we helped migrate existing Istio VirtualService to HTTPRoute, reducing complexity and bringing mesh policy into the same GitOps pipeline as ingress.
One of the best parts of Gateway API is safe delegation. Teams can:
This structure scales in enterprise environments. You can control access without blocking autonomy.
Gateway API includes a conformance suite and publishes an implementation matrix. You can check exactly which features are supported by your controller before adopting them. That means no more guessing if GRPCRoute or timeouts will work in prod. You get consistent behaviour across clusters and vendors.
We help platform teams adopt Gateway API in a way that fits their real-world environments:
GatewayClass and Gateways with consistent policiesRoutes to app teams safelyWe support this across AWS (EKS), Azure, on-prem, and hybrid setups. Whether you’re just starting or looking to replace legacy ingress, we’ll help you implement Gateway API without slowing your teams down.
Gateway API represents more than just a better ingress. It’s a consistent, scalable interface for all Kubernetes traffic — with safety, conformance, and real role separation built in. If you’re running modern platforms at scale, this is the interface to bet on. And at Giant Swarm, we’re here to help you get it right.
Curious how Gateway API can simplify your networking strategy? Let’s explore how we can make it production-ready in your environment. Get in touch.