How to Choose a Kubernetes Gateway API Implementation
KubernetesNetworkingGatewayAPI

How to Choose a Kubernetes Gateway API Implementation

Eduardo Sanchez, Javier Moreno, Valeria Hernández · · 12min read

From Understanding Gateway API to Choosing the Right Kubernetes Implementation

In the previous article, we discussed the creeping limitations of Ingress, the structural promise of Gateway API, and the conceptual shift from a single monolithic controller to a well-defined separation of concerns. If you’ve followed that reasoning, you now understand why Gateway API exists and what it’s trying to solve.

But understanding the specification is only the beginning.

Gateway API gives you structure. It does not give you answers. Just like Ingress, it relies on controllers to turn those definitions into real traffic behavior.

The moment you move from “should I adopt Gateway API?” to “which implementation should I deploy?”, you enter territory the spec deliberately leaves open. And that openness, which is genuinely one of Gateway API’s strengths, is also where teams make decisions they’ll be living with for years.

Why Choosing a Gateway API Implementation Is Harder Than It Looks

There’s a trap that catches even experienced platform teams. Because Gateway API is a standard, it’s tempting to treat the choice of controller as an afterthought, an implementation detail you can swap out later if you need to. This assumption is usually wrong because Gateway API implementations vary in:

  • How closely they follow the specification
  • How they extend beyond it
  • Their operational model and maturity
  • Their alignment with broader ecosystems (Envoy, NGINX, service mesh, cloud providers)

If you’re not careful, you can recreate the same fragmentation and hidden complexity that made Ingress painful—just with better APIs.

Migrating from Ingress to Gateway API is not just a replacement. It’s an opportunity to reset how traffic is managed in your platform. And that makes the choice of implementation far more consequential than it might initially appear.

How to Choose a Kubernetes Gateway API Controller (Key Criteria)

Before looking at specific implementations, it’s worth defining what matters.

This is not about finding the controller with the most features. It’s about understanding which trade-offs best fit your platform.

In practice, most teams end up evaluating implementations along a few key dimensions:

1. Alignment with Gateway API

  • Is Gateway API the primary configuration model?
  • Or is it layered alongside existing, implementation-specific APIs?

A tighter alignment usually means better portability and a more future-proof design.

2. Operational model and complexity

  • Does it follow a clear control plane / data plane separation?
  • How complex is it to deploy, upgrade, and operate?
  • What does day-two maintenance look like?

Some solutions optimize for simplicity. Others trade simplicity for flexibility and power.

3. Scope: gateway vs platform

  • Is it focused purely on north-south traffic?
  • Or does it extend into service mesh and east-west concerns?

A broader scope can be powerful—but it also increases operational overhead.

4. Extensibility and lock-in

  • How are advanced features exposed?
  • Through standardized APIs or implementation-specific extensions?

Extensions are often necessary—but they can reduce portability if overused.

5. Security and policy model

  • Are security features first-class and integrated?
  • Or do they depend on external systems or commercial add-ons?

This becomes critical in multi-team or regulated environments.

6. Governance and ecosystem maturity

  • Is the project community-driven or vendor-led?
  • How mature and widely adopted is it?

This influences long-term stability, support, and evolution.

These criteria reflect real trade-offs that affect how platforms behave under scale, how teams collaborate, and how easily systems evolve over time.

Gateway API Implementations Compared: Envoy, Istio, NGINX, Traefik, and KGateway

With that lens in place, the differences between implementations become easier to reason about.

Each one is not just a tool, but a set of design decisions about how traffic management should work and who owns that complexity.

Envoy Gateway

Alignment with Gateway API

Envoy Gateway shows strong alignment with Gateway API as its primary configuration model. It supports core resources (Gateway, HTTPRoute, GRPCRoute) as well as experimental ones (TCPRoute, UDPRoute, TLSRoute) and tracks the evolution of the spec closely, even if not always immediately on the latest version.

Operational model and complexity

It follows a clear control plane / data plane architecture. The controller translates Gateway API resources into Envoy Proxy’s xDS configuration and manages Envoy Proxy instances. This model is well understood and scalable, though it introduces moderate operational overhead.

Scope: gateway vs platform

Primarily focused on north-south traffic, but integrates naturally into broader ecosystems (API gateways, service mesh, observability stacks) thanks to Envoy.

Extensibility

Provides a structured extension model through CRDs such as BackendTrafficPolicy, ClientTrafficPolicy, and SecurityPolicy. These extend beyond the core spec while maintaining conceptual alignment with it.

Security

Strong and comprehensive: JWT, mTLS, API keys, Basic Auth, OIDC, CORS, and external authorization. Many capabilities are inherited from Envoy’s mature data plane.

Governance

Open source (Apache 2.0), part of the Envoy ecosystem, with strong ties to a CNCF graduated project. Backed by a mature community and governance structure.

Trade-offs

  • Strong spec alignment and flexibility
  • Mature, high-performance data plane
  • Extensions reduce portability across controllers
  • Moderate operational complexity

Istio

Alignment with Gateway API

High and improving. Istio supports Gateway API and is moving toward making it the default, but still maintains its own CRDs for advanced features not yet covered by the spec.

Operational model and complexity

High complexity. Uses a full control plane (istiod) and distributed Envoy proxies. Designed for dynamic configuration and large-scale environments, but requires significant operational investment.

Scope: gateway vs platform

Covers both north-south (gateway) and east-west (service mesh) traffic. The broadest scope among all implementations.

Extensibility

Extensible via WebAssembly (Wasm), though this is still evolving and not fully mature. Also relies on its own CRDs for advanced capabilities.

Security

Strong overall, especially in mesh scenarios (mTLS, policy enforcement). For ingress-specific use cases, capabilities are solid but less extensive compared to dedicated gateway solutions.

Governance

Open source (Apache 2.0), CNCF graduated project with high adoption and well-established governance.

Trade-offs

  • Unified model for gateway + mesh
  • Very powerful but operationally heavy
  • Gateway API is not the only configuration interface
  • Higher learning curve and maintenance cost

NGINX Gateway Fabric

Alignment with Gateway API

High. Supports standard and experimental resources with a steady update cadence and clear roadmap.

Operational model and complexity

Traditional controller + proxy model. Familiar and predictable, especially for teams already using NGINX. Complexity increases when using NGINX Plus features.

Scope: gateway vs platform

Focused on north-south traffic, with stronger value when integrated into the broader NGINX ecosystem.

Extensibility

Provides multiple implementation-specific extensions (RateLimitPolicy, AuthenticationFilter, SnippetsPolicy, etc.), enabling detailed proxy configuration but tightly coupled to NGINX behavior.

Security

Moderate. Supports basic authentication and mTLS, with more advanced capabilities available through NGINX Plus.

Governance

Open source (Apache 2.0), but closely tied to the NGINX/F5 ecosystem, with less neutral, community-driven governance.

Trade-offs

  • Strong ecosystem continuity for NGINX users
  • Flexible but tightly coupled extensions
  • Advanced features may require commercial offering
  • Less neutrality in governance

Traefik Proxy

Alignment with Gateway API

High. Supports Gateway API resources and tracks the spec reasonably well.

Operational model and complexity

Simplified model where the proxy itself acts as both control and data plane. Easier to deploy and operate, with fewer moving parts.

Scope: gateway vs platform

Primarily north-south traffic, with mesh capabilities existing outside the core OSS proxy.

Extensibility

Limited in the open source version. Many advanced features depend on the broader Traefik ecosystem (e.g., Traefik Hub).

Security

Limited in OSS. More advanced features (JWT, OIDC, WAF) are part of the commercial offering.

Governance

Open source (MIT), but primarily driven by Traefik Labs.

Trade-offs

  • Very easy to operate and adopt
  • Lower feature depth in OSS
  • Reliance on commercial ecosystem for advanced capabilities
  • Less flexibility for complex scenarios

KGateway

Alignment with Gateway API

Medium-high. Supports most resources but evolves more slowly alongside the specification.

Operational model and complexity

Control plane model similar to Envoy Gateway. May require additional components (e.g., Istio) for certain capabilities like mTLS, increasing complexity in some scenarios.

Scope: gateway vs platform

Focused on north-south traffic, with additional specialization for AI and microservices workloads via agentgateway. Not a full service mesh.

Extensibility

Provides its own CRDs (TrafficPolicy, HTTPListenerPolicy, DirectResponse) to extend functionality, particularly around traffic control and resilience.

Security

Moderate. Covers common needs (CORS, CSRF, access logging), with mTLS often relying on external systems like Istio.

Governance

Open source (Apache 2.0), CNCF Sandbox project. Earlier-stage maturity despite a longer history (formerly Gloo, created by Solo.io).

Trade-offs

  • Strong fit for specialized (especially AI-driven) use cases
  • Less mature and slower-moving than alternatives
  • Some overlap with evolving Gateway API features
  • May require complementary tooling for full capabilities
ImplementationAlignment with Gateway APIOperational Model & ComplexityScope (Gateway vs Platform)ExtensibilitySecurityGovernanceTrade-offs
Envoy GatewayStrong alignment, spec-first model. Supports core (Gateway, HTTPRoute, GRPCRoute) and experimental (TCPRoute, UDPRoute, TLSRoute) resources. Tracks spec closely.Clear control plane / data plane. Translates Gateway API → Envoy xDS. Scalable but moderate operational overhead.Gateway-focused (north-south), integrates well with mesh and observability ecosystems.Structured CRDs (BackendTrafficPolicy, ClientTrafficPolicy, SecurityPolicy) aligned with spec philosophy.
  • JWT
  • mTLS
  • API keys
  • Basic Auth
  • OIDC
  • CORS
  • External auth
OSS (Apache 2.0), part of Envoy ecosystem, CNCF-aligned, mature governance.
  • Strong spec alignment
  • Mature data plane
  • Extensions reduce portability
  • Moderate complexity
IstioHigh and improving. Gateway API supported but coexists with Istio CRDs.High complexity. Full control plane (istiod) + distributed proxies. Significant operational investment.Gateway + Mesh (north-south + east-west). Broadest scope.
  • Wasm-based extensibility (still evolving)
  • Istio CRDs
  • Strong overall (especially mesh)
  • Solid but less extensive for ingress
OSS (Apache 2.0), CNCF Graduated, highly mature.
  • Unified platform
  • Very powerful but operationally heavy
  • Multiple APIs
  • Steep learning curve
NGINX Gateway FabricHigh. Supports standard and experimental resources with steady updates.Controller + proxy model. Familiar, complexity increases with NGINX Plus.Gateway-focused (north-south), strong fit within NGINX ecosystem.
  • RateLimitPolicy
  • AuthenticationFilter
  • SnippetsPolicy
Tightly coupled to NGINX.
  • Moderate (OSS)
  • Stronger with NGINX Plus
OSS (Apache 2.0), but closely tied to NGINX/F5.
  • Strong ecosystem continuity
  • Flexible but coupled
  • Advanced features may require commercial version
  • Less neutral governance
Traefik ProxyHigh. Solid Gateway API adoption.Simplified: proxy acts as control + data plane. Low operational overhead.Gateway-focused (north-south). Mesh outside core OSS offering.Limited in OSS. Advanced features tied to broader ecosystem (e.g., Traefik Hub).
  • Low (OSS)
  • Higher in commercial offering
OSS (MIT), vendor-led by Traefik Labs.
  • Easy to operate
  • Lower feature depth
  • Reliance on commercial ecosystem
  • Less suited for complex scenarios
KGatewayMedium-high. Supports most resources but evolves more slowly.Control plane model similar to Envoy. May require Istio for some capabilities.Gateway-focused (north-south) with specialization in AI/microservices.
  • TrafficPolicy
  • HTTPListenerPolicy
  • DirectResponse
Some overlap with evolving spec.
  • Moderate
  • mTLS often via Istio
OSS (Apache 2.0), CNCF Sandbox, emerging maturity.
  • Strong for AI/specialized use cases
  • Less mature
  • Slower spec alignment
  • May require complementary tooling

How to Choose the Right Gateway API Implementation for Your Platform

Based on real-world platform engineering experience, here is how we’d reason through the decision:

  • If your primary goal is replacing Ingress with something that’s genuinely designed around Gateway API’s model, Envoy Gateway is the most coherent choice. Its extension model, security depth, and alignment with the spec’s evolution make it the strongest general-purpose option for most platform teams. You’re not betting on a controller that bolted on Gateway API support, you’re adopting one that was built around it.
  • If you need to unify ingress and service mesh under a single platform, Istio is the only option that credibly addresses both. This is the right call when internal service-to-service complexity has reached the point where a mesh is genuinely warranted — not as a hedge, but as a response to a clear operational need. If you’re not yet at that point, defer this decision. Don’t buy mesh complexity to solve an ingress problem.
  • If your organization has deep operational investment in NGINX and continuity matters more than feature breadth, NGINX Gateway Fabric is a pragmatic choice. You’ll trade some security depth and governance neutrality for a smoother operational transition. For teams where that trade-off is acceptable, it’s defensible.
  • If you’re operating a smaller platform and want to minimize moving parts, Traefik Proxy’s simpler architecture has real appeal. Go in with clear eyes about where the commercial tier begins, and make sure your projected security and extensibility requirements don’t outpace what the OSS proxy provides.
  • If AI workloads are a first-class concern for your platform, KGateway deserves evaluation that the other controllers don’t need. The capabilities it adds for LLM routing and agent-oriented infrastructure are unique. Accept the trade-off on security depth and spec cadence, and plan for a less mature operational knowledge base.

Final Thoughts: Choosing the Right Gateway API Strategy

In the first article in this series, we saw that Ingress solved an important problem, but many teams have reached the limits of what it was designed to handle.

Gateway API addresses those structural problems. But Gateway API is a contract, not an outcome.

The implementation you choose determines how that model behaves in practice—how much complexity you carry forward, how your teams collaborate, and how your platform evolves over time.

The goal isn’t just to move beyond Ingress—it’s to avoid carrying its hidden complexity into your next architecture.

For most of the platforms we’ve worked with, Envoy Gateway represents the most durable starting point: built around the spec, strong on security, governed openly, and with an extension model that’s designed to stay coherent as the ecosystem matures. That’s not a universal answer. But it’s where we’d start, and where we’ve seen teams find the most confidence on both day one and day two.