Skip to main content
27.04.2026

Gateway API v1.5 for Safer Kubernetes Traffic Control

head-image

Gateway API has been steadily becoming the cleaner replacement for annotation-heavy ingress setups. For SRE and platform teams, the new v1.5 release matters because it turns more real production traffic patterns into first-class Kubernetes APIs.

What Is New in Gateway API v1.5?

The Kubernetes SIG Network release promotes six features to the standard channel, with the biggest operational wins coming from ListenerSet, TLSRoute, client certificate validation, and ReferenceGrant.

  • ListenerSet lets multiple teams attach listeners to a shared Gateway without editing the same object
  • TLSRoute adds SNI-based routing for encrypted TCP streams
  • frontend client certificate validation makes mTLS policy easier to express at the gateway layer
  • HTTPRoute CORS filters reduce controller-specific workarounds for browser-facing apps
  • ReferenceGrant is now stable, which is useful for controlled cross-namespace references

This is the kind of release that helps teams move from basic north-south routing to policy-driven traffic management.

Why Platform Teams Should Care

Classic Ingress was good enough for simple HTTP exposure, but it gets awkward when ownership is split across teams, TLS policy becomes stricter, or you need richer routing than host and path matching. Gateway API v1.5 addresses those gaps with clearer resource boundaries and safer delegation.

The standout feature for large clusters is ListenerSet. It lets a platform team own the shared gateway while application teams contribute their own listeners. That reduces coordination overhead and makes multi-tenant traffic management easier.

Installation

Install the standard v1.5.1 API bundle first:

kubectl apply -f \
  https://github.com/kubernetes-sigs/gateway-api/releases/download/v1.5.1/standard-install.yaml

That installs the Gateway API CRDs, not a data plane. You still need a controller that implements Gateway API, such as Cilium, Envoy Gateway, or NGINX Gateway Fabric.

Usage

A simple TLSRoute example shows why this release is useful. You can match on SNI and keep traffic encrypted all the way to the backend when you use passthrough mode.

apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
  name: edge
spec:
  gatewayClassName: example-gateway-class
  listeners:
    - name: tls-passthrough
      protocol: TLS
      port: 8443
      tls:
        mode: Passthrough
---
apiVersion: gateway.networking.k8s.io/v1
kind: TLSRoute
metadata:
  name: payments
spec:
  parentRefs:
    - name: edge
      sectionName: tls-passthrough
  hostnames:
    - pay.example.com
  rules:
    - backendRefs:
        - name: payments-svc
          port: 8443

This pattern is useful when the backend must terminate TLS itself or when you do not want private keys stored at the gateway tier.

Operational Tips

Start by identifying where your current ingress setup relies on annotations, custom CRDs, or manual ownership rules. Those are the places where Gateway API usually pays off fastest. Check Ingress2Gateway too if you want a phased transition.

Conclusion

Gateway API v1.5 feels like a practical maturity milestone. If your team wants stronger traffic policy, cleaner multi-team ownership, and better TLS control in Kubernetes, this is a good release to test now.

If you are building reliable, AI-assisted operations, Akmatori helps teams automate infrastructure workflows and incident response. Backed by Gcore, we are building tools for modern SRE and platform teams.

Automate incident response and prevent on-call burnout with AI-driven agents!