
INGRESS VS Gateway API - Whats the Difference?
The video compares Kubernetes Ingress with the newer Gateway API, highlighting their core functions and architectural differences. Both solutions rely on controllers deployed via kubectl or Helm to monitor resources—Ingress watches Ingress objects, while Gateway API controllers monitor Gateway resources—and they expose services through load balancers, either public or private. Key insights include the modular nature of Gateway API versus the monolithic configuration of Ingress. Gateway API introduces a split control plane: a Cluster‑wide GatewayClass defines available load‑balancer capabilities, and per‑namespace Gateways specify how traffic is received, TLS handling, and replica counts. This separation allows multiple data planes, enabling traffic isolation across namespaces or a shared plane for all traffic. The presenter notes that Ingress consolidates all HTTP routing, TLS certificates, URL rewrites, and backend definitions into one large YAML file, limiting flexibility. In contrast, Gateway API distributes these concerns, granting infrastructure teams control over load‑balancer features while Kubernetes admins manage traffic exposure. This modularity enhances security and clarifies responsibility boundaries. For businesses, adopting Gateway API can streamline multi‑tenant environments, improve security posture, and simplify operational hand‑offs between infrastructure and platform teams, especially as clusters scale and require finer‑grained traffic management.

HomeLab Migration From Ingress NGINX to Gateway API
The video walks through a step‑by‑step migration of a home‑lab Kubernetes cluster from the traditional NGINX Ingress controller to the emerging Gateway API, using the open‑source K‑Gateway implementation. The presenter first removes a YAML‑based cert‑manager installation and reinstalls it via Helm,...

How to Use CERT-MANAGER with Gateway API
The video walks through enabling TLS for services exposed via the Kubernetes Gateway API by leveraging cert-manager and Let’s Encrypt. It starts by provisioning a local Kind cluster, installing cert-manager through its Helm chart, and configuring a Cloudflare DNS record...