In a cloud-native environment, the core role of networking is to act as the central nervous system and circulatory system. It is the foundational enabler for key application characteristics like elasticity, resilience, and observability.
The responsibilities of cloud-native networking can be broken down into several key areas:
Responsibility: Automatically discover running microservice instances and intelligently distribute traffic among them.
Implementation:
Service Discovery
etcd)CoreDNS provides built-in discovery via service namesLoad Balancing
Service resources get Virtual IP (VIP)Responsibility: Control traffic with fine-grained rules to enable advanced deployment patterns.
Implementation:
Ingress
Service Mesh (Istio, Linkerd)
Responsibility: Enforce "Zero Trust" security model for authorized service communication.
Implementation:
Network Policies
Mutual TLS (mTLS)
Responsibility: Provide rich network data for understanding and diagnosing distributed systems.
Implementation:
Metrics
Logs
Tracing
Learn more about Networking Observability.
The container network is a comprehensive networking solution designed for cloud-native applications, ensuring seamless east-west communication within clusters and efficient north-south traffic management across external networks, while providing essential networking functionalities. It consists of these core components:
Gateway API is an official Kubernetes project focused on L4 and L7 routing in Kubernetes. This project represents the next generation of Kubernetes Ingress, Load Balancing, and Service Mesh APIs. From the outset, it has been designed to be generic, expressive, and role-oriented.
The overall resource model focuses on 3 separate personas and corresponding resources that they are expected to manage:

Most of the configuration in this API is contained in the Routing layer. These protocol-specific resources (HTTPRoute, GRPCRoute, etc.) enable advanced routing capabilities for both Ingress and Mesh.
When using Gateway API to manage ingress traffic, the Gateway resource defines a point of access at which traffic can be routed across multiple contexts -- for example, from outside the cluster to inside the cluster (north/south traffic).
Each Gateway is associated with a GatewayClass, which describes the actual kind of gateway controller that will handle traffic for the Gateway; individual routing resources (such as HTTPRoute) are then associated with the Gateway resources. Separating these different concerns into distinct resources is a critical part of the role-oriented nature of Gateway API, as well as allowing for multiple kinds of gateway controllers (represented by GatewayClass resources),
The following design goals drive the concepts of Gateway API. These demonstrate how Gateway aims to improve upon current standards like Ingress.
Some other notable capabilities include:
For more detailed descriptions of the Gateway API, please refer to the gateway-api documentation.
The Alauda Container Platform supports multiple ingress traffic specifications in Kubernetes ecosystem. This document compares them (Service, Ingress, Gateway API) to help users make the right choice.
Both LoadBalancer-type Services and Gateway API (TCP/UDP Routes) can expose Layer 4 traffic externally. However, they differ significantly in their implementation approach and performance characteristics.
Implementation: Kernel-space forwarding
Advantages:
Implementation: User-space proxy
Disadvantages:
We recommend using LoadBalancer-type Services for L4 traffic routing due to their superior performance and lower resource overhead.
Currently, we support LoadBalancer-type services through MetalLB.
While Ingress, GatewayAPI, can all expose L7 traffic externally, they differ in their capabilities.
Ingress is the standard specification adopted by the Kubernetes community and are recommended for default use. The Ingress is handled by ALB instances that are managed by the platform administrator.
Gateway API is the next-generation routing standard for Kubernetes, designed to address the limitations of Ingress and provide more powerful, flexible, and standardized traffic management capabilities. Compared to Ingress, Gateway API offers the following advantages:
Role-Oriented Design
Expressive Routing Capabilities
Protocol Support
Extensibility
Cross-Namespace Routing
Multiple Listeners per Gateway
Portability and Standardization
Attachment and Selection Model
parentRefsCurrently, we support GatewayApi through Envoygateway. For migration from ingress to gatewayapi please refer to migration guide
Example network traffic flow through an Alauda Container Platform cluster.
Flow explanation:
Client (Browser / curl).
The user sends an HTTPS request to https://www.example.com.
The client works at Layer 7, initiating a DNS lookup.
DNS Resolution.
DNS translates the domain name into a public IP address (e.g. 34.23.88.11).
[L4] External Load Balancer.
Operates at Layer 4 (TCP/UDP). It forwards incoming connections to backend nodes in the cluster. Examples: AWS NLB, GCP TCP LB, MetalLB.
[L7] Envoy Gateway / Ingress Controller.
Operates at Layer 7 (Application Layer). Handles:
TLS termination
Hostname and path-based routing
Policies and authentication
It routes traffic to the matching Kubernetes Service.
[L4] Kubernetes Service (ClusterIP)
Acts as an internal Layer 4 load balancer inside the cluster. Distributes requests to backend Pods based on selectors.
Pod (Application)
The final destination where the app runs and processes the request. The response follows the reverse path back to the client.