Advanced settings
You can update several installation settings in your Helm values file. For example, you can update the namespace, set resource limits and requests, or enable extensions such as for AI.
-
Show all values:
helm show values oci://cr.kgateway.dev/kgateway-dev/charts/kgateway --version v$NEW_VERSION -
Get a file with all values: You can get a
kgateway/values.yamlfile for the upgrade version by pulling and inspecting the Helm chart locally.helm pull oci://cr.kgateway.dev/kgateway-dev/charts/kgateway --version v$NEW_VERSION tar -xvf kgateway-v$NEW_VERSION.tgz open kgateway/values.yaml
For more information, see the Helm reference docs.
Development builds
When using the development build 2.4.0-main, add --set controller.image.pullPolicy=Always to ensure you get the latest image. For production environments, this setting is not recommended as it might impact performance.
Experimental Gateway API features
The KGW_ENABLE_EXPERIMENTAL_GATEWAY_API_FEATURES feature gate controls support for experimental Gateway API features such as the following:
- TCPRoutes
- TLSRoutes
- ListenerSets
- CORS policies
- Retries
- Session persistence
In kgateway version 2.2 and later, this setting defaults to true, so experimental features are enabled by default and no additional configuration is required. To disable these features, set the environment variable to false in your kgateway controller deployment in your Helm values file.
controller:
extraEnv:
KGW_ENABLE_EXPERIMENTAL_GATEWAY_API_FEATURES: "false"Leader election
Leader election is enabled by default to ensure that you can run kgateway in a multi-control plane replica setup for high availability.
You can disable leader election by setting the controller.disableLeaderElection to true in your Helm chart.
controller:
disableLeaderElection: trueNamespace discovery
You can limit the namespaces that kgateway watches for gateway configuration. For example, you might have a multi-tenant cluster with different namespaces for different tenants. You can limit kgateway to only watch a specific namespace for gateway configuration.
Namespace selectors are a list of matched expressions or labels.
matchExpressions: Use this field for more complex selectors where you want to specify an operator such asInorNotIn.matchLabels: Use this field for simple selectors where you want to specify a label key-value pair.
Each entry in the list is disjunctive (OR semantics). This means that a namespace is selected if it matches any selector.
You can also use matched expressions and labels together in the same entry, which is conjunctive (AND semantics).
The following example selects namespaces for discovery that meet either of the following conditions:
- The namespace has the label
environment=prodand the labelversion=v2, or - The namespace has the label
version=v3
discoveryNamespaceSelectors:
- matchExpressions:
- key: environment
operator: In
values:
- prod
matchLabels:
version: v2
- matchLabels:
version: v3TLS encryption
You can enable TLS encryption for the xDS gRPC server in the kgateway control plane. For more information, see the TLS encryption docs.
Strict validation
Kgateway supports two validation modes for routes and policies in the control plane: standard and strict. The validation mode controls how the control plane handles invalid configuration before it is sent to Envoy.
Validation modes
Kgateway supports the following validation modes. The mode is set globally on the controller through a single Helm value.
| Mode | Behavior |
|---|---|
standard (default) |
The control plane translates all valid resources and replaces invalid routes with a direct response (typically HTTP 500). Valid routes that are unrelated to the invalid resource are unaffected. This mode protects multi-tenant clusters from individual misconfiguration without dropping the entire snapshot. |
strict |
In addition to the standard behavior, the control plane runs an Envoy preflight validation against the generated xDS snapshot. If Envoy would reject the snapshot, the entire snapshot is blocked and the previous valid configuration remains in place. This mode prevents misconfigurations that would otherwise cause Envoy to NACK an xDS update from reaching the data plane. |
standard mode is the default and is appropriate for most production environments. strict mode is recommended when you cannot tolerate a NACKed xDS update reaching the data plane; for example, you might have downstream automation that depends on every accepted change being safe.
Enable strict validation
Set the validation.level Helm value to strict when you install or upgrade kgateway. Restart the control plane to apply the change.
validation:
level: strictInternally, the Helm chart passes the value to the control plane through the KGW_VALIDATION_MODE environment variable. If you manage the control plane deployment manually, set KGW_VALIDATION_MODE=STRICT on the kgateway container.
The accepted values for validation.level are standard and strict (case-insensitive). Any other value causes the Helm install to fail.
Verify the validation mode
To check which mode is active, inspect the KGW_VALIDATION_MODE environment variable on the kgateway controller deployment. The expected output is standard or strict.
kubectl -n kgateway-system get deployment kgateway \
-o jsonpath='{.spec.template.spec.containers[*].env[?(@.name=="KGW_VALIDATION_MODE")].value}'Transformation policies and strict validation
Strict validation runs the preflight against an Envoy binary that is bundled in the kgateway control plane image. The control plane image is built from the envoy-wrapper image, which bundles the rustformation dynamic module, and the validator sets ENVOY_DYNAMIC_MODULES_SEARCH_PATH=/usr/local/lib before invoking the preflight. As a result, the preflight understands rustformation per-route config and can validate TrafficPolicies that use transformation.
For more information about transformation engines, see Transformation engines.