Kubernetes Gateway API Experimental Guide for Local Testing Released
Documentation walks through setting up Gateway API on kind for learning and testing without production complexity.
The Kubernetes project has published a new guide for experimenting with Gateway API using kind, providing a local testing environment without production complexity.
Guide Purpose
The documentation walks through setting up a local experimental environment with Gateway API on kind (Kubernetes in Docker). This setup helps developers understand Gateway API concepts without the overhead of production infrastructure.
Learning Gateway API
Gateway API represents the evolution of Kubernetes ingress, providing role-oriented design, better observability, and more flexible routing. The guide enables hands-on learning before committing to production deployment.
Experimental Environment
The kind-based approach isolates the learning environment, making it safe to experiment with Gateway API features. This follows the Kubernetes project's pattern of providing experimental guides for new features.
Related Articles
GitHub Expands Developer Platform with Actions Artifacts v5 and Copilot Extensions GA
GitHub has shipped Actions Artifacts v5 with immutable storage and artifact attestation for tamper-proof build outputs, alongside the general availability of Copilot Extensions that let third-party tools integrate directly into the Copilot chat experience. The platform also expanded GitHub Models with seven new providers.
Docker Engine 29.3 Ships with Native gRPC Support and BuildKit v0.28
Docker Engine 29.3.0 introduces native gRPC support on listening sockets, BuildKit v0.28.0, and a new bind-create-src option for flexible volume mounting. The release lowers the minimum API version to v1.40 for broader backward compatibility and fixes DNS configuration corruption during daemon reloads.
GitHub Adds Dependabot Pre-Commit Support and 28 New Secret Scanning Detectors
GitHub has shipped two major supply chain security features: Dependabot now parses .pre-commit-config.yaml files and opens PRs to update hook versions, while secret scanning gains 28 new detectors from 15 providers including Snowflake, Supabase, and Vercel. Push protection is now enabled by default for 39 secret types.