Cloud Native 10 min read

Why Sealos Chose Higress: A Deep Dive into Cloud‑Native Gateway Evaluation

Sealos public cloud faced massive multi‑tenant Ingress demands, security concerns, and performance bottlenecks, leading the team to systematically test Nginx, Envoy, APISIX, Cilium, Envoy Gateway, and finally adopt Higress for its stability, fast route activation, and low resource footprint.

Alibaba Cloud Native
Alibaba Cloud Native
Alibaba Cloud Native
Why Sealos Chose Higress: A Deep Dive into Cloud‑Native Gateway Evaluation

Background and Requirements

Sealos public cloud has grown to over 87,000 registered users, each creating applications that need individual access endpoints, resulting in hundreds of thousands of Ingress entries. The platform must support massive Ingress scalability, strict multi‑tenant isolation, traffic control, and robust security against external attacks.

Why Nginx Ingress Was Dropped

Reloading on every Ingress change caused brief connection loss, which became frequent at scale.

Long‑living connections were unstable due to frequent changes.

Performance was poor: slow activation, high resource consumption, and occasional OOM crashes.

These issues led to the decision to eliminate Nginx‑based gateways.

Envoy‑Based Gateways Show Superior Performance

Benchmarks demonstrated that Envoy implementations consume far less control‑plane and data‑plane resources, handling massive routing tables without degrading performance.

APISIX Evaluation

APISIX solved many Nginx reload problems, but its Ingress Controller suffered from instability, controller crashes, and OOM incidents, making it unsuitable for Sealos’s production needs.

Cilium Gateway Limitations

Cilium Gateway only supports Load‑Balancer mode, tying the solution to cloud provider LB services and failing to meet private‑cloud scenarios. Additionally, route activation could take minutes, far exceeding the desired sub‑5‑second window.

Envoy Gateway Early‑Stage Issues

Although conceptually aligned with Sealos’s preference for Envoy, Envoy Gateway is still immature, exhibiting bugs such as OOM, non‑functional path policies, and missing features in merge‑gateway mode.

Gateway Standard Design Gaps

The current Kubernetes Gateway API mixes admin‑level fields (e.g., listener ports) with tenant‑level configurations, lacking clear permission separation. A more elegant design would move tenant‑specific fields into HTTPRoute or a dedicated CRD, allowing distinct admin and user privileges.

apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
  name: eg
spec:
  gatewayClassName: eg
  listeners:
  - name: http
    port: 80
    protocol: HTTP
  - name: https
    port: 443
    protocol: HTTPS
    tls:
      mode: Terminate
      certificateRefs:
      - kind: Secret
        name: example-com

Final Decision: Higress Wins

After a systematic elimination process, Higress emerged as the only gateway meeting Sealos’s production stability criteria. Key achievements include:

Ingress activation time reduced from >2 minutes to ~3 seconds via incremental configuration loading.

Resolved controller OOM issues and eliminated high‑resource consumption.

Mitigated occasional timeout problems by disabling the onDemandRDS feature.

Outstanding performance under massive routing and high concurrency, with minimal resource usage (see charts).

Full compatibility with existing Nginx Ingress annotations, enabling near‑zero migration effort.

Community support from the Higress team quickly addressed remaining bugs, reinforcing its reliability.

Community Feedback and Future Improvements

Better alignment with the evolving Gateway standard (full v1 compatibility).

Expose advanced security and circuit‑breaking capabilities, potentially as paid extensions.

Adopt a plugin architecture for peripheral features, keeping the core lightweight.

Conclusion

Gateways are critical for cloud platforms and applications. Sealos’s rigorous evaluation highlights the challenges of multi‑tenant, high‑scale environments and provides a reference for others facing similar decisions. The team will continue to contribute to open‑source gateway projects and collaborate with upstream communities.

Envoy vs Nginx performance comparison
Envoy vs Nginx performance comparison
Higress performance metrics
Higress performance metrics
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

performanceKubernetesIngressEnvoyHigress
Alibaba Cloud Native
Written by

Alibaba Cloud Native

We publish cloud-native tech news, curate in-depth content, host regular events and live streams, and share Alibaba product and user case studies. Join us to explore and share the cloud-native insights you need.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.