Gateway Routing and DNS#
This guide explains how NVCF self-hosted deployments route traffic through the Kubernetes Gateway API, and how to configure DNS and HTTPS for production environments.
Overview#
The NVCF self-hosted deployment uses the Kubernetes Gateway API for ingress traffic management. This provides:
Hostname-based routing for HTTP services (API Keys, NVCF API, Invocation)
Port-based routing for gRPC services
Single load balancer for all NVCF services
Cross-namespace routing via ReferenceGrants
The Gateway API is a Kubernetes standard with multiple implementations. While the Control Plane Installation guide uses Envoy Gateway as the example, you can use any Gateway API-compliant controller.
Gateway API Implementations#
The nvcf-gateway-routes chart creates standard Kubernetes Gateway API resources (HTTPRoute, TCPRoute) that work with any Gateway API-compliant controller. You are not locked into a specific implementation.
Popular implementations include Envoy Gateway (used in our examples), Istio, Traefik, Kong, Contour, and cloud-native options like GKE Gateway Controller.
Note
There is no service mesh requirement: Envoy Gateway is not a service mesh—it’s simply a Gateway API controller. You don’t need service mesh features like mTLS between pods for NVCF to function. If you already have Istio or another service mesh, you can use its Gateway API support instead.
Minimum Requirements#
Any Gateway API implementation you choose must support:
HTTPRoute - For HTTP/HTTPS routing with hostname matching
TCPRoute - For gRPC routing (requires experimental Gateway API CRDs)
Cross-namespace routing - Routes in one namespace referencing services in another
Warning
TCPRoute is experimental: Some Gateway API implementations may have limited or no TCPRoute support. Verify your chosen implementation supports TCPRoute before deploying. If it doesn’t, gRPC invocations won’t work through the gateway.
Using a Different Implementation#
To use a different Gateway API implementation instead of Envoy Gateway:
Install your chosen controller following its documentation
Create namespaces with
nvcf/platform=truelabels (same as Step 1)Create a GatewayClass for your controller
Create a Gateway with
http(port 80) andtcp(port 10081) listenersUpdate your helmfile environment to reference your Gateway:
environments/<env>.yaml#ingress: gatewayApi: enabled: true gateways: shared: name: your-gateway-name # Your Gateway resource name namespace: your-namespace # Namespace where Gateway exists listenerName: http # HTTP listener name grpc: name: your-gateway-name # Can be same Gateway with different listener namespace: your-namespace listenerName: tcp # TCP listener name for gRPC
The nvcf-gateway-routes chart will create HTTPRoutes and TCPRoutes that attach to your specified Gateway.
Not Using Gateway API#
While technically possible to bypass the Gateway API entirely, this is not recommended:
The
nvcf-gateway-routeschart specifically creates Gateway API resourcesYou would need to manually create and maintain all routing configuration
Traditional Kubernetes Ingress does not support TCPRoute (required for gRPC)
Multiple LoadBalancer services would require multiple external IPs
If you have a specific requirement that prevents using Gateway API, you would need to:
Disable
nvcf-gateway-routesin your helmfileCreate your own Ingress or Service resources for each NVCF service
Configure hostname routing manually
Set up a separate TCP load balancer for gRPC on port 10081
Gateway Architecture#
Components#
The gateway architecture consists of two layers:
User-Configured (Step 1 of Control Plane Installation)
These resources must be created manually before deploying the control plane:
Namespaces with
nvcf/platform=truelabelsGateway API controller installation (Envoy Gateway, Istio, Traefik, etc.)
GatewayClass resource
Gateway resource with
http(port 80) andtcp(port 10081) listeners
Auto-Created by nvcf-gateway-routes
When you deploy the control plane via helmfile, the nvcf-gateway-routes chart automatically creates:
HTTPRoutes for API Keys, NVCF API, and Invocation services
TCPRoute for gRPC
ReferenceGrants for cross-namespace routing permissions
These routes attach to the Gateway you created in Control Plane Installation Step 1.
Route Configuration#
Service |
Hostname Pattern |
Listener Port |
Description |
|---|---|---|---|
API Keys |
|
80 |
Token generation and API key management |
NVCF API |
|
80 |
Function management (create, deploy, delete) |
Invocation |
|
80 |
Function invocation (wildcard for dynamic routing) |
gRPC |
N/A (TCP routing, no hostname matching) |
10081 |
gRPC function invocations |
Note
The <domain> is your Gateway’s load balancer address (e.g., a1b2c3d4.us-west-2.elb.amazonaws.com) or your custom domain. The helmfile deployment automatically configures the HTTPRoute hostnames using this value from your environment configuration.
How Routing Works#
The Gateway’s LoadBalancer service exposes ports 80 (HTTP) and 10081 (gRPC) externally.
HTTP requests arrive at port 80. The Gateway inspects the
Hostheader and matches it against HTTPRoute hostnames.The matching HTTPRoute forwards the request to the appropriate backend service (e.g.,
api-keysservice on port 8080).gRPC requests arrive at port 10081. The TCPRoute forwards all traffic directly to the
grpcservice—no hostname matching required.
Tip
gRPC doesn’t need Host headers because it uses a dedicated TCP listener on port 10081. The gateway routes all traffic on that port directly to the gRPC service without hostname matching.
Verifying Gateway Configuration#
After deploying the control plane, use these commands to verify your gateway configuration.
Get the Gateway Load Balancer Address#
# Get the gateway's external address (hostname or IP)
export GATEWAY_ADDR=$(kubectl get gateway nvcf-gateway -n envoy-gateway \
-o jsonpath='{.status.addresses[0].value}')
echo "Gateway Address: $GATEWAY_ADDR"
Verify HTTPRoute Hostnames#
The gateway routes requests based on the Host header. Check what hostnames are configured:
# List all HTTPRoutes and their hostnames
kubectl get httproute -A -o jsonpath='{range .items[*]}{.metadata.name}: {.spec.hostnames[*]}{"\n"}{end}'
# Example output:
# api-keys: api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com
# nvcf-api: api.a1b2c3d4.us-west-2.elb.amazonaws.com
# invocation-service: *.invocation.a1b2c3d4.us-west-2.elb.amazonaws.com invocation.a1b2c3d4.us-west-2.elb.amazonaws.com
Verify gRPC TCPRoute#
# Check gRPC routing is configured
kubectl get tcproute -A
# Expected output:
# NAMESPACE NAME AGE
# envoy-gateway grpc 19h
# Verify the gateway exposes port 10081
kubectl get svc -n envoy-gateway-system -l gateway.envoyproxy.io/owning-gateway-name=nvcf-gateway \
-o jsonpath='{.items[0].spec.ports[*].port}'
# Expected output includes: 80 10081
Test Connectivity#
# Test HTTP endpoints with Host header
curl -H "Host: api-keys.$GATEWAY_ADDR" http://$GATEWAY_ADDR/health
curl -H "Host: api.$GATEWAY_ADDR" http://$GATEWAY_ADDR/health
# Test gRPC endpoint (requires grpcurl)
grpcurl -plaintext $GATEWAY_ADDR:10081 grpc.health.v1.Health/Check
Development: Host Header Routing#
For development and testing when you don’t have DNS configured, you can use Host header overrides to route requests through the gateway.
Why Host Headers Are Needed#
The Envoy Gateway uses hostname-based routing to direct traffic to different backend services through a single load balancer. When you send a request to the raw load balancer address (e.g., http://a1b2c3d4.elb.amazonaws.com), the gateway needs to know which service to route to.
Without the correct Host header, the gateway cannot match the request to an HTTPRoute and returns 404.
Warning
Host header routing only works with plaintext HTTP traffic. Without TLS/SNI spoofing support in your client, you cannot use HTTPS with this method. The TLS handshake occurs before the Host header is sent, so the server cannot route based on a custom Host header when using HTTPS. For encrypted traffic, use proper DNS records as described in Production: DNS and HTTPS.
Configuring Host Headers#
When using tools that support custom Host headers (like the NVCF CLI or curl), specify the expected hostname:
# Example: curl with Host header override
curl -H "Host: api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com" \
http://a1b2c3d4.us-west-2.elb.amazonaws.com/v1/admin/keys
For the NVCF CLI, configure the *_host settings in your configuration file:
# Endpoints point to load balancer
base_http_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
invoke_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
api_keys_service_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
base_grpc_url: "a1b2c3d4.us-west-2.elb.amazonaws.com:10081"
# Host header overrides for routing
api_keys_host: "api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com"
api_host: "api.a1b2c3d4.us-west-2.elb.amazonaws.com"
invoke_host: "invocation.a1b2c3d4.us-west-2.elb.amazonaws.com"
See Configuration for complete CLI configuration documentation.
Production: DNS and HTTPS#
For production deployments, configure proper DNS and TLS to eliminate the need for Host header overrides.
Benefits#
With proper DNS and HTTPS:
DNS records resolve service hostnames (e.g.,
api-keys.nvcf.example.com) to your Gateway’s load balancerTLS certificates secure all traffic
Clients use simple URLs without Host header overrides
Browsers and other clients can access services directly
Step 1: Choose a Domain#
Select a domain you control for your NVCF deployment:
# Example domain structure
nvcf.example.com # Base domain
├── api-keys.nvcf.example.com # API Keys service
├── api.nvcf.example.com # NVCF API
├── invocation.nvcf.example.com # Invocation service
├── *.invocation.nvcf.example.com # Wildcard for function routing
└── grpc.nvcf.example.com # gRPC endpoint (optional, for documentation)
Step 2: Create DNS Records#
Create DNS records pointing to your Gateway’s load balancer address:
# A/CNAME records (replace with your load balancer address)
api-keys.nvcf.example.com → a1b2c3d4.us-west-2.elb.amazonaws.com
api.nvcf.example.com → a1b2c3d4.us-west-2.elb.amazonaws.com
invocation.nvcf.example.com → a1b2c3d4.us-west-2.elb.amazonaws.com
*.invocation.nvcf.example.com → a1b2c3d4.us-west-2.elb.amazonaws.com
AWS Route 53 Example:
# Get your Gateway load balancer address
GATEWAY_ADDR=$(kubectl get gateway nvcf-gateway -n envoy-gateway \
-o jsonpath='{.status.addresses[0].value}')
# Create CNAME records (example using AWS CLI)
aws route53 change-resource-record-sets --hosted-zone-id YOUR_ZONE_ID --change-batch '{
"Changes": [
{"Action": "CREATE", "ResourceRecordSet": {"Name": "api-keys.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}},
{"Action": "CREATE", "ResourceRecordSet": {"Name": "api.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}},
{"Action": "CREATE", "ResourceRecordSet": {"Name": "invocation.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}}
]
}'
Tip
Automate with external-dns: The nvcf-gateway-routes chart supports routeAnnotations for automatic DNS record creation via external-dns. See the chart’s README for configuration examples.
Step 3: Update HTTPRoute Hostnames#
Update your helmfile environment to use your custom domain instead of the load balancer address:
# Use your custom domain
domain: "nvcf.example.com"
# Gateway configuration remains the same
ingress:
gatewayApi:
enabled: true
gateways:
shared:
name: nvcf-gateway
namespace: envoy-gateway
listenerName: http
grpc:
name: nvcf-gateway
namespace: envoy-gateway
listenerName: tcp
Redeploy to update the HTTPRoute hostnames:
helmfile -e <env> apply
Verify the routes updated:
kubectl get httproute -A -o jsonpath='{range .items[*]}{.metadata.name}: {.spec.hostnames[*]}{"\n"}{end}'
# Expected:
# api-keys: api-keys.nvcf.example.com
# nvcf-api: api.nvcf.example.com
# invocation-service: *.invocation.nvcf.example.com invocation.nvcf.example.com
Step 4: Configure TLS (HTTPS)#
For TLS, you have two main options:
Option A: TLS at the Load Balancer (Recommended for AWS)
Terminate TLS at the AWS NLB using ACM certificates:
Request a certificate in AWS Certificate Manager for
*.nvcf.example.comUpdate the Gateway to use HTTPS listeners
# Update Gateway listeners for TLS passthrough or termination
# This varies by cloud provider - consult your provider's documentation
Option B: TLS at the Gateway with cert-manager
Use cert-manager to automatically provision Let’s Encrypt certificates:
# Install cert-manager
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.0/cert-manager.yaml
# Create a ClusterIssuer for Let's Encrypt
kubectl apply -f - <<EOF
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-prod
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: your-email@example.com
privateKeySecretRef:
name: letsencrypt-prod
solvers:
- http01:
gatewayHTTPRoute:
parentRefs:
- name: nvcf-gateway
namespace: envoy-gateway
EOF
Then update your Gateway to use HTTPS listeners with the certificate secret.
Step 5: Update Client Configuration#
With DNS and HTTPS configured, client configurations simplify significantly:
# Simple URLs using your domain - no Host header overrides needed!
base_http_url: "https://api.nvcf.example.com"
invoke_url: "https://invocation.nvcf.example.com"
base_grpc_url: "grpc.nvcf.example.com:443"
api_keys_service_url: "https://api-keys.nvcf.example.com"
# No host header overrides required - DNS handles routing
# api_keys_host: "" # Not needed
# api_host: "" # Not needed
# invoke_host: "" # Not needed
Development vs Production Comparison#
Aspect |
Development (Host Headers) |
Production (DNS/HTTPS) |
|---|---|---|
DNS Required |
No |
Yes |
TLS/HTTPS |
Optional (HTTP works) |
Recommended |
Client Config |
Requires |
Simple URLs only |
Browser Access |
Difficult (requires manual headers) |
Works normally |
Setup Complexity |
Low (immediate testing) |
Higher (DNS + certs) |
Troubleshooting#
404 Errors#
If you receive 404 errors when accessing services:
Verify Host header matches HTTPRoute hostname:
kubectl get httproute api-keys -n envoy-gateway -o jsonpath='{.spec.hostnames}'
Confirm the gateway is programmed:
kubectl get gateway nvcf-gateway -n envoy-gateway -o jsonpath='{.status.conditions}'
Check route attachment:
kubectl describe httproute api-keys -n envoy-gateway | grep -A 5 "Parents"
Routes Not Attaching#
If routes show 0 attached in gateway status:
Verify namespace labels:
kubectl get ns -l nvcf/platform=true
Check ReferenceGrants exist:
kubectl get referencegrants -A
Review gateway listener configuration:
kubectl get gateway nvcf-gateway -n envoy-gateway -o yaml | grep -A 20 listeners
gRPC Connection Issues#
For gRPC connection problems:
Verify port 10081 is exposed:
kubectl get svc -n envoy-gateway-system -l gateway.envoyproxy.io/owning-gateway-name=nvcf-gateway
Test with grpcurl:
grpcurl -plaintext $GATEWAY_ADDR:10081 list
Check TCPRoute status:
kubectl describe tcproute grpc -n envoy-gateway