Gateway Routing and DNS#

This guide explains how NVCF self-hosted deployments route traffic through the Kubernetes Gateway API, and how to configure DNS and HTTPS for production environments.

Overview#

The NVCF self-hosted deployment uses the Kubernetes Gateway API for ingress traffic management. This provides:

  • Hostname-based routing for HTTP services (API Keys, NVCF API, Invocation)

  • Port-based routing for gRPC services

  • Single load balancer for all NVCF services

  • Cross-namespace routing via ReferenceGrants

The Gateway API is a Kubernetes standard with multiple implementations. While the Control Plane Installation guide uses Envoy Gateway as the example, you can use any Gateway API-compliant controller.

Gateway API Implementations#

The nvcf-gateway-routes chart creates standard Kubernetes Gateway API resources (HTTPRoute, TCPRoute) that work with any Gateway API-compliant controller. You are not locked into a specific implementation.

Popular implementations include Envoy Gateway (used in our examples), Istio, Traefik, Kong, Contour, and cloud-native options like GKE Gateway Controller.

Note

There is no service mesh requirement: Envoy Gateway is not a service mesh—it’s simply a Gateway API controller. You don’t need service mesh features like mTLS between pods for NVCF to function. If you already have Istio or another service mesh, you can use its Gateway API support instead.

Minimum Requirements#

Any Gateway API implementation you choose must support:

  1. HTTPRoute - For HTTP/HTTPS routing with hostname matching

  2. TCPRoute - For gRPC routing (requires experimental Gateway API CRDs)

  3. Cross-namespace routing - Routes in one namespace referencing services in another

Warning

TCPRoute is experimental: Some Gateway API implementations may have limited or no TCPRoute support. Verify your chosen implementation supports TCPRoute before deploying. If it doesn’t, gRPC invocations won’t work through the gateway.

Using a Different Implementation#

To use a different Gateway API implementation instead of Envoy Gateway:

  1. Install your chosen controller following its documentation

  2. Create namespaces with nvcf/platform=true labels (same as Step 1)

  3. Create a GatewayClass for your controller

  4. Create a Gateway with http (port 80) and tcp (port 10081) listeners

  5. Update your helmfile environment to reference your Gateway:

    environments/<env>.yaml#
    ingress:
      gatewayApi:
        enabled: true
        gateways:
          shared:
            name: your-gateway-name      # Your Gateway resource name
            namespace: your-namespace     # Namespace where Gateway exists
            listenerName: http            # HTTP listener name
          grpc:
            name: your-gateway-name       # Can be same Gateway with different listener
            namespace: your-namespace
            listenerName: tcp             # TCP listener name for gRPC
    

The nvcf-gateway-routes chart will create HTTPRoutes and TCPRoutes that attach to your specified Gateway.

Not Using Gateway API#

While technically possible to bypass the Gateway API entirely, this is not recommended:

  • The nvcf-gateway-routes chart specifically creates Gateway API resources

  • You would need to manually create and maintain all routing configuration

  • Traditional Kubernetes Ingress does not support TCPRoute (required for gRPC)

  • Multiple LoadBalancer services would require multiple external IPs

If you have a specific requirement that prevents using Gateway API, you would need to:

  1. Disable nvcf-gateway-routes in your helmfile

  2. Create your own Ingress or Service resources for each NVCF service

  3. Configure hostname routing manually

  4. Set up a separate TCP load balancer for gRPC on port 10081

Gateway Architecture#

Components#

The gateway architecture consists of two layers:

User-Configured (Step 1 of Control Plane Installation)

These resources must be created manually before deploying the control plane:

  • Namespaces with nvcf/platform=true labels

  • Gateway API controller installation (Envoy Gateway, Istio, Traefik, etc.)

  • GatewayClass resource

  • Gateway resource with http (port 80) and tcp (port 10081) listeners

Auto-Created by nvcf-gateway-routes

When you deploy the control plane via helmfile, the nvcf-gateway-routes chart automatically creates:

  • HTTPRoutes for API Keys, NVCF API, and Invocation services

  • TCPRoute for gRPC

  • ReferenceGrants for cross-namespace routing permissions

These routes attach to the Gateway you created in Control Plane Installation Step 1.

Route Configuration#

Gateway Routing Architecture#

Service

Hostname Pattern

Listener Port

Description

API Keys

api-keys.<domain>

80

Token generation and API key management

NVCF API

api.<domain>

80

Function management (create, deploy, delete)

Invocation

invocation.<domain>, *.invocation.<domain>

80

Function invocation (wildcard for dynamic routing)

gRPC

N/A (TCP routing, no hostname matching)

10081

gRPC function invocations

Note

The <domain> is your Gateway’s load balancer address (e.g., a1b2c3d4.us-west-2.elb.amazonaws.com) or your custom domain. The helmfile deployment automatically configures the HTTPRoute hostnames using this value from your environment configuration.

How Routing Works#

  1. The Gateway’s LoadBalancer service exposes ports 80 (HTTP) and 10081 (gRPC) externally.

  2. HTTP requests arrive at port 80. The Gateway inspects the Host header and matches it against HTTPRoute hostnames.

  3. The matching HTTPRoute forwards the request to the appropriate backend service (e.g., api-keys service on port 8080).

  4. gRPC requests arrive at port 10081. The TCPRoute forwards all traffic directly to the grpc service—no hostname matching required.

Tip

gRPC doesn’t need Host headers because it uses a dedicated TCP listener on port 10081. The gateway routes all traffic on that port directly to the gRPC service without hostname matching.

Verifying Gateway Configuration#

After deploying the control plane, use these commands to verify your gateway configuration.

Get the Gateway Load Balancer Address#

# Get the gateway's external address (hostname or IP)
export GATEWAY_ADDR=$(kubectl get gateway nvcf-gateway -n envoy-gateway \
  -o jsonpath='{.status.addresses[0].value}')
echo "Gateway Address: $GATEWAY_ADDR"

Verify HTTPRoute Hostnames#

The gateway routes requests based on the Host header. Check what hostnames are configured:

# List all HTTPRoutes and their hostnames
kubectl get httproute -A -o jsonpath='{range .items[*]}{.metadata.name}: {.spec.hostnames[*]}{"\n"}{end}'

# Example output:
# api-keys: api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com
# nvcf-api: api.a1b2c3d4.us-west-2.elb.amazonaws.com
# invocation-service: *.invocation.a1b2c3d4.us-west-2.elb.amazonaws.com invocation.a1b2c3d4.us-west-2.elb.amazonaws.com

Verify gRPC TCPRoute#

# Check gRPC routing is configured
kubectl get tcproute -A
# Expected output:
# NAMESPACE       NAME   AGE
# envoy-gateway   grpc   19h

# Verify the gateway exposes port 10081
kubectl get svc -n envoy-gateway-system -l gateway.envoyproxy.io/owning-gateway-name=nvcf-gateway \
  -o jsonpath='{.items[0].spec.ports[*].port}'
# Expected output includes: 80 10081

Test Connectivity#

# Test HTTP endpoints with Host header
curl -H "Host: api-keys.$GATEWAY_ADDR" http://$GATEWAY_ADDR/health
curl -H "Host: api.$GATEWAY_ADDR" http://$GATEWAY_ADDR/health

# Test gRPC endpoint (requires grpcurl)
grpcurl -plaintext $GATEWAY_ADDR:10081 grpc.health.v1.Health/Check

Development: Host Header Routing#

For development and testing when you don’t have DNS configured, you can use Host header overrides to route requests through the gateway.

Why Host Headers Are Needed#

The Envoy Gateway uses hostname-based routing to direct traffic to different backend services through a single load balancer. When you send a request to the raw load balancer address (e.g., http://a1b2c3d4.elb.amazonaws.com), the gateway needs to know which service to route to.

Without the correct Host header, the gateway cannot match the request to an HTTPRoute and returns 404.

Warning

Host header routing only works with plaintext HTTP traffic. Without TLS/SNI spoofing support in your client, you cannot use HTTPS with this method. The TLS handshake occurs before the Host header is sent, so the server cannot route based on a custom Host header when using HTTPS. For encrypted traffic, use proper DNS records as described in Production: DNS and HTTPS.

Configuring Host Headers#

When using tools that support custom Host headers (like the NVCF CLI or curl), specify the expected hostname:

# Example: curl with Host header override
curl -H "Host: api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com" \
  http://a1b2c3d4.us-west-2.elb.amazonaws.com/v1/admin/keys

For the NVCF CLI, configure the *_host settings in your configuration file:

.nvcf-cli.yaml (development with Host headers)#
# Endpoints point to load balancer
base_http_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
invoke_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
api_keys_service_url: "http://a1b2c3d4.us-west-2.elb.amazonaws.com"
base_grpc_url: "a1b2c3d4.us-west-2.elb.amazonaws.com:10081"

# Host header overrides for routing
api_keys_host: "api-keys.a1b2c3d4.us-west-2.elb.amazonaws.com"
api_host: "api.a1b2c3d4.us-west-2.elb.amazonaws.com"
invoke_host: "invocation.a1b2c3d4.us-west-2.elb.amazonaws.com"

See Configuration for complete CLI configuration documentation.

Production: DNS and HTTPS#

For production deployments, configure proper DNS and TLS to eliminate the need for Host header overrides.

Benefits#

With proper DNS and HTTPS:

  • DNS records resolve service hostnames (e.g., api-keys.nvcf.example.com) to your Gateway’s load balancer

  • TLS certificates secure all traffic

  • Clients use simple URLs without Host header overrides

  • Browsers and other clients can access services directly

Step 1: Choose a Domain#

Select a domain you control for your NVCF deployment:

# Example domain structure
nvcf.example.com                    # Base domain
├── api-keys.nvcf.example.com       # API Keys service
├── api.nvcf.example.com            # NVCF API
├── invocation.nvcf.example.com     # Invocation service
├── *.invocation.nvcf.example.com   # Wildcard for function routing
└── grpc.nvcf.example.com           # gRPC endpoint (optional, for documentation)

Step 2: Create DNS Records#

Create DNS records pointing to your Gateway’s load balancer address:

# A/CNAME records (replace with your load balancer address)
api-keys.nvcf.example.com     → a1b2c3d4.us-west-2.elb.amazonaws.com
api.nvcf.example.com          → a1b2c3d4.us-west-2.elb.amazonaws.com
invocation.nvcf.example.com   → a1b2c3d4.us-west-2.elb.amazonaws.com
*.invocation.nvcf.example.com → a1b2c3d4.us-west-2.elb.amazonaws.com

AWS Route 53 Example:

# Get your Gateway load balancer address
GATEWAY_ADDR=$(kubectl get gateway nvcf-gateway -n envoy-gateway \
  -o jsonpath='{.status.addresses[0].value}')

# Create CNAME records (example using AWS CLI)
aws route53 change-resource-record-sets --hosted-zone-id YOUR_ZONE_ID --change-batch '{
  "Changes": [
    {"Action": "CREATE", "ResourceRecordSet": {"Name": "api-keys.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}},
    {"Action": "CREATE", "ResourceRecordSet": {"Name": "api.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}},
    {"Action": "CREATE", "ResourceRecordSet": {"Name": "invocation.nvcf.example.com", "Type": "CNAME", "TTL": 300, "ResourceRecords": [{"Value": "'$GATEWAY_ADDR'"}]}}
  ]
}'

Tip

Automate with external-dns: The nvcf-gateway-routes chart supports routeAnnotations for automatic DNS record creation via external-dns. See the chart’s README for configuration examples.

Step 3: Update HTTPRoute Hostnames#

Update your helmfile environment to use your custom domain instead of the load balancer address:

environments/<env>.yaml#
# Use your custom domain
domain: "nvcf.example.com"

# Gateway configuration remains the same
ingress:
  gatewayApi:
    enabled: true
    gateways:
      shared:
        name: nvcf-gateway
        namespace: envoy-gateway
        listenerName: http
      grpc:
        name: nvcf-gateway
        namespace: envoy-gateway
        listenerName: tcp

Redeploy to update the HTTPRoute hostnames:

helmfile -e <env> apply

Verify the routes updated:

kubectl get httproute -A -o jsonpath='{range .items[*]}{.metadata.name}: {.spec.hostnames[*]}{"\n"}{end}'
# Expected:
# api-keys: api-keys.nvcf.example.com
# nvcf-api: api.nvcf.example.com
# invocation-service: *.invocation.nvcf.example.com invocation.nvcf.example.com

Step 4: Configure TLS (HTTPS)#

For TLS, you have two main options:

Option A: TLS at the Load Balancer (Recommended for AWS)

Terminate TLS at the AWS NLB using ACM certificates:

  1. Request a certificate in AWS Certificate Manager for *.nvcf.example.com

  2. Update the Gateway to use HTTPS listeners

# Update Gateway listeners for TLS passthrough or termination
# This varies by cloud provider - consult your provider's documentation

Option B: TLS at the Gateway with cert-manager

Use cert-manager to automatically provision Let’s Encrypt certificates:

# Install cert-manager
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.0/cert-manager.yaml

# Create a ClusterIssuer for Let's Encrypt
kubectl apply -f - <<EOF
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: letsencrypt-prod
spec:
  acme:
    server: https://acme-v02.api.letsencrypt.org/directory
    email: your-email@example.com
    privateKeySecretRef:
      name: letsencrypt-prod
    solvers:
    - http01:
        gatewayHTTPRoute:
          parentRefs:
          - name: nvcf-gateway
            namespace: envoy-gateway
EOF

Then update your Gateway to use HTTPS listeners with the certificate secret.

Step 5: Update Client Configuration#

With DNS and HTTPS configured, client configurations simplify significantly:

.nvcf-cli.yaml (production with DNS/HTTPS)#
# Simple URLs using your domain - no Host header overrides needed!
base_http_url: "https://api.nvcf.example.com"
invoke_url: "https://invocation.nvcf.example.com"
base_grpc_url: "grpc.nvcf.example.com:443"
api_keys_service_url: "https://api-keys.nvcf.example.com"

# No host header overrides required - DNS handles routing
# api_keys_host: ""  # Not needed
# api_host: ""       # Not needed
# invoke_host: ""    # Not needed

Development vs Production Comparison#

Aspect

Development (Host Headers)

Production (DNS/HTTPS)

DNS Required

No

Yes

TLS/HTTPS

Optional (HTTP works)

Recommended

Client Config

Requires *_host overrides

Simple URLs only

Browser Access

Difficult (requires manual headers)

Works normally

Setup Complexity

Low (immediate testing)

Higher (DNS + certs)

Troubleshooting#

404 Errors#

If you receive 404 errors when accessing services:

  1. Verify Host header matches HTTPRoute hostname:

    kubectl get httproute api-keys -n envoy-gateway -o jsonpath='{.spec.hostnames}'
    
  2. Confirm the gateway is programmed:

    kubectl get gateway nvcf-gateway -n envoy-gateway -o jsonpath='{.status.conditions}'
    
  3. Check route attachment:

    kubectl describe httproute api-keys -n envoy-gateway | grep -A 5 "Parents"
    

Routes Not Attaching#

If routes show 0 attached in gateway status:

  1. Verify namespace labels:

    kubectl get ns -l nvcf/platform=true
    
  2. Check ReferenceGrants exist:

    kubectl get referencegrants -A
    
  3. Review gateway listener configuration:

    kubectl get gateway nvcf-gateway -n envoy-gateway -o yaml | grep -A 20 listeners
    

gRPC Connection Issues#

For gRPC connection problems:

  1. Verify port 10081 is exposed:

    kubectl get svc -n envoy-gateway-system -l gateway.envoyproxy.io/owning-gateway-name=nvcf-gateway
    
  2. Test with grpcurl:

    grpcurl -plaintext $GATEWAY_ADDR:10081 list
    
  3. Check TCPRoute status:

    kubectl describe tcproute grpc -n envoy-gateway