Gateway Routing and DNS
This guide explains how NVCF self-hosted deployments route traffic through the Kubernetes Gateway API, and how to configure DNS and HTTPS for production environments.
Overview
The NVCF self-hosted deployment uses the Kubernetes Gateway API for ingress traffic management. This provides:
- Hostname-based routing for HTTP services (API Keys, NVCF API, Invocation)
- Port-based routing for gRPC services
- Single load balancer for all NVCF services
- Cross-namespace routing via ReferenceGrants
The Gateway API is a Kubernetes standard with multiple implementations. While the helmfile-installation guide uses Envoy Gateway as the example, you can use any Gateway API-compliant controller.
Gateway API Implementations
The nvcf-gateway-routes chart creates standard Kubernetes Gateway API resources (HTTPRoute, TCPRoute) that work with any Gateway API-compliant controller. You are not locked into a specific implementation.
Popular implementations include Envoy Gateway (used in our examples), Istio, Traefik, Kong, Contour, and cloud-native options like GKE Gateway Controller.
There is no service mesh requirement: Envoy Gateway is not a service mesh—it’s simply a Gateway API controller. You don’t need service mesh features like mTLS between pods for NVCF to function. If you already have Istio or another service mesh, you can use its Gateway API support instead.
Minimum Requirements
Any Gateway API implementation you choose must support:
- HTTPRoute - For HTTP/HTTPS routing with hostname matching
- TCPRoute - For gRPC routing (requires experimental Gateway API CRDs)
- Cross-namespace routing - Routes in one namespace referencing services in another
TCPRoute is experimental: Some Gateway API implementations may have limited or no TCPRoute support. Verify your chosen implementation supports TCPRoute before deploying. If it doesn’t, gRPC invocations won’t work through the gateway.
Using a Different Implementation
To use a different Gateway API implementation instead of Envoy Gateway:
-
Install your chosen controller following its documentation
-
Create namespaces with
nvcf/platform=truelabels (same as Step 1) -
Create a GatewayClass for your controller
-
Create a Gateway with
http(port 80) andtcp(port 10081) listeners -
Update your helmfile environment to reference your Gateway:
The nvcf-gateway-routes chart will create HTTPRoutes and TCPRoutes that attach to your specified Gateway.
Not Using Gateway API
While technically possible to bypass the Gateway API entirely, this is not recommended:
- The
nvcf-gateway-routeschart specifically creates Gateway API resources - You would need to manually create and maintain all routing configuration
- Traditional Kubernetes Ingress does not support TCPRoute (required for gRPC)
- Multiple LoadBalancer services would require multiple external IPs
If you have a specific requirement that prevents using Gateway API, you would need to:
- Disable
nvcf-gateway-routesin your helmfile - Create your own Ingress or Service resources for each NVCF service
- Configure hostname routing manually
- Set up a separate TCP load balancer for gRPC on port 10081
Gateway Architecture
Components
The gateway architecture consists of two layers:
User-Configured (Step 1 of Control Plane Installation)
These resources must be created manually before deploying the control plane:
- Namespaces with
nvcf/platform=truelabels - Gateway API controller installation (Envoy Gateway, Istio, Traefik, etc.)
- GatewayClass resource
- Gateway resource with
http(port 80) andtcp(port 10081) listeners
Auto-Created by nvcf-gateway-routes
When you deploy the control plane via helmfile, the nvcf-gateway-routes chart automatically creates:
- HTTPRoutes for API Keys, NVCF API, and Invocation services
- TCPRoute for gRPC
- ReferenceGrants for cross-namespace routing permissions
These routes attach to the Gateway you created in helmfile-installation Step 1.
Route Configuration
The <domain> is your Gateway’s load balancer address (e.g., a1b2c3d4.us-west-2.elb.amazonaws.com) or your custom domain. The helmfile deployment automatically configures the HTTPRoute hostnames using this value from your environment configuration.
How Routing Works
- The Gateway’s LoadBalancer service exposes ports 80 (HTTP) and 10081 (gRPC) externally.
- HTTP requests arrive at port 80. The Gateway inspects the
Hostheader and matches it against HTTPRoute hostnames. - The matching HTTPRoute forwards the request to the appropriate backend service (e.g.,
api-keysservice on port 8080). - gRPC requests arrive at port 10081. The TCPRoute forwards all traffic directly to the
grpcservice—no hostname matching required.
gRPC doesn’t need Host headers because it uses a dedicated TCP listener on port 10081. The gateway routes all traffic on that port directly to the gRPC service without hostname matching.
Verifying Gateway Configuration
After deploying the control plane, use these commands to verify your gateway configuration.
Get the Gateway Load Balancer Address
Verify HTTPRoute Hostnames
The gateway routes requests based on the Host header. Check what hostnames are configured:
Verify gRPC TCPRoute
Test Connectivity
Development: Host Header Routing
For development and testing when you don’t have DNS configured, you can use Host header overrides to route requests through the gateway.
Why Host Headers Are Needed
The Envoy Gateway uses hostname-based routing to direct traffic to different backend services through a single load balancer. When you send a request to the raw load balancer address (e.g., http://a1b2c3d4.elb.amazonaws.com), the gateway needs to know which service to route to.
Without the correct Host header, the gateway cannot match the request to an HTTPRoute and returns 404.
Host header routing only works with plaintext HTTP traffic. Without TLS/SNI spoofing support in your client, you cannot use HTTPS with this method. The TLS handshake occurs before the Host header is sent, so the server cannot route based on a custom Host header when using HTTPS. For encrypted traffic, use proper DNS records as described in production-dns-https.
Configuring Host Headers
When using tools that support custom Host headers (like the NVCF CLI or curl), specify the expected hostname:
For the NVCF CLI, configure the *_host settings in your configuration file:
See cli-configuration for complete CLI configuration documentation.
Production: DNS and HTTPS
For production deployments, configure proper DNS and TLS to eliminate the need for Host header overrides.
Benefits
With proper DNS and HTTPS:
- DNS records resolve service hostnames (e.g.,
api-keys.nvcf.example.com) to your Gateway’s load balancer - TLS certificates secure all traffic
- Clients use simple URLs without Host header overrides
- Browsers and other clients can access services directly
Step 1: Choose a Domain
Select a domain you control for your NVCF deployment:
Step 2: Create DNS Records
Create DNS records pointing to your Gateway’s load balancer address:
AWS Route 53 Example:
Automate with external-dns: The nvcf-gateway-routes chart supports routeAnnotations for automatic DNS record creation via external-dns. See the chart’s README for configuration examples.
Step 3: Update HTTPRoute Hostnames
Update your helmfile environment to use your custom domain instead of the load balancer address:
Redeploy to update the HTTPRoute hostnames:
Verify the routes updated:
Step 4: Configure TLS (HTTPS)
For TLS, you have two main options:
Option A: TLS at the Load Balancer (Recommended for AWS)
Terminate TLS at the AWS NLB using ACM certificates:
- Request a certificate in AWS Certificate Manager for
*.nvcf.example.com - Update the Gateway to use HTTPS listeners
Option B: TLS at the Gateway with cert-manager
Use cert-manager to automatically provision Let’s Encrypt certificates:
Then update your Gateway to use HTTPS listeners with the certificate secret.
Step 5: Update Client Configuration
With DNS and HTTPS configured, client configurations simplify significantly:
Development vs Production Comparison
Troubleshooting
404 Errors
If you receive 404 errors when accessing services:
-
Verify Host header matches HTTPRoute hostname:
-
Confirm the gateway is programmed:
-
Check route attachment:
Routes Not Attaching
If routes show 0 attached in gateway status:
-
Verify namespace labels:
-
Check ReferenceGrants exist:
-
Review gateway listener configuration:
gRPC Connection Issues
For gRPC connection problems:
-
Verify port 10081 is exposed:
-
Test with grpcurl:
-
Check TCPRoute status:
Related Documentation
- helmfile-installation - Gateway setup in Step 1
- cli-configuration - CLI configuration including Host header settings
- Kubernetes Gateway API
- Envoy Gateway