Skip to content
SYS.DOCS // DOCS

Domains and TLS

You can manage cluster-level domains from the Domains view. You can register single hostname or wildcard domains and use them to expose your traffic.

  • Wildcard domains: *.example.com for multiple deployment hostnames on the same traffic class. (recommended)
  • Hostname domains: app.example.com for a single public hostname with an HTTP-01 certificate. Only available for public Gateway API traffic classes.

Notes:

  • Wildcards are single level. *.example.com matches app.example.com, not app.dev.example.com.

  • Wildcard domains can target Gateway API, legacy ingress controllers or Tailscale tailnet (BYOD) Gateway classes.

  • Single hostname domains require a public Gateway API controller.

  • Direct tailscale ingress endpoints do not use the Domains view. When you select the direct tailscale traffic class, Edka builds the hostname from your tailnet DNS name and Tailscale manages the certificate. See Tailscale Tailnet Traffic Exposure. Private Gateway classes published with Tailscale tailnet (BYOD) can still use wildcard domains from the Domains view, but public HTTP-01 validation is not available on that traffic path.

  1. Open a cluster and go to Domains.
  2. Add either *.example.com or app.example.com.
  3. Select the traffic class.

Add Domain

The Domains view shows the recommended DNS records for the selected traffic class using its live endpoints.

Public Gateway API or legacy ingress controllers

Section titled “Public Gateway API or legacy ingress controllers”
  • Use the A or AAAA records shown in the UI.
  • For wildcard domains, point the wildcard record at the controller endpoint.
  • For hostname domains, point the exact hostname at the controller endpoint.
  • Private tailnet-published Gateway classes only use the wildcard CNAME shown in the UI.

Verify DNS Records

Edka provisions and renews wildcard certificates with cert-manager using the Edka DNS-01 webhook inside your cluster.

  • Create the delegation record shown in the domain details.
  • Name: _acme-challenge.example.com
  • Type: CNAME
  • Target: <delegation-id>.acme.edka.net

Make sure the record is DNS only, not proxied. After DNS propagates, Edka checks the delegation and tracks certificate status from the Domains view.

  • cert-manager add-on
  • Edka DNS-01 webhook add-on
  • Reflector add-on if you want to mirror secrets to multiple namespaces (only necessary for legacy ingress controllers)
  • Certificate name: wildcard-<domain-id>
  • Secret name: wildcard-<domain-id>-tls
  • Default namespace: envoy-gateway-system. For legacy ingress controllers, the default namespace is edka-system.
  • Allowed namespaces control where the secret is mirrored. (not necessary when using Gateway API)
  • If you plan to have a deployment in a namespace other than the default, for example the production namespace, you need to add the namespace to the allowed namespaces. The Reflector add-on will mirror the secret to the other namespaces. (only necessary for legacy ingress controllers)
  • Edka provisions a single Let’s Encrypt certificate using HTTP-01 validation on the selected public Gateway.
  • The certificate is managed on the Gateway and attached automatically.
  • Because HTTP-01 needs public reachability, single hostname domains are not available on private Gateway classes and Tailscale tailnet (BYOD) Gateway classes.
  • Wildcard domains are the most flexible option when you want to expose multiple deployments or applications under a single domain. For preview environments, only wildcard domains are supported.
  • Use single hostname domains when you want a single cluster-managed FQDN on a public Gateway API traffic class.
  • If you select the direct tailscale traffic class, skip the Domains flow and provide a tailnet subdomain instead in deployment or app networking/access form.