Skip to content
SYS.DOCS // DOCS

Gateway API

The Gateway tab is where you manage cluster traffic entry points in Edka. Envoy Gateway is the primary controller for public exposure and wildcard domain routing. Legacy ingress controllers such as ingress-nginx can still be used when you need compatibility with existing manifests.

With the Tailscale operator installed, you can create dedicated Envoy Gateway classes to expose your traffic privately into your tailnet.

  • Install and upgrade Envoy Gateway from the cluster Gateway tab.
  • Install Tailscale operator directly from the Gateway view when you need tailnet exposure.
  • Create additional Gateway classes backed by dedicated public or private load balancers, or published to your tailnet through Tailscale.
  • Review the load balancer addresses assigned to each Gateway class.
  • Inspect aggregate traffic metrics collected from Envoy proxy metrics.

Gateway API

When a cluster has Gateway API controllers available, the Overview tab shows a Gateway API summary card with:

  • The primary endpoints for the primary Gateway class.
  • A compact aggregate traffic panel with:
    • requests/s
    • 5xx
    • avg latency
    • active conns
  • The total number of detected Gateway classes.

This gives you a quick read on public exposure without opening the full Gateway screen.

Edka uses traffic classes to select how workloads are exposed.

  • The primary Envoy Gateway class is eg.
  • Additional Gateway classes can be created for dedicated public or private load balancers, or for private tailnet traffic exposure with Tailscale.
  • Each class receives its own load balancer address once provisioning finishes.

Deployments, wildcard domains, and public hostname domains can then target the appropriate traffic class. Single hostname domains require a public Gateway API class.

For internet facing workloads, point your DNS records to the primary Gateway API endpoints shown in cluster overview or the full Gateway view.

For wildcard domains:

  • Register the wildcard domain in Domains.
  • Select the traffic class that should bind with that domain.
  • Let cert-manager issue and renew TLS certificates for that traffic entry point.

For hostname domains:

  • Register the hostname in Domains.
  • Select a public Gateway API traffic class.
  • Cert-manager will issue and renew the certificate using HTTP-01 validation on the selected public Gateway.

For private tailnet routes, create a Gateway class with exposure mode Tailscale tailnet (BYOD). Envoy stays in-cluster, and the Gateway service is published to your tailnet through the Tailscale operator. Because that traffic class stays private, public Let’s Encrypt HTTP-01 validation is not available on that path. If the operator is not installed yet, the Gateway page shows an install action before you create the class.

NGINX Ingress remains available for compatibility with existing Ingress-based workloads, but Gateway API with Envoy Gateway is the recommended default for new clusters and new deployments in Edka.