Direct (PROXY-protocol) mode
A walkthrough of setting up Envoy Gateway when your cluster’s load balancer uses PROXY protocol v2
This section introduces Envoy Gateway as the ingress controller in our
Elastx Kubernetes CaaS service. We manage and upgrade the controller, the
Gateway API CRDs and the cluster-scoped
GatewayClass named eg. You create the Gateway API
objects that describe your own traffic in your own namespaces.
There are companion guides for the two ways traffic typically reaches the cluster. Pick the one that matches your setup:
In your own namespaces:
Gateway — listeners, ports, protocols, TLS.HTTPRoute, TCPRoute, GRPCRoute, TLSRoute — routing rules.ClientTrafficPolicy — controls PROXY-protocol handling, TLS parameters, timeouts.
Must live in the same namespace as your Gateway.BackendTrafficPolicy — retries, circuit breaking.SecurityPolicy — JWT, OIDC, CORS.BackendTLSPolicy — mTLS toward your backends.Certificate / Issuer (cert-manager) — typically one per namespace.You reference the cluster GatewayClass by its name eg from your
Gateway. You do not need to create or modify any cluster-scoped resources.
The OpenStack load balancer in front of Envoy runs in TCP mode in both
cases. The variants differ in how the real client IP arrives at
Envoy, and your ClientTrafficPolicy has to match.
ClientTrafficPolicy must enable proxy-protocol parsing.
See Direct (PROXY-protocol) mode.X-Forwarded-For; the load balancer
passes the request through unchanged. Your ClientTrafficPolicy must
trust that header with the right hop count.
See Proxy (X-Forwarded-For) mode.Both walkthroughs use a per-namespace cert-manager Issuer. This gives you
full self-service for custom domains and supports both HTTP-01 and DNS-01
validation. If you need a guide for installing cert-manager, see
Install and upgrade cert-manager.
For more advanced use cases please refer to the documentation provided by each project or contact our support:
A walkthrough of setting up Envoy Gateway when your cluster’s load balancer uses PROXY protocol v2
A walkthrough of setting up Envoy Gateway when your traffic arrives via an upstream proxy that injects X-Forwarded-For