This documentation uses Gloo Gateway proxies with the Kubernetes Gateway API. To use the Edge API instead, click here. Note that some features, such as AI gateways, are not supported with the Edge API.
TLS passthrough
Set up a TLS listener on the Gateway that serves one or more hosts and passes TLS traffic through to a destination. Because TLS traffic is not terminated at the Gateway, the destination must be capable of handling incoming TLS traffic.
Make sure that you have the OpenSSL version of openssl, not LibreSSL. The openssl version must be at least 1.1.
Check your openssl version. If you see LibreSSL in the output, continue to the next step.
openssl version
Install the OpenSSL version (not LibreSSL). For example, you might use Homebrew.
brew install openssl
Review the output of the OpenSSL installation for the path of the binary file. You can choose to export the binary to your path, or call the entire path whenever the following steps use an openssl command.
For example, openssl might be installed along the following path: /usr/local/opt/openssl@3/bin/
To run commands, you can append the path so that your terminal uses this installed version of OpenSSL, and not the default LibreSSL. /usr/local/opt/openssl@3/bin/openssl req -new -newkey rsa:4096 -x509 -sha256 -days 3650...
Decide whether to set up an HTTP listener inline on the Gateway resource or as a separate ListenerSet resource. Note that ListenerSets are an experimental feature in the upstream Kubernetes Gateway API project, and subject to change. For more information, see the Listener overview.
Deploy an nginx server that is configured for HTTPS traffic link
Deploy a sample nginx server and configure the server for HTTPS traffic.
Create a root certificate for the example.com domain. You use this certificate to sign the certificate for your nginx service later.
To route TLS traffic to the nginx server directly without terminating the TLS connection at the Gateway, you create a Gateway and configure it for TLS passthrough. Then, you create a TLSRoute that represents the route to your nginx server and attach it to the Gateway.
Install the experimental channel of the Kubernetes Gateway API so that you can use TLSRoutes.
Review the following table to understand this configuration.
Setting
Description
spec.gatewayClassName
The name of the Kubernetes gateway class that you want to use to configure the gateway. When you set up Gloo Gateway, a default gateway class is set up for you. To view the gateway class configuration, see Gateway classes and types.
spec.listeners
Configure the listeners for this gateway. In this example, you configure a TLS listener in passthrough mode that listens for incoming traffic on port 8443.
spec.listeners.tls.mode
The TLS mode that you want to use for incoming requests. In passthrough mode, the gateway forwards the encrypted TLS traffic directly to the backend service without terminating the TLS connection, allowing the backend service to handle decryption and certificate management.
Create a Gateway that enables the attachment of ListenerSets.
Review the following table to understand this configuration.
Setting
Description
spec.gatewayClassName
The name of the Kubernetes gateway class that you want to use to configure the gateway. When you set up Gloo Gateway, a default gateway class is set up for you. To view the gateway class configuration, see Gateway classes and types.
spec.allowedListeners
Enable the attachment of ListenerSets to this Gateway. The example allows listeners from any namespace, which is helpful in multitenant environments. You can also limit the allowed listeners. To limit to listeners in the same namespace as the Gateway, set this value to Same. To limit to listeners with a particular label, set this value to Selector.
spec.listeners
Optionally, you can configure a listener that is specific to the Gateway. Note that due to a Gateway API limitation, you must configure at least one listener on the Gateway resource, even if the listener is not used and is a “dummy” listener. This dummy listener cannot conflict with the listener that you configure in the ListenerSet, such as using the same port or name. In this example, the dummy listener is configured on HTTP port 80, which differs from TLS port 8443 in the ListenerSet that you create later.
Create a ListenerSet that configures a TLS listener for the Gateway.
Review the following table to understand this configuration.
Setting
Description
spec.parentRef
The name of the Gateway to attach the ListenerSet to.
spec.listeners
Configure the listeners for this gateway. In this example, you configure a TLS listener in passthrough mode that listens for incoming traffic on port 8443.
spec.listeners.tls.mode
The TLS mode that you want to use for incoming requests. In passthrough mode, the gateway forwards the encrypted TLS traffic directly to the backend service without terminating the TLS connection, allowing the backend service to handle decryption and certificate management.
Create a TLSRoute resource that forwards incoming TLS traffic to the nginx server.
Get the external address of the gateway proxy and save it in an environment variable.external address of the gateway proxy and save it in an environment variable.
Send a request to the nginx.example.com domain and verify that you get back a 200 HTTP response code from your nginx server. Because nginx accepts incoming TLS traffic only, the 200 HTTP response code proves that TLS traffic was not terminated at the Gateway. In addition, you can verify that you get back the server certificate that you configured your nginx server with in the beginning.
* Request completely sent off
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Server: nginx/1.27.4
Server: nginx/1.27.4
...
<
<!DOCTYPE html>
<html>
<head>
<title>Welcome to nginx!</title>
<style>
html { color-scheme: light dark; }
body { width: 35em; margin: 0 auto;
font-family: Tahoma, Verdana, Arial, sans-serif; }
</style>
</head>
<body>
<h1>Welcome to nginx!</h1>
<p>If you see this page, the nginx web server is successfully installed and
working. Further configuration is required.</p>
<p>For online documentation and support please refer to
<a href="http://nginx.org/">nginx.org</a>.<br/>
Commercial support is available at
<a href="http://nginx.com/">nginx.com</a>.</p>
<p><em>Thank you for using nginx.</em></p>
</body>
</html>
* Connection #0 to host nginx.example.com left intact
Port-forward the tls-passthrough gateway proxy pod on port 8443.
Send a request to the nginx.example.com domain and verify that you get back a 200 HTTP response code from your nginx server. Because nginx accepts incoming TLS traffic only, the 200 HTTP response code proves that TLS traffic was not terminated at the Gateway. In addition, you can verify that you get back the server certificate that you configured your nginx server with in the beginning.
* Request completely sent off
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Server: nginx/1.27.4
Server: nginx/1.27.4
...
<
<!DOCTYPE html>
<html>
<head>
<title>Welcome to nginx!</title>
<style>
html { color-scheme: light dark; }
body { width: 35em; margin: 0 auto;
font-family: Tahoma, Verdana, Arial, sans-serif; }
</style>
</head>
<body>
<h1>Welcome to nginx!</h1>
<p>If you see this page, the nginx web server is successfully installed and
working. Further configuration is required.</p>
<p>For online documentation and support please refer to
<a href="http://nginx.org/">nginx.org</a>.<br/>
Commercial support is available at
<a href="http://nginx.com/">nginx.com</a>.</p>
<p><em>Thank you for using nginx.</em></p>
</body>
</html>
* Connection #0 to host nginx.example.com left intact