Cloud LLM providers
Set up cloud LLM providers with AI Gateway.
Before you begin
- Set up AI Gateway.
Get the external address of the gateway and save it in an environment variable.
export INGRESS_GW_ADDRESS=$(kubectl get svc -n kgateway-system ai-gateway -o jsonpath="{.status.loadBalancer.ingress[0]['hostname','ip']}") echo $INGRESS_GW_ADDRESS
kubectl port-forward deployment/ai-gateway -n kgateway-system 8080:8080
- Choose a supported LLM provider.
Supported LLM providers
The examples throughout the AI Gateway docs use OpenAI as the LLM provider, but you can use other providers that are supported by AI Gateway.
Cloud providers
Kgateway supports the following AI cloud providers:
- Anthropic
- Azure OpenAI
- Gemini
- OpenAI. You can also use
openai
support for LLM providers that use the OpenAI API, such as DeepSeek and Mistral. - Vertex AI
Local providers
You can use kgateway with a local LLM provider, such as the following common options:
- Ollama for local LLM development.
- Gateway API Inference Extension project to route requests to local LLM workloads that run in your cluster.
OpenAI
OpenAI is the most common LLM provider, and the examples throughout the AI Gateway docs use OpenAI. You can adapt these examples to your own provider, especially ones that use the OpenAI API, such as DeepSeek and Mistral.
To set up OpenAI, continue with the Authenticate to the LLM guide.
Gemini
-
Save your Gemini API key as an environment variable. To retrieve your API key, log in to the Google AI Studio and select API Keys.
export GOOGLE_KEY=<your-api-key>
-
Create a secret to authenticate to Google. For other ways to authenticate, see the Auth guide.
kubectl apply -f - <<EOF apiVersion: v1 kind: Secret metadata: name: google-secret namespace: kgateway-system labels: app: ai-gateway type: Opaque stringData: Authorization: $GOOGLE_KEY EOF
-
Create a Backend resource to define the Gemini destination.
kubectl apply -f- <<EOF apiVersion: gateway.kgateway.dev/v1alpha1 kind: Backend metadata: labels: app: ai-gateway name: google namespace: kgateway-system spec: ai: llm: provider: gemini: apiVersion: v1beta authToken: kind: SecretRef secretRef: name: google-secret model: gemini-1.5-flash-latest type: AI EOF
Setting Description gemini
The Gemini AI provider. apiVersion
The API version of Gemini that is compatible with the model that you plan to use. In this example, you must use v1beta
because thegemini-1.5-flash-latest
model is not compatible with thev1
API version. For more information, see the Google AI docs.authToken
The authentication token to use to authenticate to the LLM provider. The example refers to the secret that you created in the previous step. model
The model to use to generate responses. In this example, you use the gemini-1.5-flash-latest
model. For more models, see the Google AI docs. -
Create an HTTPRoute resource to route requests to the Gemini backend. Note that kgateway automatically rewrites the endpoint that you set up (such as
/gemini
) to the appropriate chat completion endpoint of the LLM provider for you, based on the LLM provider that you set up in the Backend resource.kubectl apply -f- <<EOF apiVersion: gateway.networking.k8s.io/v1 kind: HTTPRoute metadata: name: google namespace: kgateway-system labels: app: ai-gateway spec: parentRefs: - name: ai-gateway namespace: kgateway-system rules: - matches: - path: type: PathPrefix value: /gemini backendRefs: - name: google namespace: kgateway-system group: gateway.kgateway.dev kind: Backend EOF
-
Send a request to the LLM provider API. Verify that the request succeeds and that you get back a response from the chat completion API.
curl "$INGRESS_GW_ADDRESS:8080/gemini" -H content-type:application/json -d '{ "contents": [ { "parts": [ { "text": "Explain how AI works in a few words" } ] } ] }' | jq
curl "localhost:8080/gemini" -H content-type:application/json -d '{ "contents": [ { "parts": [ { "text": "Explain how AI works in a few words" } ] } ] }' | jq
Example output:
{ "candidates": [ { "content": { "parts": [ { "text": "Learning patterns from data to make predictions.\n" } ], "role": "model" }, "finishReason": "STOP", "avgLogprobs": -0.017732446392377216 } ], "usageMetadata": { "promptTokenCount": 8, "candidatesTokenCount": 9, "totalTokenCount": 17, "promptTokensDetails": [ { "modality": "TEXT", "tokenCount": 8 } ], "candidatesTokensDetails": [ { "modality": "TEXT", "tokenCount": 9 } ] }, "modelVersion": "gemini-1.5-flash-latest", "responseId": "UxQ6aM_sKbjFnvgPocrJaA" }
Overriding LLM Provider Settings
You can customize the default endpoint paths and authentication headers for LLM providers using override settings. Overrides are useful when you need to route requests to custom API endpoints or use different authentication schemes while maintaining compatibility with the provider’s API structure. For example, Azure OpenAI supports authentication via an Authorization
or api-key
header.
By default, kgateway assumes that you provide your credentials in an Authorization
header. However, you might want to use an API key instead. This example walks you through how to override the default Authorization
header and customize the host URL and path for your LLM provider.
For more information, see the overrides in the LLM provider API docs.
-
Save your OpenAI API key as an environment variable. To retrieve your API key, log in to your OpenAI account dashboard and create or copy your API key.
export OPENAI_API_KEY=<your-api-key>
-
Create the authentication secret:
kubectl apply -f - <<EOF apiVersion: v1 kind: Secret metadata: name: azure-openai-secret namespace: kgateway-system labels: app: ai-gateway type: Opaque stringData: api-key: $AZURE_KEY EOF
-
Create a Backend resource that defines the custom overrides for your Azure OpenAI destination.
kubectl apply -f - <<EOF apiVersion: gateway.kgateway.dev/v1alpha1 kind: Backend metadata: name: azure-openai namespace: kgateway-system labels: app: ai-gateway spec: ai: llm: hostOverride: apic.ocp.provider.com pathOverride: /my-openai-service/gpt35/chat/completions provider: openai: model: gpt-4 authToken: kind: SecretRef secretRef: name: azure-openai-secret model: gpt-4o authHeaderOverride: headerName: api-key prefix: "" type: AI EOF
Setting Description authHeaderOverride
Overrides the default Authorization
header that is sent to the AI provider.headerName
The name of the header to use for authentication. Azure requires API keys to be sent in an "api-key"
header.prefix
The prefix for the auth token that is provided in the authentication header, such as Bearer
. By default, the prefix is an empty string. In this example, theprefix
is an empty string, because Azure OpenAI does not require a prefix for API keys that are provided in anapi-key
header.hostOverride
Set a custom host for your LLM provider. This host is used for all providers that are defined in the Backend. pathOverride
Provide a full path override for all API requests to the AI backend. -
Create an HTTPRoute resource to route requests to the Azure OpenAI backend. Note that kgateway automatically rewrites the endpoint that you set up (such as
/azure-openai
) to the appropriate chat completion endpoint of the LLM provider for you, based on the LLM provider that you set up in the Backend resource.kubectl apply -f - <<EOF apiVersion: gateway.networking.k8s.io/v1 kind: HTTPRoute metadata: name: azure-openai namespace: kgateway-system labels: app: ai-gateway spec: parentRefs: - name: ai-gateway namespace: kgateway-system rules: - matches: - path: type: PathPrefix value: /azure-openai backendRefs: - name: azure-openai namespace: kgateway-system group: gateway.kgateway.dev kind: Backend EOF
-
Send a request to the LLM provider API. Verify that the request succeeds and that you get back a response from the chat completion API.
curl "$INGRESS_GW_ADDRESS:8080/azure-openai" \ -H "Content-Type: application/json" \ -H "api-key: $API_KEY" \ -d '{ "messages": [ {"role": "user", "content": "Hello from Azure OpenAI!"} ], "max_tokens": 100 }' | jq
curl "localhost:8080/azure-openai" \ -H "Content-Type: application/json" \ -H "api-key: $API_KEY" \ -d '{ "messages": [ {"role": "user", "content": "Hello from Azure OpenAI!"} ], "max_tokens": 100 }' | jq
Example output:
{ "id": "chatcmpl-abc123", "object": "chat.completion", "created": 1699896916, "model": "gpt-4", "choices": [ { "index": 0, "message": { "role": "assistant", "content": "Hello! I'm Azure OpenAI, ready to help you with any questions or tasks you have." }, "finish_reason": "stop" } ], "usage": { "prompt_tokens": 12, "completion_tokens": 20, "total_tokens": 32 } }
Next
Now that you can send requests to an LLM provider, explore the other AI Gateway features.