Skip to main content
Truefoundry’s globally distributed gateway is deployed across multiple regions and cloud providers to ensure high availability, low latency, and resilience against regional or cloud provider disruptions. The global gateway URL is https://gateway.truefoundry.ai.
gateway.truefoundry.ai is the unified endpoint for both the AI Model Gateway and the MCP Gateway.Whether you are routing LLM inference requests (OpenAI-compatible API, etc.) or connecting to MCP (Model Context Protocol) servers, all traffic goes through the same globally distributed infrastructure. This means MCP Gateway deployments benefit from the same multi-region, multi-cloud availability described on this page.
Architecture diagram showing the Control Plane in Ireland (Europe) managing configuration, with Gateway Planes handling LLM and MCP traffic across 14 global regions connected via NATS

Features

  1. Globally Distributed: Deployed across more than 12 regions around the globe and across 3 multiple cloud providers for maximum availability while minimizing latency.
  2. Automated Failover: All traffic is routed to the nearest gateway for minimum latency. In case of regional downtime, traffic is automatically routed to closest healthy regions ensuring uninterrupted service.
  3. Multi-Cloud Deployment: Distributed across multiple cloud providers to be tolerant to cloud provider-specific disruptions.
  4. Data Encryption: Data is encrypted at rest and in transit.
  5. Compliance: Truefoundry Infrastructure is SOC2, ISO27001, GDPR, and HIPAA compliant

Architecture

The SAAS global deployment follows the same Gateway Plane Architecture used across all Truefoundry deployments. It consists of two key components:
  • Control Plane — Manages all gateway configuration including models, users, teams, virtual accounts, rate-limiting, and routing configs. The SAAS control plane is hosted in Ireland (Europe).
  • Gateway Planes — Stateless, horizontally scalable gateway instances that handle all production traffic (LLM requests, MCP requests, etc.). These are deployed across the regions listed in the Regional Deployments section below.
The gateway planes subscribe to the control plane for configuration updates via NATS and perform all authentication, authorization, rate-limiting, and load-balancing checks in-memory with no external calls in the request path. For a detailed breakdown of the request flow, performance benchmarks, and FAQs, see the Gateway Plane Architecture page.
The specific regions and locations where gateway planes are deployed are subject to change based on Truefoundry’s internal infrastructure needs. Regions may be added, removed, or relocated without prior notice.

Global Deployment

For most use cases, we recommend using the global endpoint which automatically routes to the nearest healthy gateway:
DeploymentGlobal Endpoint
Global (Auto-routed)https://gateway.truefoundry.ai
Using the global URL (https://gateway.truefoundry.ai) is recommended as it automatically routes your requests to the nearest healthy gateway instance based on your geographic location to give you the minimum possible latency.

Regional Deployments

Each gateway region has its own URL and associated metadata. Every request routed through the SaaS gateway is automatically enriched with the tfy_gateway_region and tfy_gateway_zone metadata keys that identify which gateway region and zone handled the request. The Region and Zone columns in the table below show the values these keys will contain.
Please do not use the regional endpoints in production since they are subject to change at any point without notice.We recommend using the global endpoint (https://gateway.truefoundry.ai) for production use, or the region-specific endpoint described in the Multi-regional Deployments section.
Physical LocationCloud ProviderRegionZoneRegional Endpoint
North Virginia, United States (ORF)AWSUSORFhttps://orf.gateway.truefoundry.ai
San Francisco, United States (SFO)AzureUSSFOhttps://sfo.gateway.truefoundry.ai
Dallas, Texas, United States (DFW)GCPUSDFWhttps://dfw.gateway.truefoundry.ai
Toronto, Canada (YYZ)GCPCAYYZhttps://yyz.gateway.truefoundry.ai
Sao Paulo, Brazil (GRU)GCPSAGRUhttps://gru.gateway.truefoundry.ai
London, United Kingdom (LHR)AWSEULHRhttps://lhr.gateway.truefoundry.ai
Madrid, Spain (MAD)GCPEUMADhttps://mad.gateway.truefoundry.ai
Gavle, Sweden (GVX)AzureEUGVXhttps://gvx.gateway.truefoundry.ai
Cape Town, South Africa (CPT)AWSAFCPThttps://cpt.gateway.truefoundry.ai
Doha, Qatar (DIA)GCPUSDIAhttps://dia.gateway.truefoundry.ai
Mumbai, India (BOM)AWSINBOMhttps://bom.gateway.truefoundry.ai
Singapore, Singapore (SIN)AWSAPSINhttps://sin.gateway.truefoundry.ai
Melbourne, Australia (MEL)AWSAUMELhttps://mel.gateway.truefoundry.ai
Sydney, Australia (SYD)AWSAUSYDhttps://syd.gateway.truefoundry.ai
The tfy_gateway_region and tfy_gateway_zone keys are set automatically — you do not need to send them. They are part of the resolved metadata on every request and can be used for:For example, you can route US gateway traffic to Azure US-deployed models and EU gateway traffic to Azure EU-deployed models. See region-based routing with virtual models for a worked example.

Multi-regional Deployments

Multi-regional endpoints automatically route your requests to the closest healthy gateway within a specific geographic region. If all regional locations are unavailable, traffic is routed to the designated fallback regions.
RegionMulti-regional EndpointPrimary LocationsFallback Locations
United Stateshttps://us.gateway.truefoundry.aiNorth Virginia (ORF), San Francisco (SFO), Dallas (DFW)Toronto, Canada (YYZ)
Europehttps://eu.gateway.truefoundry.aiLondon (LHR), Madrid (MAD), Gavle (GVX)Doha, Qatar (DIA)
Australiahttps://au.gateway.truefoundry.aiSydney (SYD), Melbourne (MEL)Singapore (SIN)

Gateway Status Monitoring

To track the status of each gateway deployment and receive real-time updates on service availability, visit our status page: Gateway Status Page: status.truefoundry.com You can expand the AI Gateway section to see per-region uptime:
AI Gateway expanded view showing per-region uptime for each gateway deployment

Subscribe to Status Updates

Stay informed about gateway availability by subscribing to status notifications:
  1. Visit the Gateway Status Page
  2. Click the Get Updates button in the top right
  3. Choose your preferred notification method:
    • Email notifications
    • RSS Feed
    • On a custom webhook
Truefoundry status page with the Get Updates button highlighted in the top right

Connecting Your Private Models or MCP Servers to the Gateway

When you use the SAAS gateway to proxy requests to models or MCP servers hosted within your own infrastructure (e.g. inside a VPC), the gateway needs a network path to reach those endpoints. Depending on your security requirements and infrastructure setup, there are several approaches to establish this connectivity.
Instead of exposing your model or MCP server publicly, you can run cloudflared inside your infrastructure and establish an outbound tunnel to a Truefoundry-managed public domain. This avoids opening inbound ports while still allowing the gateway to reach your private services.
This is only available as part of our higher tier enterprise plans.
Setup flow
  1. Raise a request with the Truefoundry team with the following details:
    • private_service_url: The URL of the private service that hosts your MCP server or model. You can also setup a load balancer in front of multiple MCP servers or models to route traffic as needed. Eg - For an mcp server running within the same kubernetes cluster as cloudflared, it would be something like http://mcp-server.default.svc.cluster.local:8080.
  2. Truefoundry shares the following with you:
    • public_domain - The public domain that you can use to access your private service. For example <tenant-name>.private-endpoints.truefoundry.ai.
    • auth_token - The token that you can use to run cloudflared in your environment.
  3. Run cloudflared in your environment:
    cloudflared tunnel run --token <auth_token>
    
  4. You can now create the remote MCP server using https://<tenant-name>.private-endpoints.truefoundry.ai/mcp. For detailed MCP server setup instructions, see Getting started with MCP servers.
If none of the above options meet your requirements, you can self-host the Truefoundry gateway plane within your own infrastructure. In this setup, the gateway runs inside your VPC and has direct network access to your models and MCP servers — eliminating any need for public exposure or cross-network connectivity. Read more about self-hosting the gateway plane.

FAQ

Your client is automatically routed to the closest gateway region, so the round trip time (RTT) from your application to the gateway typically ranges from 20–50ms.If you are seeing higher latencies, please let us know and we will be happy to add another region closer to your use case.If you are self-hosting the gateway within your own infrastructure, the RTT from your application to the gateway will be on the order of ~1ms when both are running in the same cluster.