-
Event Gateway
A Kafka proxy for controlled, secure client access to your Kafka cluster—both internal and external.
-
Kong Event Gateway architecture
How does Kong Event Gateway work?
-
Event Gateway Policies
An overview of policies that work with Event Gateway.
-
Kong Event Gateway version support policy
The Kong Event Gateway version support policy outlines the Kong Event Gateway versioning scheme and lifecycle, from release to sunset support.
Event Gateway Documentation
Overview
Getting started
-
Get started with Event Gateway
Get started with Kong Event Gateway by setting up a demo Konnect control plane and data plane, then configuring a backend cluster, virtual cluster, listener, and policies with the Kong Event Gateway API.
Event Gateway Entities
-
Backend clusters
Backend clusters represent target Kafka clusters proxies by Kong Event Gateway.
-
Listeners
Listeners represent the network interface for Kafka client connections over TCP.
-
Virtual clusters
Virtual clusters are Event Gateway entities that expose a modified view of the backend cluster to clients.
-
Policies
Policies control how Kafka protocol traffic is modified between the client and the backend cluster.
-
Schema registry
Schema registries are resources that let you validate messages against the Confluent schema registry.
-
Static keys
Static encryption keys are resources that can be used by the Encrypt and Decrypt policies to encrypt and decrypt Kafka messages.
Event Gateway Policies
-
ACLs
Manage access to your virtual cluster resources.
-
Decrypt
Decrypt messages that were previously encrypted using the referenced key
-
Encrypt
Encrypt portions of Kafka records
-
Forward to Virtual Cluster
Forward messages from a Kafka client to a virtual cluster
-
Modify Headers
Set or remove record headers
-
Schema Validation Consume
Validate records against a schema during the consume phase
-
Schema Validation Produce
Validate records against a schema during the produce phase
-
Skip Records
Skip the processing of a record
-
TLS Server
Configure TLS settings for a server
How-tos
-
Productize Kafka topics with Kong Event Gateway
Use namespaces and ACL policies to create products from Kafka topics.
-
Encrypt and decrypt Kafka messages with Kong Event Gateway
Use this tutorial to encrypt and decrypt Kafka messages with Kong Event Gateway using a static key.
-
Set up observability for Kong Event Gateway
Export metrics and traces from Kong Event Gateway into your own observability systems using OpenTelemetry (OTEL).
-
Configure SNI routing with Kong Event Gateway
Set up SNI routing to send traffic to multiple virtual clusters in the same Event Gateway control plane without opening more ports on the data plane.
-
Set up Kong Event Gateway with Kong Identity OAuth
Learn how to secure Kafka traffic in Event Gateway with Kong Identity.
-
Filter Kafka records by classification headers
Classify records at produce time and filter them at consume time based on user identity.
References
-
Event Gateway OpenAPI specification
OpenAPI specification for the Kong Event Gateway Control Plane API.
-
Event Gateway configuration reference
Reference for Kong Event Gateway data plane configuration parameters.
-
Event Gateway expressions language
Reference for the expressions language used for defining Event Gateway conditions.
-
Kong Event Gateway metrics
Reference for all metrics exposed by Kong Event Gateway.
-
Kong Event Gateway known limitations
This page lists the current Kong Event Gateway limitations.