-
Kong Gateway
This page is an introduction to Kong Gateway.
-
Kong Plugin Hub
Extend Kong Gateway and Kong Konnect with powerful plugins and easy integrations.
-
Kong Admin API
This page is an introduction to the Kong Gateway Admin API.
-
Kong Gateway entities
This page lists the different entities that make up Kong Gateway.
-
Managing Kong Gateway configuration
The Kong Gateway configuration file kong.conf can be used to configure individual properties of your Kong Gateway instance.
-
Kong Gateway changelog
Changelog for supported Kong Gateway Enterprise versions.
-
Kong Gateway breaking changes
Review Kong Gateway version breaking changes before upgrading.
-
Kong Gateway version support
The Kong Gateway version support policy outlines the Kong Gateway versioning scheme and version lifecycle, from release to sunset support.
-
Supported third-party dependencies for Kong Gateway
This reference lists all of the tested and supported versions of Kong Gateway's third-party dependencies.
-
Kong Gateway vulnerability patching process
Learn how Kong handles vulnerabilities or potential vulnerabilities in Kong Gateway or third-party code, and how to report any security issues.
All Gateway Documentation
Overview
Get Started with Gateway
-
Get started with Kong Gateway
Learn how to set up a local Kong Gateway installation and configure it for some common API management tasks.
-
Install Kong Gateway
Kong Gateway installation options.
-
Install Kong Gateway in Konnect with Helm
Create a Control Plane in Konnect, then deploy a Data Plane to your Kubernetes cluster using Helm.
-
Install Kong Gateway using Docker Compose
Use Docker Compose to install Kong Gateway
-
Kong Gateway quickstart script reference
Kong offers a quickstart script that launches a local instance of Kong Gateway for testing.
How Gateway Works
-
Gateway Services
Gateway Services represent the upstream services in your system. These applications are the business logic components of your system responsible for responding to requests.
-
Routes
A Route uses specific URL patterns and HTTP verbs to match incoming requests and pass them to a Gateway Service. This determines which upstream services will process a given request.
-
Consumers
A Consumer typically refers to an entity that consumes or uses the APIs managed by Kong Gateway.
-
Plugins
Plugins are modules that extend the functionality of Kong Gateway.
-
Upstreams
An Upstream enables load balancing by providing a virtual hostname and collection of Targets (upstream service instances).
-
Targets
A Target identifies an instance of an upstream service using an IP address or hostname with a port.
-
Gateway rate limiting
This page is an introduction to rate limiting with Kong Gateway.
-
Load balancing with Kong Gateway
Learn how to load balancing traffic with Kong Gateway
-
Kong Gateway traffic control and routing
Learn how Kong Gateway listens for, routes, and proxies traffic.
-
Kong Gateway Control Plane and Data Plane communication
Learn how Control Planes communicate with Data Planes and how you can secure them.
Deployment Topologies
-
Kong Gateway deployment topologies
This page lists the different modes that you can deploy Kong Gateway in.
-
Hybrid mode
Hybrid mode is a deployment model that splits all Kong Gateway nodes in a cluster into Control Planes and Data Plane nodes.
-
Traditional mode
Explains how Kong Gateway clustering and caching works in traditional mode.
-
DB-less mode
Explains how Kong Gateway can be run without a database using only in-memory storage for entities.
Data Plane Hosting Options
-
Data Plane hosting options
This page lists the different Data Plane hosting options for different Kong Gateway deployment topologies.
-
Choose a hosting strategy
Decide which Data Plane node strategy to use based on your use case.
-
Serverless Gateways
Lightweight API gateways, where the Control Plane is hosted by Konnect and Data Plane nodes are automatically provisioned.
-
Dedicated Cloud Gateways
Learn how Dedicated Cloud Gateways work and how to configure them.
-
Self-managed Data Planes
Host your own Data Plane nodes on the supported system of your choice.
Serverless Gateways
-
Provision a serverless gateway
Create a serverless Control Plane and hosted Data Plane.
-
Custom domains
Konnect integrates domain name management and configuration with serverless gateways.
-
FAQs
Frequently asked questions about serverless gateways.
Dedicated Cloud Gateways
-
Provision a Dedicated Cloud Gateway
Use the Konnect Cloud Gateways API to provision a Control Plane.
-
Custom plugin streaming
Stream custom plugins from the Control Plane to the Data Plane.
-
Supported geos
Supported geos for Dedicated Cloud Gateways.
-
Upgrade Data Planes
Upgrade Data Plane nodes in a Dedicated Cloud Gateway.
-
Cloud Gateways API
Konnect API for managing Dedicated Cloud Gateways infrastructure.
-
AWS PrivateLink peering
Create a private connection between your AWS environment and Konnect using AWS PrivateLink.
-
AWS Transit Gateway peering
Connect Konnect Dedicated Cloud Gateways to AWS Transit Gateway for private, secure connectivity.
-
Azure peering
Konnect can leverage Azure to create virtual networks, and ingest data from your Azure services and expose them to the internet via Konnect.
-
Dedicated Cloud Gateways reference
Dedicated Cloud Gateways are Data Plane nodes that are fully managed by Kong in Konnect.
Production Deployments
-
Licenses
A License entity allows you manage self-managed Kong Gateway Enterprise licenses.
-
Install Kong Gateway
Kong Gateway installation options.
-
Kong Gateway resource sizing guidelines
Review Kong's recommended resource allocation sizing guidelines for Kong Gateway based on configuration and traffic patterns.
-
Kong Gateway software bill of materials
Kong provides a software bill of materials (SBOM) for every minor release, starting with 3.3.0.0.
-
Securing Kong Gateway
Introduces ways you can secure Kong Gateway
-
Secure the Admin API
Learn how to secure the Admin API.
-
DNS configuration reference
This reference explains DNS clients, CORS, and cookie management in Kong Gateway.
-
Kong Gateway ports reference
Learn which ports Kong Gateway uses and how to configure them.
-
Control Plane outage management
Configure Data Plane resilience in case of a Control Plane outage.
-
Incremental configuration sync
Use incremental configuration sync to send only the changed entity configuration to Data Plane nodes instead of sending the entire configuration set.
Upgrade and Migration
-
Upgrading Kong Gateway
This guide walks you through upgrade paths for Kong Gateway and helps you prepare for an upgrade.
-
Back up and restore Kong Gateway
Learn how to back up and restore your Kong Gateway data.
-
Blue-green upgrade for Kong Gateway
Learn how to perform a blue-green upgrade for Kong Gateway.
-
Dual-cluster upgrade for Kong Gateway
Learn how to perform a dual-cluster upgrade for Kong Gateway.
-
In-place upgrade for Kong Gateway
Learn how to perform a in-place upgrade for Kong Gateway.
-
Rolling upgrade for Kong Gateway
Learn how to perform a rolling upgrade for Kong Gateway.
-
Kong Gateway 2.8 to 3.4 LTS upgrade
This guide walks you through upgrade paths for Kong Gateway 2.8 LTS to 3.4 LTS and helps you prepare for an upgrade.
-
Migrating from self-managed Kong Gateway to Konnect
Learn how to migrate from self-managed Kong Gateway to Konnect.
Secrets Management
-
Secrets management
Learn about storing, using, and rotating secrets with Kong Gateway.
-
Vaults
Vaults allow you to securely store and then reference secrets from within other entities, ensuring that secrets aren't visible in plaintext throughout the platform.
-
Configure AWS Secrets Manager as a vault backend
Learn how to set up AWS Secrets Manager as a Vault in Kong Gateway and reference a secret stored there.
-
Configure Google Cloud Secret Manager as a vault backend
Learn how to store a secret in Google Cloud Secret Manager, configure GCP as a Vault entity, and reference the stored secret in Kong Gateway.
-
Configure HashiCorp Vault as a vault backend
Learn how to reference HashiCorp Vault secrets from Kong Gateway.
-
Configure the Konnect Config Store vault
Learn how to use the Konnect Config Store vault.
-
Store a Mistral API key as a secret in Konnect Config Store
Learn how to set up Konnect Config Store as a Vault backend and store a Mistral API key.
-
Store and rotate Mistral API keys as secrets in Google Cloud
Learn how to store and rotate secrets in Google Cloud with Kong Gateway, Mistral, and the AI Proxy plugin.
-
Store Keyring data in a HashiCorp Vault
Learn how to store Keyring data in a HashiCorp Vault.
-
Store the Kong Gateway database credentials with AWS Secrets Manager
Learn how to store your Kong Gateway PostgreSQL credentials in AWS Secrets Manager.
Securing Gateway Deployments
-
Keyring
A Keyring is a mechanism that encrypts sensitive data fields, such as consumer secrets, before storing them in the database. This provides for encryption-at-rest security controls in a Kong Gateway cluster.
-
Keys
A Key object holds a representation of asymmetric keys in various formats.
-
Key Sets
A Key Set is a collection of Kong Gateway Keys.
-
Kong Gateway audit logs
Kong Gateway audit logs provide details about HTTP requests handled by the Admin API, as well as database changes.
-
Block unauthorized requests in Kong Gateway with the OPA plugin
Set up an OPA policy in Kong Gateway to block unauthorized requests.
-
Create a Key Set with a JSON Web Key
Create a JSON Web Key and add it to a Key Set using the /key-sets API endpoint.
-
Create a Key Set with a PEM Key
Create a PEM Key and add it to a Key Set using the /key-sets API endpoint.
-
Encrypt sensitive data in Kong Gateway with a Keyring
Enable Keyring encryption in Kong Gateway to encrypt sensitive data in Gateway and plugin configuration.
-
Restrict access to Kong Gateway resources by allowing specific IPs
Enable the IP Restriction plugin to instruct Kong Gateway to only accept requests from specific IP addresses.
-
Sign Kong Gateway audit logs with an RSA key
Use a key pair to sign audit logs in Kong Gateway.
-
Test certificate generation locally with ngrok and the ACME plugin
Use ngrok and the ACME plugin to test certificate generation locally.
-
Use AI to protect sensitive information in requests
Use the AI Sanitizer plugin to protect sensitive information in requests.
-
Use the ACL plugin with Consumer Groups in Kong Gateway
Restrict access to your resources based on Consumer Groups with the ACL plugins.
-
Validate incoming JSON request bodies with JSON Threat Protection
Use the JSON Threat Protection plugin to enforce a JSON threat protection policy.
Routing and Traffic Control
-
Kong Gateway traffic control and routing
Learn how Kong Gateway listens for, routes, and proxies traffic.
-
Routes
A Route uses specific URL patterns and HTTP verbs to match incoming requests and pass them to a Gateway Service. This determines which upstream services will process a given request.
-
Expressions router
The expressions router is a collection of Routes that are all evaluated against incoming requests until a match can be found.
-
Traditional router
The traditional router is a collection of Routes that are all evaluated against incoming requests until a match can be found.
-
Blue-green deployments
You can set up blue-green deployments for Kong Gateway using Upstreams and Targets, and switching the Gateway Service to point to one Upstream or the other.
-
Health check probes
Use health check probes to monitor availability.
-
Health checks and circuit breakers
Kong Gateway supports two kinds of health checks, which can be used separately or in conjunction: active and passive (also known as circuit breakers).
-
Load balancing in Kong Gateway
Learn how to load balance requests to upstream services with Kong Gateway
-
Proxying with Kong Gateway
Proxying is when Kong Gateway matches an HTTP request with a registered Route and forwards the request.
-
Configure a fallback Route
Learn how to configure a fallback Route to redirect 404s to a specific upstream service.
-
Filter requests based on header names
Use the Pre-Function plugin to detect headers in a request, and either let the request through or terminate it.
-
Route requests to different Upstreams based on headers
Use the Route by Header plugin to route requests based on a header value.
-
Use the ACL plugin with Consumer Groups in Kong Gateway
Restrict access to your resources based on Consumer Groups with the ACL plugins.
-
Traffic control plugins
Gateway plugins for controlling traffic
Rate Limiting
-
Gateway rate limiting
This page is an introduction to rate limiting with Kong Gateway.
-
Rate limiting strategies
This page describes the rate limiting strategies supported by Kong Gateway plugins.
-
Rate limiting window types
This page describes the rate limiting window types supported by Kong Gateway plugins.
-
Adjust header names in a request
Change the names of headers sent in a request using the Post-Function plugin.
-
Apply multiple rate limits and window sizes
Learn how to configure the Rate Limiting Advanced plugin to apply multiple rate limits and window sizes.
-
Create rate limiting tiers with Kong Gateway
Enforce customized rate limiting tiers by setting individual rate limits for different groups of Consumers.
-
Rate limit a Consumer with Kong Gateway
Learn how to rate limit a Consumer with the Rate Limiting and Key Authentication plugins.
-
Rate limit a Gateway Service with Kong Gateway
Learn how to configure rate limiting for a Gateway Service.
-
Rate limit requests based on peak and off-peak time
Using the Pre-function and the Rate Limiting Advanced plugins, set the rate limit based on peak or non-peak time.
-
Throttle APIs with different rate limits for Services and Consumers
Use the Rate Limiting and Service Protection plugins to set different rate limits for Services and Consumers.
Certificates
-
Certificates
A Certificate object represents a public certificate, and can be optionally paired with the corresponding private key.
-
CA Certificates
A CA Certificate object represents a trusted certificate authority. These objects are used by Kong Gateway to verify the validity of a client or server certificate.
-
SNIs
An SNI object represents a many-to-one mapping of hostnames to a certificate.
-
Using SSL certificates in Kong Gateway
How to define SSL Certificates and where you can use them.
Authentication
-
Authentication
An introduction to authentication with Kong Gateway.
-
OpenID Connect in Kong Gateway
Learn about using OpenID Connect with Kong Gateway.
-
Allow clients to choose their authentication methods and prevent unauthorized access
Learn how to allow different clients to access an upstream service with different authentication types, and forbid access to any unauthenticated clients.
-
Authenticate Consumers with basic authentication
Use the Basic Authentication plugin to allow Consumers to authenticate with a username and password.
-
Authenticate Consumers with the JWT plugin
Learn how to authenticate Consumers with a signed JWT credential.
-
Authenticate Consumers with the Key Auth and Sessions plugins
Authenticate Consumers with key authentication and session cookies.
-
Configure OpenID Connect with Kong Oauth2 token authentication
Set up OpenID Connect to verify tokens issued by Kong OAuth 2.0 plugin against an IdP.
-
Enable authentication with Vault in Kong Gateway
Use the Vault Authentication plugin to secure access to your Kong Gateway resources.
-
Enable key authentication on a Gateway Service with Kong Gateway
Secure a Gateway Service with the Key Auth Encrypted plugin.
-
Enable key authentication on a Gateway Service with Kong Gateway
Enable the Key Authentication plugin on a Gateway Service to require Consumers to authenticate with an API key.
-
Enable OAuth 2.0 authentication for WebSocket requests
Create an OAuth 2.0 Client Credentials flow for a WebSocket Gateway Service.
-
Enable OAuth 2.0 authentication with Kong Gateway
Create an OAuth 2.0 Client Credentials flow for a Gateway Service.
Authorization
-
Workspaces
Workspaces provide a way to segment Kong Gateway entities. Entities in a Workspace are isolated from those in other Workspaces.
-
RBAC
RBAC manages Kong Gateway roles and permissions for Kong Manager and the Admin API.
-
Admins
Admins can manage Kong Gateway entities inside Workspaces, including users and their roles.
-
Groups
Groups are a resource for RBAC and can be used to assign Roles across sets of users.
-
Configure a Kong Gateway RBAC user with custom permissions
Learn how to create a Kong Gateway RBAC user and configure it with roles and permissions.
-
Configure OpenID Connect with ACL authorization
Configure the OpenID Connect and ACL plugins together to apply auth flows to ACL allow or deny lists.
-
Configure OpenID Connect with claims-based authorization
Configure the OpenID Connect plugin for claims-based authorization.
-
Configure OpenID Connect with Consumer authorization
Configure the OpenID Connect plugin together with Consumers to map Consumers to IdP users.
-
Create a Super Admin with the Admin API
Learn how to create a Super Admin for Kong Gateway.
-
Enable RBAC with the Admin API
Learn how to enable Role-Based Access Control for Kong Gateway using the Admin API.
Analytics and Monitoring
-
Set up Dynatrace with OpenTelemetry
Use Dynatrace SaaS to send analytics and monitoring data to Dynatrace dashboards.
-
Set up Jaeger with OpenTelemetry
Use the OpenTelemetry plugin to send Kong Gateway analytics and monitoring data to Jaeger dashboards.
-
Analytics and monitoring plugins
Gateway plugins for monitoring your deployments.
Custom Plugin Development
-
Custom plugins
This page is an introduction to custom plugins for Kong.
-
Set up a custom plugin project
Create a simple custom plugin project for Kong Gateway.
-
Add custom plugin testing
Set up a testing environment for your custom plugin.
-
Add a custom plugin configuration
Add features to your custom plugin.
-
Consume external services in a custom plugin
Consume data from external services in your custom plugin using an HTTP client and parsing JSON values.
-
Deploy a custom plugin with Docker
Deploy your custom plugin to Kong Gateway.
-
Custom plugin reference
Learn about how to develop custom plugins for Kong Gateway.
Plugin Development Kit (PDK)
-
PDK
-
kong.client
-
kong.client.tls
-
kong.cluster
-
kong.ctx
-
kong.ip
-
kong.jwe
-
kong.log
-
kong.nginx
-
kong.node
-
kong.plugin
-
kong.request
-
kong.response
-
kong.router
-
kong.service
-
kong.service.request
-
kong.service.response
-
kong.table
-
kong.telemetry.log
-
kong.tracing
-
kong.vault
-
kong.websocket.client
-
kong.websocket.upstream
Kong Manager
-
Kong Manager
Kong Manager is the graphical user interface (GUI) for Kong Gateway.
-
Content Security Policy for Kong Manager
Strengthen security in Kong Manager by setting a Content Security Policy (CSP).
-
Kong Manager configuration
Kong Manager is the graphical user interface (GUI) for Kong Gateway.
Gateway Manager
-
Gateway Manager
Learn about managing Control Planes and Data Plane nodes with Gateway Manager.
-
Control Plane Groups
A Control Plane Group is a read-only Control Plane that combines configuration from its members, which are standard Control Planes.
-
Data Plane reference
Manage Data Plane nodes in Konnect, including platform support, proxy access, version upgrades, certificate renewal, required parameters, and custom metadata labels.
-
Default resource limits for Control Planes
In Gateway Manager, every Konnect Control Plane has a default resource limit per Gateway entity.
-
Version compatibility in Control Planes
Running multiple versions of Data Plane nodes with a single Control Plane can cause version compatibility issues.
-
Konnect Data Plane logs
Review logs for Data Plane activity in Konnect.
-
Konnect labels
Learn about labels in Konnect
Reference
-
Kong Gateway configuration reference
Reference for Kong Gateway configuration parameters. Set these parameters in kong.conf.
-
CLI Reference
The Kong CLI allows you to start, stop, and manage your Kong instances.
-
Reserved entity names
Reserved and unusable Kong Gateway entity names.
-
Tags
Tags are strings associated with entities in Kong Gateway, which you can use to filter entities on most GET endpoints.
-
Kong Gateway performance testing benchmarks
View Kong's benchmark for the current Kong Gateway version and learn about Kong Gateway performance testing using Kong's test suite.
-
Establish a Kong Gateway performance testing benchmark
Establish a benchmark for your Kong Gateway instance.
-
Optimize Kong Gateway performance
Review recommendations for improving Kong Gateway performance
-
Kong Gateway logs
See where Kong Gateway logs are located, the different log levels, and how to configure logs and log levels.
-
Consumer Groups
Consumer Groups let you apply common configurations to groups of Consumers, such as rate limiting policies or request and response transformation.
-
Event Hooks
Event Hooks allow Kong Gateway monitor to communicate with target services or resources, notifying the target resource that an event was triggered.
-
Partials
Partials allow you to extract shared configurations into reusable entities that can be linked to multiple plugins
-
How to restart Kong Gateway in a Docker container
Restart the Kong Gateway container without killing it.
-
Nginx directives
Learn which Nginx directives you can use in the `kong.conf` file and how to adjust them.