You are browsing documentation for an outdated version. See the latest documentation here.

Proxy Reference

In this document, we cover Kong Gateway’s proxying capabilities by explaining its routing capabilities and internal workings in details.

Kong Gateway exposes several interfaces which can be tweaked by the following configuration properties:

  • proxy_listen, which defines a list of addresses/ports on which Kong Gateway will accept public HTTP (gRPC, WebSocket, etc) traffic from clients and proxy it to your upstream services (8000 by default).
  • admin_listen, which also defines a list of addresses and ports, but those should be restricted to only be accessed by administrators, as they expose Kong’s configuration capabilities: the Admin API (8001 by default).

    Important: If you need to expose the admin_listen port to the internet in a production environment,

    secure it with authentication.

  • stream_listen, which is similar to proxy_listen but for Layer 4 (TCP, TLS) generic proxy. This is turned off by default.

Terminology

  • client: Refers to the downstream client making requests to Kong Gateway’s proxy port.
  • upstream service: Refers to your own API/service sitting behind Kong Gateway, to which client requests/connections are forwarded.
  • Service: Service entities, as the name implies, are abstractions of each of your own upstream services. Examples of services would be a data transformation microservice, a billing API, etc.
  • Route: This refers to the Kong Gateway routes entity. Routes are entrypoints into Kong Gateway, and defining rules for a request to be matched, and routed to a given service.
  • Plugin: This refers to Kong Gateway “plugins”, which are pieces of business logic that run in the proxying lifecycle. Plugins can be configured through the Admin API, either globally (all incoming traffic) or on specific routes and services.

Overview

From a high-level perspective, Kong Gateway listens for HTTP traffic on its configured proxy port(s) (8000 and 8443 by default) and L4 traffic on explicitly configured stream_listen ports. Kong Gateway will evaluate any incoming HTTP request or L4 connection against the routes you have configured and try to find a matching one. If a given request matches the rules of a specific route, Kong Gateway will process proxying the request.

Because each route may be linked to a service, Kong Gateway will run the plugins you have configured on your route and its associated service, and then proxy the request upstream. You can manage routes via Kong Gateway’s Admin API. Routes have special attributes that are used for routing, matching incoming HTTP requests. Routing attributes differ by subsystem (HTTP/HTTPS, gRPC/gRPCS, and TCP/TLS).

Subsystems and routing attributes:

  • http: methods, hosts, headers, paths (and snis, if https)
  • tcp: sources, destinations (and snis, if tls)
  • grpc: hosts, headers, paths (and snis, if grpcs)

If you attempt to configure a route with a routing attribute it doesn’t support (e.g., an http route with sources or destinations fields), an error message is reported:

  1. HTTP/1.1 400 Bad Request
  2. Content-Type: application/json
  3. Server: kong/<x.x.x>
  4. {
  5. "code": 2,
  6. "fields": {
  7. "sources": "cannot set 'sources' when 'protocols' is 'http' or 'https'"
  8. },
  9. "message": "schema violation (sources: cannot set 'sources' when 'protocols' is 'http' or 'https')",
  10. "name": "schema violation"
  11. }

If Kong Gateway receives a request that it cannot match against any of the configured routes (or if no routes are configured), it will respond with:

  1. HTTP/1.1 404 Not Found
  2. Content-Type: application/json
  3. Server: kong/<x.x.x>
  4. {
  5. "message": "no route and no Service found with those values"
  6. }

How to configure a service

The Configuring a Service quickstart guide explains how Kong is configured via the Admin API.

Adding a service to Kong Gateway is done by sending an HTTP request to the Admin API:

  1. curl -i -X POST http://localhost:8001/services/ \
  2. -d 'name=foo-service' \
  3. -d 'url=http://foo-service.com'

Response:

  1. HTTP/1.1 201 Created
  2. ...
  3. {
  4. "connect_timeout": 60000,
  5. "created_at": 1515537771,
  6. "host": "foo-service.com",
  7. "id": "d54da06c-d69f-4910-8896-915c63c270cd",
  8. "name": "foo-service",
  9. "path": "/",
  10. "port": 80,
  11. "protocol": "http",
  12. "read_timeout": 60000,
  13. "retries": 5,
  14. "updated_at": 1515537771,
  15. "write_timeout": 60000
  16. }

This request instructs Kong Gateway to register a service named “foo-service”, which points to http://foo-service.com (your upstream).

Note: The url argument is a shorthand argument to populate the protocol, host, port, and path attributes at once.

Now, in order to send traffic to this service through Kong Gateway, we need to specify a route, which acts as an entry point to Kong Gateway:

  1. curl -i -X POST http://localhost:8001/routes/ \
  2. -d 'hosts[]=example.com' \
  3. -d 'paths[]=/foo' \
  4. -d 'service.id=d54da06c-d69f-4910-8896-915c63c270cd'

Response:

  1. HTTP/1.1 201 Created
  2. ...
  3. {
  4. "created_at": 1515539858,
  5. "hosts": [
  6. "example.com"
  7. ],
  8. "id": "ee794195-6783-4056-a5cc-a7e0fde88c81",
  9. "methods": null,
  10. "paths": [
  11. "/foo"
  12. ],
  13. "preserve_host": false,
  14. "priority": 0,
  15. "protocols": [
  16. "http",
  17. "https"
  18. ],
  19. "service": {
  20. "id": "d54da06c-d69f-4910-8896-915c63c270cd"
  21. },
  22. "strip_path": true,
  23. "updated_at": 1515539858
  24. }

We have now configured a route to match incoming requests matching the given hosts and paths, and forward them to the foo-service we configured, thus proxying this traffic to http://foo-service.com.

Kong Gateway is a transparent proxy, and it defaults to forwarding the request to your upstream service untouched, with the exception of various headers such as Connection, Date, and others as required by the HTTP specifications.

Routes and matching capabilities

Let’s now discuss how Kong Gateway matches a request against the configured routing attributes.

Kong Gateway supports native proxying of HTTP/HTTPS, TCL/TLS, and GRPC/GRPCS protocols; as mentioned earlier, each of these protocols accept a different set of routing attributes:

  • http: methods, hosts, headers, paths (and snis, if https)
  • tcp: sources, destinations (and snis, if tls)
  • grpc: hosts, headers, paths (and snis, if grpcs)

Note that all of these fields are optional, but at least one of them must be specified.

For a request to match a route:

  • The request must include all of the configured fields
  • The values of the fields in the request must match at least one of the configured values (While the field configurations accepts one or more values, a request needs only one of the values to be considered a match)

Let’s go through a few examples. Consider a route configured like the following:

  1. {
  2. "hosts": ["example.com", "foo-service.com"],
  3. "paths": ["/foo", "/bar"],
  4. "methods": ["GET"]
  5. }

Some of the possible requests matching this route would look like the following:

  1. GET /foo HTTP/1.1
  2. Host: example.com
  1. GET /bar HTTP/1.1
  2. Host: foo-service.com
  1. GET /foo/hello/world HTTP/1.1
  2. Host: example.com

All three of these requests satisfy all the conditions set in the route definition.

However, the following requests would not match the configured conditions:

  1. GET / HTTP/1.1
  2. Host: example.com
  1. POST /foo HTTP/1.1
  2. Host: example.com
  1. GET /foo HTTP/1.1
  2. Host: foo.com

All three of these requests satisfy only two of configured conditions. The first request’s path is not a match for any of the configured paths, same for the second request’s HTTP method, and the third request’s Host header.

Now that we understand how the routing properties work together, let’s explore each property individually.

Request header

Kong Gateway supports routing by arbitrary HTTP headers. A special case of this feature is routing by the Host header.

Routing a request based on its Host header is the most straightforward way to proxy traffic through Kong Gateway, especially since this is the intended usage of the HTTP Host header. Kong Gateway makes it easy to do via the hosts field of the route entity.

hosts accepts multiple values, which must be comma-separated when specifying them via the Admin API, and is represented in a JSON payload:

  1. curl -i -X POST http://localhost:8001/routes/ \
  2. -H 'Content-Type: application/json' \
  3. -d '{"hosts":["example.com", "foo-service.com"]}'

Response:

  1. HTTP/1.1 201 Created
  2. ...

But since the Admin API also supports form-urlencoded content types, you can specify an array via the [] notation:

  1. curl -i -X POST http://localhost:8001/routes/ \
  2. -d 'hosts[]=example.com' \
  3. -d 'hosts[]=foo-service.com'

Response:

  1. HTTP/1.1 201 Created
  2. ...

To satisfy the hosts condition of this route, any incoming request from a client must now have its Host header set to one of:

  1. Host: example.com

or:

  1. Host: foo-service.com

Similarly, any other header can be used for routing:

  1. curl -i -X POST http://localhost:8001/routes/ \
  2. -d 'headers.region=north'

Response:

  1. HTTP/1.1 201 Created

Incoming requests containing a Region header set to North are routed to said route.

  1. Region: North

Using wildcard hostnames

To provide flexibility, Kong Gateway allows you to specify hostnames with wildcards in the hosts field. Wildcard hostnames allow any matching Host header to satisfy the condition, and thus match a given Route.

Wildcard hostnames must contain only one asterisk at the leftmost or rightmost label of the domain. For example:

  • *.example.com would allow Host values such as a.example.com and x.y.example.com to match.
  • example.* would allow Host values such as example.com and example.org to match.

A complete example would look like this:

  1. {
  2. "hosts": ["*.example.com", "service.com"]
  3. }

Which would allow the following requests to match this route:

  1. GET / HTTP/1.1
  2. Host: an.example.com
  1. GET / HTTP/1.1
  2. Host: service.com

The preserve_host property

When proxying, Kong Gateway’s default behavior is to set the upstream request’s Host header to the hostname specified in the service’s host. The preserve_host field accepts a boolean flag instructing Kong Gateway not to do so.

For example, when the preserve_host property is not changed and a route is configured like so:

  1. {
  2. "hosts": ["service.com"],
  3. "service": {
  4. "id": "..."
  5. }
  6. }

A possible request from a client to Kong Gateway could be:

  1. GET / HTTP/1.1
  2. Host: service.com

Kong Gateway would extract the Host header value from the service’s host property, , and would send the following upstream request:

  1. GET / HTTP/1.1
  2. Host: <my-service-host.com>

However, by explicitly configuring a route with preserve_host=true:

  1. {
  2. "hosts": ["service.com"],
  3. "preserve_host": true,
  4. "service": {
  5. "id": "..."
  6. }
  7. }

And assuming the same request from the client:

  1. GET / HTTP/1.1
  2. Host: service.com

Kong Gateway would preserve the Host on the client request and would send the following upstream request instead:

  1. GET / HTTP/1.1
  2. Host: service.com

Additional request headers

It’s possible to route requests by other headers besides Host.

To do this, use the headers property in your route:

  1. {
  2. "headers": { "version": ["v1", "v2"] },
  3. "service": {
  4. "id": "..."
  5. }
  6. }

Given a request with a header such as:

  1. GET / HTTP/1.1
  2. version: v1

This request will be routed through to the service. The same happens with this one:

  1. GET / HTTP/1.1
  2. version: v2

But this request isn’t routed to the service:

  1. GET / HTTP/1.1
  2. version: v3

Note: The headers keys are a logical AND and their values a logical OR.

Request path

Another way for a route to be matched is via request paths. To satisfy this routing condition, a client request’s normalized path must be prefixed with one of the values of the paths attribute.

For example, with a route configured like so:

  1. {
  2. "paths": ["/service", "/hello/world"]
  3. }

The following requests would be matched:

  1. GET /service HTTP/1.1
  2. Host: example.com
  1. GET /service/resource?param=value HTTP/1.1
  2. Host: example.com
  1. GET /hello/world/resource HTTP/1.1
  2. Host: anything.com

For each of these requests, Kong Gateway detects that their normalized URL path is prefixed with one of the routes’ paths values. By default, Kong Gateway would then proxy the request upstream without changing the URL path.

When proxying with path prefixes, the longest paths get evaluated first. This allow you to define two routes with two paths: /service and /service/resource, and ensure that the former does not “shadow” the latter.

Using Regex in paths

For a path to be considered a regular expression, it must be prefixed with a ~:

  1. paths: ["~/foo/bar$"]

Any path that isn’t prefixed with a ~ will be considered plain text:

  1. "paths": ["/users/\d+/profile", "/following"]

For more information about how the router processes regular expressions, see performance considerations when using Expressions.

Evaluation order

The router evaluates routes using the regex_priority field of the Route where a route is configured. Higher regex_priority values mean higher priority.

  1. [
  2. {
  3. "paths": ["~/status/\d+"],
  4. "regex_priority": 0
  5. },
  6. {
  7. "paths": ["~/version/\d+/status/\d+"],
  8. "regex_priority": 6
  9. },
  10. {
  11. "paths": /version,
  12. },
  13. {
  14. "paths": ["~/version/any/"],
  15. }
  16. ]

In this scenario, Kong Gateway evaluates incoming requests against the following defined URIs, in this order:

  1. /version/\d+/status/\d+
  2. /status/\d+
  3. /version/any/
  4. /version

Routers with a large number of regexes can consume traffic intended for other rules. Regular expressions are much more expensive to build and execute and can’t be optimized easily. You can avoid creating complex regular expressions using the Router Expressions language.

If you see unexpected behavior, sending Kong-Debug: 1 in your request headers will indicate the matched route ID in the response headers for

As usual, a request must still match a route’s hosts and methods properties as well, and Kong Gateway traverses your routes until it finds one that matches the most rules.

Capturing groups

Capturing groups are also supported, and the matched group will be extracted from the path and available for plugins consumption. If we consider the following regex:

  1. /version/(?<version>\d+)/users/(?<user>\S+)

And the following request path:

  1. /version/1/users/john

Kong Gateway considers the request path a match, and if the overall route is matched (considering other routing attributes), the extracted capturing groups will be available from the plugins in the ngx.ctx variable:

  1. local router_matches = ngx.ctx.router_matches
  2. -- router_matches.uri_captures is:
  3. -- { "1", "john", version = "1", user = "john" }
Escaping special characters

Next, it is worth noting that characters found in Regex are often reserved characters according to RFC 3986 and as such, should be percent-encoded. When configuring routes with regex paths via the Admin API, be sure to URL encode your payload if necessary. For example, with curl and using an application/x-www-form-urlencoded MIME type:

  1. curl -i -X POST http://localhost:8001/routes \
  2. --data-urlencode 'uris[]=/status/\d+'

Response:

  1. HTTP/1.1 201 Created
  2. ...

Note that curl does not automatically URL encode your payload, and note the usage of --data-urlencode, which prevents the + character to be URL decoded and interpreted as a space ` ` by Kong Gateway’s Admin API.

The strip_path property

It may be desirable to specify a path prefix to match a route, but not include it in the upstream request. To do so, use the strip_path boolean property by configuring a route like so:

  1. {
  2. "paths": ["/service"],
  3. "strip_path": true,
  4. "service": {
  5. "id": "..."
  6. }
  7. }

Enabling this flag instructs Kong Gateway that when matching this route, and proceeding with the proxying to a service, it should not include the matched part of the URL path in the upstream request’s URL. For example, the following client’s request to the above route:

  1. GET /service/path/to/resource HTTP/1.1
  2. Host: ...

This causes Kong Gateway to send the following upstream request:

  1. GET /path/to/resource HTTP/1.1
  2. Host: ...

The same way, if a Regex path is defined on a route that has strip_path enabled, the entirety of the request URL matching sequence will be stripped. For example:

  1. {
  2. "paths": ["/version/\d+/service"],
  3. "strip_path": true,
  4. "service": {
  5. "id": "..."
  6. }
  7. }

The following HTTP request matching the provided Regex path:

  1. GET /version/1/service/path/to/resource HTTP/1.1
  2. Host: ...

Is proxied upstream by Kong Gateway as:

  1. GET /path/to/resource HTTP/1.1
  2. Host: ...

Normalization behavior

To prevent trivial route match bypass, the incoming request URI from client is always normalized according to RFC 3986 before router matching occurs. Specifically, the following normalization techniques are used for incoming request URIs, which are selected because they generally do not change semantics of the request URI:

  1. Percent-encoded triplets are converted to uppercase. For example: /foo%3a becomes /foo%3A.
  2. Percent-encoded triplets of unreserved characters are decoded. For example: /fo%6F becomes /foo.
  3. Dot segments are removed as necessary. For example: /foo/./bar/../baz becomes /foo/baz.
  4. Duplicate slashes are merged. For example: /foo//bar becomes /foo/bar.

The paths attribute of the Route object are also normalized. It is achieved by first determining if the path is a plain text or regex path. Based on the result, different normalization techniques are used.

For plain text route path:

Same normalization technique as above is used, that is, methods 1 through 4.

For regex route path:

Only methods 1 and 2 are used. In addition, if the decoded character becomes a regex meta character, it will be escaped with backslash.

Kong Gateway normalizes any incoming request URI before performing router matches. As a result, any request URI sent over to the upstream services will also be in normalized form that preserves the original URI semantics.

Request HTTP method

The methods field allows matching the requests depending on their HTTP method. It accepts multiple values. Its default value is empty (the HTTP method is not used for routing).

The following route allows routing via GET and HEAD:

  1. {
  2. "methods": ["GET", "HEAD"],
  3. "service": {
  4. "id": "..."
  5. }
  6. }

Such a route would be matched with the following requests:

  1. GET / HTTP/1.1
  2. Host: ...
  1. HEAD /resource HTTP/1.1
  2. Host: ...

But it would not match a POST or DELETE request. This allows for much more granularity when configuring plugins on routes. For example, one could imagine two routes pointing to the same service: one with unlimited unauthenticated GET requests, and a second one allowing only authenticated and rate-limited POST requests (by applying the authentication and rate limiting plugins to such requests).

Request source

**Note:** This section only applies to TCP and TLS routes.

The sources routing attribute allows matching a route by a list of incoming connection IP and/or port sources.

The following route allows routing via a list of source IP/ports:

  1. {
  2. "protocols": ["tcp", "tls"],
  3. "sources": [{"ip":"10.1.0.0/16", "port":1234}, {"ip":"10.2.2.2"}, {"port":9123}],
  4. "id": "...",
  5. }

TCP or TLS connections originating from IPs in CIDR range “10.1.0.0/16” or IP address “10.2.2.2” or Port “9123” would match such route.

Request destination

**Note:** This section only applies to TCP and TLS routes.

The destinations attribute, similarly to sources, allows matching a route by a list of incoming connection IP and/or port, but uses the destination of the TCP/TLS connection as routing attribute.

Request SNI

When using secure protocols (https, grpcs, or tls), a Server Name Indication can be used as a routing attribute. The following route allows routing via SNIs:

  1. {
  2. "snis": ["foo.test", "example.com"],
  3. "id": "..."
  4. }

Incoming requests with a matching hostname set in the TLS connection’s SNI extension would be routed to this route. As mentioned, SNI routing applies not only to TLS, but also to other protocols carried over TLS - such as HTTPS and If multiple SNIs are specified in the route, any of them can match with the incoming request’s SNI. with the incoming request (OR relationship between the names).

The SNI is indicated at TLS handshake time and cannot be modified after the TLS connection has been established. This means, for example, that multiple requests reusing the same keepalive connection will have the same SNI hostname while performing router match, regardless of the Host header. has been established. This means keepalive connections that send multiple requests will have the same SNI hostnames while performing router match (regardless of the Host header).

Please note that creating a route with mismatched SNI and Host header matcher is possible, but generally discouraged.

Matching priorities

A route may define matching rules based on its headers, hosts, paths, and methods (plus snis for secure routes - "https", "grpcs", "tls") fields. For Kong Gateway to match an incoming request to a route, all existing fields must be satisfied. However, Kong Gateway allows for quite some flexibility by allowing two or more routes to be configured with fields containing the same values - when this occurs, Kong Gateway applies a priority rule.

The rule is: when evaluating a request, Kong Gateway first tries to match the routes with the most rules.

For example, if two routes are configured like so:

  1. {
  2. "hosts": ["example.com"],
  3. "service": {
  4. "id": "..."
  5. }
  6. },
  7. {
  8. "hosts": ["example.com"],
  9. "methods": ["POST"],
  10. "service": {
  11. "id": "..."
  12. }
  13. }

The second route has a hosts field and a methods field, so it is evaluated first by Kong Gateway. By doing so, we avoid the first route “shadowing” calls intended for the second one.

Thus, this request matches the first route:

  1. GET / HTTP/1.1
  2. Host: example.com

And this request matches the second one:

  1. POST / HTTP/1.1
  2. Host: example.com

Following this logic, if a third route was to be configured with a hosts field, a methods field, and a uris field, it would be evaluated first by Kong Gateway.

If the rule count for the given request is the same in two routes A and B, then the following tiebreaker rules will be applied in the order they are listed. Route A will be selected over B if:

  • A has only “plain” Host headers and B has one or more “wildcard” host headers
  • A has more non-Host headers than B.
  • A has at least one “regex” paths and B has only “plain” paths.
  • A’s longest path is longer than B’s longest path.
  • A.created_at < B.created_at

Proxying behavior

The proxying rules above detail how Kong Gateway forwards incoming requests to your upstream services. Below, we detail what happens internally between the time Kong Gateway matches an HTTP request with a registered route, and the actual forwarding of the request.

Load balancing

Kong Gateway implements load balancing capabilities to distribute proxied requests across a pool of instances of an upstream service.

You can find more information about configuring load balancing by consulting the Load Balancing Reference.

Plugins execution

Kong Gateway is extensible via “plugins” that hook themselves in the request/response lifecycle of the proxied requests. Plugins can perform a variety of operations in your environment and/or transformations on the proxied request.

Plugins can be configured to run globally (for all proxied traffic) or on specific routes and services. In both cases, you must create a plugin configuration via the Admin API.

Once a route has been matched (and its associated service entity), Kong Gateway will run plugins associated to either of those entities. Plugins configured on a route run before plugins configured on a service, but otherwise, the usual rules of plugins association apply.

These configured plugins will run their access phase, which you can find more information about in the Plugin development guide.

Proxying and upstream timeouts

Once Kong Gateway has executed all the necessary logic (including plugins), it is ready to forward the request to your upstream service. This is done via Nginx’s ngx_http_proxy_module. You can configure the desired timeouts for the connection between Kong Gateway and a given upstream, via the following properties of a service:

  • connect_timeout: defines in milliseconds the timeout for establishing a connection to your upstream service. Defaults to 60000.
  • write_timeout: defines in milliseconds a timeout between two successive write operations for transmitting a request to your upstream service. Defaults to 60000.
  • read_timeout: defines in milliseconds a timeout between two successive read operations for receiving a request from your upstream service. Defaults to 60000.

Kong Gateway will send the request over HTTP/1.1, and set the following headers:

  • Host: <your_upstream_host>, as previously described in this document.
  • Connection: keep-alive, to allow for reusing the upstream connections.
  • X-Real-IP: <remote_addr>, where $remote_addr is the variable bearing the same name provided by ngx_http_core_module. Please note that the $remote_addr is likely overridden by ngx_http_realip_module.
  • X-Forwarded-For: <address>, where <address> is the content of $realip_remote_addr provided by ngx_http_realip_module appended to the request header with the same name.
  • X-Forwarded-Proto: <protocol>, where <protocol> is the protocol used by the client. In the case where $realip_remote_addr is one of the trusted addresses, the request header with the same name gets forwarded if provided. Otherwise, the value of the $scheme variable provided by ngx_http_core_module will be used.
  • X-Forwarded-Host: <host>, where <host> is the host name sent by the client. In the case where $realip_remote_addr is one of the trusted addresses, the request header with the same name gets forwarded if provided. Otherwise, the value of the $host variable provided by ngx_http_core_module will be used.
  • X-Forwarded-Port: <port>, where <port> is the port of the server which accepted a request. In the case where $realip_remote_addr is one of the trusted addresses, the request header with the same name gets forwarded if provided. Otherwise, the value of the $server_port variable provided by ngx_http_core_module will be used.
  • X-Forwarded-Prefix: <path>, where <path> is the path of the request which was accepted by Kong Gateway. In the case where $realip_remote_addr is one of the trusted addresses, the request header with the same name gets forwarded if provided. Otherwise, the value of the $request_uri variable (with the query string stripped) provided by ngx_http_core_module will be used.

    Note: Kong Gateway returns "/" for an empty path, but it doesn’t do any other normalization on the request path.

All the other request headers are forwarded as-is by Kong Gateway.

One exception to this is made when using the WebSocket protocol. If so, Kong Gateway sets the following headers to allow for upgrading the protocol between the client and your upstream services:

  • Connection: Upgrade
  • Upgrade: websocket

More information on this topic is covered in the Proxy WebSocket traffic section.

Errors and retries

Whenever an error occurs during proxying, Kong Gateway uses the underlying Nginx retries mechanism to pass the request on to the next upstream.

There are two configurable elements here:

  1. The number of retries: this can be configured per service using the retries property. See the Admin API for more details on this.

  2. What exactly constitutes an error: here Kong Gateway uses the Nginx defaults, which means an error or timeout occurring while establishing a connection with the server, passing a request to it, or reading the response headers.

The second option is based on Nginx’s [proxy_next_upstream][proxy_next_upstream] directive. This option is not directly configurable through Kong Gateway, but can be added using a custom Nginx configuration. See the configuration reference for more details.

Response

Kong Gateway receives the response from the upstream service and sends it back to the downstream client in a streaming fashion. At this point, Kong Gateway executes subsequent plugins added to the route and/or service that implement a hook in the header_filter phase.

Once the header_filter phase of all registered plugins has been executed, the following headers are added by Kong Gateway and the full set of headers be sent to the client:

  • Via: kong/x.x.x, where x.x.x is the Kong Gateway version in use
  • X-Kong-Proxy-Latency: <latency>, where latency is the time in milliseconds between Kong Gateway receiving the request from the client and sending the request to your upstream service.
  • X-Kong-Upstream-Latency: <latency>, where latency is the time in milliseconds that Kong Gateway was waiting for the first byte of the upstream service response.

Once the headers are sent to the client, Kong Gateway starts executing registered plugins for the route and/or service that implement the body_filter hook. This hook may be called multiple times, due to the streaming nature of Nginx. Each chunk of the upstream response that is successfully processed by such body_filter hooks is sent back to the client. You can find more information about the body_filter hook in the Plugin development guide.

Configuring a fallback route

As a practical use-case and example of the flexibility offered by Kong Gateway’s proxying capabilities, let’s try to implement a “fallback route”, so that in order to avoid Kong Gateway responding with an HTTP 404, “no route found”, we can catch such requests and proxy them to a special upstream service, or apply a plugin to it (such a plugin could, for example, terminate the request with a different status code or response without proxying the request).

Here is an example of such a fallback route:

  1. {
  2. "paths": ["/"],
  3. "service": {
  4. "id": "..."
  5. }
  6. }

As you can guess, any HTTP request made to Kong Gateway would actually match this route, since all URIs are prefixed by the root character /. As we know from the [Request path][proxy-request-path] section, the longest URL paths are evaluated first by Kong Gateway, so the / path will eventually be evaluated last by Kong Gateway, and effectively provide a “fallback” route, only matched as a last resort. You can then send traffic to a special service or apply any plugin you wish on this route.

Configuring TLS for a route

Kong Gateway provides a way to dynamically serve TLS certificates on a per-connection basis. TLS certificates are directly handled by the core, and configurable via the Admin API. Clients connecting to Kong Gateway over TLS must support the Server Name Indication extension to make use of this feature.

TLS certificates are handled by two resources in the Kong Gateway Admin API:

  • /certificates, which stores your keys and certificates.
  • /snis, which associates a registered certificate with a Server Name Indication.

You can find the documentation for those two resources in the Admin API Reference.

Here is how to configure a TLS certificate on a given route: first, upload your TLS certificate and key via the Admin API:

  1. curl -i -X POST http://localhost:8001/certificates \
  2. -F "cert=@/path/to/cert.pem" \
  3. -F "key=@/path/to/cert.key" \
  4. -F "snis=*.tls-example.com,other-tls-example.com"

Response:

  1. HTTP/1.1 201 Created
  2. ...

The snis form parameter is a sugar parameter, directly inserting an SNI and associating the uploaded certificate to it.

Note that one of the SNI names defined in snis above contains a wildcard (*.tls-example.com). An SNI may contain a single wildcard in the leftmost (prefix) or rightmost (suffix) position. This can be useful when maintaining multiple subdomains. A single sni configured with a wildcard name can be used to match multiple subdomains, instead of creating an SNI for each.

Valid wildcard positions are mydomain.*, *.mydomain.com, and *.www.mydomain.com.

A default certificate can be added using the following parameters in Kong Gateway configuration:

  1. ssl_cert
  2. ssl_cert_key

Or, by dynamically configuring the default certificate with an SNI of *:

  1. curl -i -X POST http://localhost:8001/certificates \
  2. -F "cert=@/path/to/default-cert.pem" \
  3. -F "key=@/path/to/default-cert.key" \
  4. -F "snis=*"

Response:

  1. HTTP/1.1 201 Created
  2. ...

Matching of snis respects the following priority:

  1. Exact SNI matching certificate
  2. Search for a certificate by prefix wildcard
  3. Search for a certificate by suffix wildcard
  4. Search for a certificate associated with the SNI *
  5. The default certificate on the file system

You must now register the following route within Kong Gateway. We match requests to this route using only the Host header for convenience:

  1. curl -i -X POST http://localhost:8001/routes \
  2. -d 'hosts=prefix.tls-example.com,other-tls-example.com' \
  3. -d 'service.id=d54da06c-d69f-4910-8896-915c63c270cd'

Response:

  1. HTTP/1.1 201 Created
  2. ...

You can now expect the route to be served over HTTPS by Kong Gateway:

  1. curl -i https://localhost:8443/ \
  2. -H "Host: prefix.tls-example.com"

Response:

  1. HTTP/1.1 200 OK
  2. ...

When establishing the connection and negotiating the TLS handshake, if your client sends prefix.tls-example.com as part of the SNI extension, Kong Gateway serves the cert.pem certificate previously configured. This is the same for both HTTPS and TLS connections.

Restricting the client protocol

Routes have a protocols property to restrict the client protocol they should listen for. This attribute accepts a set of values, which can be "http", "https", "grpc", "grpcs", "tcp", or "tls".

A Route with http and https will accept traffic in both protocols.

  1. {
  2. "hosts": ["..."],
  3. "paths": ["..."],
  4. "methods": ["..."],
  5. "protocols": ["http", "https"],
  6. "service": {
  7. "id": "..."
  8. }
  9. }

Not specifying any protocol has the same effect, since routes default to ["http", "https"].

However, a route with only https would only accept traffic over HTTPS. It would also accept unencrypted traffic if TLS termination previously occurred from a trusted IP. TLS termination is considered valid when the request comes from one of the configured IPs in trusted_ips and if the X-Forwarded-Proto: https header is set:

  1. {
  2. "hosts": ["..."],
  3. "paths": ["..."],
  4. "methods": ["..."],
  5. "protocols": ["https"],
  6. "service": {
  7. "id": "..."
  8. }
  9. }

If a route such as the above matches a request, but that request is in plain-text without valid prior TLS termination, Kong Gateway responds with:

  1. HTTP/1.1 426 Upgrade Required
  2. Content-Type: application/json; charset=utf-8
  3. Transfer-Encoding: chunked
  4. Connection: Upgrade
  5. Upgrade: TLS/1.2, HTTP/1.1
  6. Server: kong/x.y.z
  7. {"message":"Please use HTTPS protocol"}

It’s possible to create routes for raw TCP (not necessarily HTTP) connections by using "tcp" in the protocols attribute:

  1. {
  2. "hosts": ["..."],
  3. "paths": ["..."],
  4. "methods": ["..."],
  5. "protocols": ["tcp"],
  6. "service": {
  7. "id": "..."
  8. }
  9. }

Similarly, we can create routes which accept raw TLS traffic (not necessarily HTTPS) with the "tls" value:

  1. {
  2. "hosts": ["..."],
  3. "paths": ["..."],
  4. "methods": ["..."],
  5. "protocols": ["tls"],
  6. "service": {
  7. "id": "..."
  8. }
  9. }

A route with only TLS would only accept traffic over TLS.

It is also possible to accept both TCP and TLS simultaneously:

  1. {
  2. "hosts": ["..."],
  3. "paths": ["..."],
  4. "methods": ["..."],
  5. "protocols": ["tcp", "tls"],
  6. "service": {
  7. "id": "..."
  8. }
  9. }

For L4 TLS proxy to work, it is necessary to create route that accepts the tls protocol, as well as having the appropriate TLS certificate uploaded and their sni attribute properly set to match incoming connection’s SNI. Please refer to the Configuring TLS for a Route section above for instructions on setting this up.

Proxy WebSocket traffic

Kong Gateway supports WebSocket traffic thanks to the underlying Nginx implementation. When you want to establish a WebSocket connection between a client and your upstream services through Kong Gateway, you must establish a WebSocket handshake. This is done via the HTTP Upgrade mechanism. This is what your client request made to Kong Gateway would look like:

  1. GET / HTTP/1.1
  2. Connection: Upgrade
  3. Host: my-websocket-api.com
  4. Upgrade: WebSocket

This makes Kong Gateway forward the Connection and Upgrade headers to your upstream service, instead of dismissing them due to the hop-by-hop nature of a standard HTTP proxy.

WebSocket proxy modes

There are two methods for proxying WebSocket traffic in Kong Gateway:

  • HTTP(S) services and routes
  • WS(S) services and routes

HTTP(S) services and routes

Services and routes using the http and https protocols are fully capable of handling WebSocket connections with no special configuration. With this method, WebSocket sessions behave identically to regular HTTP requests, and all of the request/response data is treated as an opaque stream of bytes.

  1. services:
  2. - name: my-http-websocket-service
  3. protocol: http
  4. host: 1.2.3.4
  5. port: 80
  6. path: /
  7. routes:
  8. - name: my-http-websocket-route
  9. protocols:
  10. - http
  11. - https

WS(S) services and routes

In addition to HTTP services and routes, Kong Enterprise includes the ws (WebSocket-over-http) and wss (WebSocket-over-https) options for service protocol and route protocols. In contrast to http/https, ws and wss services have full control over the underlying WebSocket connection. This means that they can use WebSocket plugins and the WebSocket PDK to perform business logic on a per-message basis (message validation, accounting, rate-limiting, etc).

  1. services:
  2. - name: my-dedicated-websocket-service
  3. protocol: ws
  4. host: 1.2.3.4
  5. port: 80
  6. path: /
  7. routes:
  8. - name: my-dedicated-websocket-route
  9. protocols:
  10. - ws
  11. - wss

Note: Decoding and encoding WebSocket messages comes with a non-zero amount of performance overhead when compared with the protocol-agnostic behavior of http(s) services. If your API does not need the extra capabilities provided by a ws(s) service, it’s recommended that you use an http(s) service instead.

WebSocket and TLS

Regardless of which service/route protocols are in use (http(s) or ws(s)), Kong Gateway will accept plain and TLS WebSocket connections on its respective http and https ports. To enforce TLS connections from clients, set the protocols property of the route to https or wss only.

When setting up the service to point to your upstream WebSocket service, you should carefully pick the protocol you want to use between Kong Gateway and the upstream.

If you want to use TLS, your upstream WebSocket service must be defined using the https (or wss) protocol in the service protocol property and the proper port (usually 443). To connect without TLS, then the http (or ws) protocol and port (usually 80) should be used in protocol instead.

If you want Kong Gateway to terminate TLS, you can accept https/wss only from the client, but proxy to the upstream service over plain text (http or ws).

Proxy gRPC traffic

gRPC proxying is natively supported in Kong Gateway. In order to manage gRPC services and proxy gRPC requests with Kong Gateway, create services and routes for your gRPC services.

Only observability and logging plugins are supported with gRPC - plugins known to be supported with gRPC have “grpc” and “grpcs” listed under the supported protocols field in their Kong Hub page - for example, check out the File Log plugin’s page.

Proxy TCP/TLS traffic

TCP and TLS proxying is natively supported in Kong Gateway.

In this mode, data of incoming connections reaching the stream_listen endpoints will be passed through to the upstream. It is possible to terminate TLS connections from clients using this mode as well.

To use this mode, aside from defining stream_listen, appropriate route/service object with protocol types of tcp or tls should be created.

If TLS termination by Kong Gateway is desired, the following conditions must be met:

  1. The Kong Gateway port where TLS connection connects to must have the ssl flag enabled
  2. A certificate/key that can be used for TLS termination must be present inside Kong Gateway, as shown in Configuring TLS for a Route

Kong Gateway will use the connecting client’s TLS SNI server name extension to find the appropriate TLS certificate to use.

On the service side, depends on whether connection between Kong Gateway and the upstream service need to be encrypted, tcp or tls protocol types can be set accordingly. This means all of the below setup are supported in this mode:

  1. Client <- TLS -> Kong <- TLS -> Upstream
  2. Client <- TLS -> Kong <- Cleartext -> Upstream
  3. Client <- Cleartext -> Kong <- TLS -> Upstream

Note: In L4 proxy mode, only plugins that has tcp or tls in the supported protocol list are supported. This list can be found in their respective documentation on Kong Hub.

Back to top

Proxy TLS passthrough traffic

Kong Gateway supports proxying a TLS request without terminating or known as SNI proxy.

Kong Gateway uses the connecting client’s TLS SNI extension to find the matching Route and Service and forward the complete TLS request upstream, without decrypting the incoming TLS traffic.

In this mode, you need to:

  • Create a route object with the protocol tls_passthrough, and the snis field set to one or more SNIs.
  • Set the corresponding service object’s protocol to tcp.
  • Send requests to a port that has the ssl flag in its stream_listen directive.

Separate SNI and Certificate entities aren’t required and won’t be used.

Routes are not allowed to match tls and tls_passthrough protocols at same time. However, the same SNI is allowed to match tls and tls_passthrough in different routes.

It’s also possible to set route to tls_passthrough and service to tls. In this mode, the connection to the upstream will be TLS-encrypted twice.

Note: To run any plugins in this mode, the plugin’s protocols field must include tls_passthrough.

Back to top

Conclusion

Through this guide, we hope you gained knowledge of the underlying proxying mechanism of Kong Gateway, from how does a request match a route to be routed to its associated service, on to how to allow for using the WebSocket protocol or setup dynamic TLS certificates.

This website is open-source and can be found at github.com/Kong/docs.konghq.com. Feel free to provide feedback to this document there, or propose improvements!

If you haven’t already, we suggest that you also read the Load balancing Reference, as it closely relates to the topic we just covered.