Plugin overview
The plug-in is to kong, just like the aop function in Spring.
After the request arrives in Kong and before forwarding to the back-end application, you can apply Kong’s built-in plug-in pair Request processing, legal authentication, current limit control, black and white list verification, log collection, etc. At the same time, you can also customize and develop your own plug-ins in accordance with Kong’s tutorial documents.
kong plug-ins are divided into open source version and community version. The community version has more customization features, but the community version is charged.
Currently, the KONG open source version has a total of 28 plugins open, as follows: p>
acl, aws-lambda, basic-auth, bot-detection, correlation-id, cors, datadog, file- log, galileo, hmac-auth, http-log, ip-restriction, jwt, key-auth, ldap-auth, loggly, oauth2, rate-limiting, request-size-limiting, request-termination, request-transformer, response- ratelimiting、response-transformer、runscope、statsd、syslog、tcp-log、udp-log
以上插件,主要分五大类,Authentication认证,Security安全, Traffic Control, Analytics & Monitoring, Logging, and other request message processing classes.