[KONG series four] plug-in

Plugin overview

The plug-in is to kong, just like the aop function in Spring.

After the request arrives in Kong and before forwarding to the back-end application, you can apply Kong’s built-in plug-in pair Request processing, legal authentication, current limit control, black and white list verification, log collection, etc. At the same time, you can also customize and develop your own plug-ins in accordance with Kong’s tutorial documents.

kong plug-ins are divided into open source version and community version. The community version has more customization features, but the community version is charged.

Currently, the KONG open source version has a total of 28 plugins open, as follows: p>

acl, aws-lambda, basic-auth, bot-detection, correlation-id, cors, datadog, file- log, galileo, hmac-auth, http-log, ip-restriction, jwt, key-auth, ldap-auth, loggly, oauth2, rate-limiting, request-size-limiting, request-termination, request-transformer, response- ratelimiting、response-transformer、runscope、statsd、syslog、tcp-log、udp-log

以上插件,主要分五大类,Authentication认证,Security安全, Traffic Control, Analytics & Monitoring, Logging, and other request message processing classes.

WordPress database error: [Table 'yf99682.wp_s6mz6tyggq_comments' doesn't exist]
SELECT SQL_CALC_FOUND_ROWS wp_s6mz6tyggq_comments.comment_ID FROM wp_s6mz6tyggq_comments WHERE ( comment_approved = '1' ) AND comment_post_ID = 1677 ORDER BY wp_s6mz6tyggq_comments.comment_date_gmt ASC, wp_s6mz6tyggq_comments.comment_ID ASC

Leave a Comment

Your email address will not be published.