kong网关从入门到精通

Kong网关中如何进行KongA管理UI使用

站在用户的角度思考问题,与客户深入沟通,找到古蔺网站设计与古蔺网站推广的解决方案,凭借多年的经验,让设计与互联网技术结合,创造个性化、用户体验好的作品,建站类型包括:成都网站建设、网站制作、企业官网、英文网站、手机端网站、网站推广、域名注册雅安服务器托管、企业邮箱。业务覆盖古蔺地区。

Kong是一个高性能的API网关,它提供了许多功能,如路由、认证、限流、监控等,KongA是Kong的一个插件,用于管理API网关的访问权限,本文将介绍如何在Kong网关中进行KongA管理UI使用。

安装Kong和KongA

1、安装Kong

我们需要在服务器上安装Kong,可以通过以下命令下载并安装Kong:

wget https://bintray.com/kong/kong-1.5.x/kong-1.5.x.tar.gz
tar xzf kong-1.5.x.tar.gz
cd kong-1.5.x

2、安装KongA

接下来,我们需要安装KongA,可以通过以下命令下载并安装KongA:

wget https://bintray.com/kong/kong-plugin-gateway-auth-access-control/1.0.3/kong-plugin-gateway-auth-access-control-1.0.3.tar.gz
tar xzf kong-plugin-gateway-auth-access-control-1.0.3.tar.gz
cd kong-plugin-gateway-auth-access-control-1.0.3

配置Kong和KongA

1、配置Kong

我们需要创建一个名为kong.conf的配置文件,在这个文件中,我们将配置Kong的一些基本设置,如监听地址、日志文件等,创建一个名为kong.conf的文件,并添加以下内容:

监听地址
host = 0.0.0.0
port = 8000
日志文件
log_level = "info"
log_file = "/tmp/kong.log"

我们需要创建一个名为kong/plugins的目录,并在其中创建一个名为access-control的子目录,在access-control目录中,我们需要创建一个名为config.yml的配置文件,并添加以下内容:

access_control: {}  空的配置表示使用默认设置

2、配置KongA

接下来,我们需要创建一个名为konga.conf的配置文件,在这个文件中,我们将配置KongA的一些基本设置,如数据库连接、用户表等,创建一个名为konga.conf的文件,并添加以下内容:

[database]
driver = mysql
host = localhost
port = 3306
user = root
password = password
dbname = konga_db
tables = users roles permissions apikeys routes resources services consumers organizations plugins gateways groups upstreams targets headers request_bodies response_bodies jwt_claims jwt_headers claims headers urls url_paths query_strings path_parameters headers_parameters body_parameters form_parameters cookies files metadata metavalues url_methods request_method response_code response_headers response_content_type response_content_encoding content_length expires last_modified etag server default max_age vary accept_ranges content_disposition content_encoding content_language cache control expires_after expires_before conditional request if_modified_since if_none_match if_unmodified_since connection keepalive max_keepalive timeout user agent referer accept host remoteaddr remotehost protocol http2ssl verify always never proxy forward proxypass proxycookie proxyauth http01 redirect permanent temporary see other options status code reason phrase wwwauthenticate proxyauthorization basic bearer digest cookie authn_error authz_error nonce token refreshtoken clientid clientsecret clientip clientsub clientrealm clientjwt expires_in refresh_interval scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include_granted scope id username password admin secret publickey privatekey passphrase salt algorithm keyid nbf iat iss use itd sub claim jti audience subject issuer notBefore expiresAt provider nbf clockSkew cty exp iat iss notBefore expiresAt provider tokenuse gdpr include

文章题目:kong网关从入门到精通
网站地址:http://www.36103.cn/qtweb/news11/33011.html

网站建设、网络推广公司-创新互联,是专注品牌与效果的网站制作,网络营销seo公司;服务项目有等

广告

声明:本网站发布的内容(图片、视频和文字)以用户投稿、用户转载内容为主,如果涉及侵权请尽快告知,我们将会在第一时间删除。文章观点不代表本网站立场,如需处理请联系客服。电话:028-86922220;邮箱:631063699@qq.com。内容未经允许不得转载,或转载时需注明来源: 创新互联