Skip to content
Kong Logo | Kong Docs Logo
search
  • We're Hiring!
  • Docs
    • Kong Gateway
    • Kong Konnect
    • Kong Mesh
    • Plugin Hub
    • decK
    • Kubernetes Ingress Controller
    • Insomnia
    • Kuma

    • Docs contribution guidelines
  • Plugin Hub
  • Support
  • Community
  • Kong Academy
Get a Demo Start Free Trial
  • Kong Gateway
  • Kong Konnect
  • Kong Mesh
  • Plugin Hub
  • decK
  • Kubernetes Ingress Controller
  • Insomnia
  • Kuma

  • Docs contribution guidelines
  • 3.2.x (latest)
  • 3.1.x
  • 3.0.x
  • 2.8.x
  • 2.7.x
  • 2.6.x
  • Older Enterprise versions (2.1-2.5)
  • Older OSS versions (2.1-2.5)
  • Archive (pre-2.1)
    • Overview of Kong Gateway
      • Version Support Policy
      • Third Party Dependencies
      • Browser Support
    • Stability
    • Release Notes
      • Services
        • Overview
        • Configure Routes with Expressions
      • Upstreams
      • Plugins
      • Routing Traffic
      • Load Balancing
      • Health Checks and Circuit Breakers
      • Kong Performance Testing
    • Glossary
    • Get Kong
    • Services and Routes
    • Rate Limiting
    • Proxy Caching
    • Key Authentication
    • Load-Balancing
      • Overview
        • Overview
        • Deploy Kong Gateway in Hybrid mode
      • DB-less Deployment
      • Traditional
      • Overview
        • Helm
        • OpenShift with Helm
        • kubectl apply
        • Kubernetes Deployment Options
        • Using docker run
        • Build your own Docker images
        • Amazon Linux
        • Debian
        • Red Hat
        • Ubuntu
      • Running Kong as a non-root user
      • Securing the Admin API
      • Using systemd
      • Start Kong Gateway Securely
      • Programatically Creating Admins
      • Enabling RBAC
      • Overview
      • Download your License
      • Deploy Enterprise License
      • Using the License API
      • Monitor Licenses Usage
      • Default Ports
      • DNS Considerations
      • Network and Firewall
      • CP/DP Communication through a Forward Proxy
        • Configure PostgreSQL TLS
        • Troubleshooting PostgreSQL TLS
    • Kong Configuration File
    • Environment Variables
    • Serving a Website and APIs from Kong
      • Overview
      • Prometheus
      • StatsD
      • Datadog
      • Overview
      • Writing a Custom Trace Exporter
      • Tracing API Reference
    • Resource Sizing Guidelines
    • Security Update Process
    • Blue-Green Deployments
    • Canary Deployments
    • Clustering Reference
      • Log Reference
      • Dynamic log level updates
      • Customize Gateway Logs
      • Upgrade Kong Gateway 3.x.x
      • Migrate from OSS to Enterprise
    • Overview
      • Overview
      • Metrics
      • Analytics with InfluxDB
      • Analytics with Prometheus
      • Estimate Analytics Storage in PostgreSQL
      • Overview
      • Getting Started
      • Advanced Usage
        • Overview
        • Environment Variables
        • AWS Secrets Manager
        • Google Secrets Manager
        • Hashicorp Vault
        • Securing the Database with AWS Secrets Manager
      • Reference Format
      • Overview
      • Get Started with Dynamic Plugin Ordering
      • Overview
      • Enable the Dev Portal
      • Publish an OpenAPI Spec
      • Structure and File Types
      • Themes Files
      • Working with Templates
      • Using the Editor
        • Basic Auth
        • Key Auth
        • OIDC
        • Sessions
        • Adding Custom Registration Fields
        • Manage Developers
        • Developer Roles and Content Permissions
        • Authorization Provider Strategy
        • Enable Application Registration
        • Enable Key Authentication for Application Registration
          • External OAuth2 Support
          • Set up Okta and Kong for External Oauth
          • Set up Azure AD and Kong for External Authentication
        • Manage Applications
        • Theme Editing
        • Migrating Templates Between Workspaces
        • Markdown Rendering Module
        • Customizing Portal Emails
        • Adding and Using JavaScript Assets
        • Single Page App in Dev Portal
        • Alternate OpenAPI Renderer
      • SMTP
      • Workspaces
      • Helpers CLI
      • Portal API Documentation
    • Audit Logging
    • Keyring and Data Encryption
    • Workspaces
    • Consumer Groups
    • Event Hooks
    • Configure Data Plane Resilience
    • About Control Plane Outage Management
      • Overview
      • Install the FIPS Compliant Package
      • FIPS 140-2 Compliant Plugins
    • Overview
    • Enable Kong Manager
      • Services and Routes
      • Rate Limiting
      • Proxy Caching
      • Authentication with Consumers
      • Load Balancing
      • Overview
      • Create a Super Admin
      • Workspaces and Teams
      • Reset Passwords and RBAC Tokens
      • Basic Auth
        • Configure LDAP
        • LDAP Service Directory Mapping
        • Configure OIDC
        • OIDC Authenticated Group Mapping
      • Sessions
        • Overview
        • Enable RBAC
        • Add a Role and Permissions
        • Create a User
        • Create an Admin
    • Networking Configuration
    • Workspaces
    • Create Consumer Groups
    • Sending Email
    • Overview
    • File Structure
    • Implementing Custom Logic
    • Plugin Configuration
    • Accessing the Data Store
    • Storing Custom Entities
    • Caching Custom Entities
    • Extending the Admin API
    • Writing Tests
    • (un)Installing your Plugin
      • Overview
      • kong.client
      • kong.client.tls
      • kong.cluster
      • kong.ctx
      • kong.ip
      • kong.jwe
      • kong.log
      • kong.nginx
      • kong.node
      • kong.request
      • kong.response
      • kong.router
      • kong.service
      • kong.service.request
      • kong.service.response
      • kong.table
      • kong.tracing
      • kong.vault
      • kong.websocket.client
      • kong.websocket.upstream
      • Go
      • Javascript
      • Python
      • Running Plugins in Containers
      • External Plugin Performance
    • Overview
        • Overview
        • OpenID Connect with Curity
        • OpenID Connect with Azure AD
        • OpenID Connect with Google
        • OpenID Connect with Okta
        • OpenID Connect with Auth0
        • OpenID Connect with Cognito
      • Authentication Reference
      • Allow Multiple Authentication Plugins
    • Rate Limiting Plugin
      • Add a Body Value
    • GraphQL
      • gRPC Plugins
      • Configure a gRPC service
    • Overview
    • Information Routes
    • Health Routes
    • Tags
    • Debug Routes
    • Services
    • Routes
    • Consumers
    • Plugins
    • Certificates
    • CA Certificates
    • SNIs
    • Upstreams
    • Targets
    • Vaults
    • Keys
    • Licenses
    • Workspaces
    • RBAC
    • Admins
    • Developers
    • Consumer Groups
    • Event Hooks
    • Keyring and Data Encryption
    • Audit Logs
    • kong.conf
    • Injecting Nginx Directives
    • CLI
    • Key Management
    • Performance Testing Framework
    • Router Expressions Language
    • FAQ

github-edit-pageEdit this page

report-issueReport an issue

enterprise-switcher-iconSwitch to OSS

On this page
  • systemd commands for working with Kong Gateway
    • Start Kong Gateway
    • Stop Kong Gateway
    • Start Kong Gateway at system boot
    • Restart Kong Gateway
    • Query Kong Gateway status
  • Customize the Kong Gateway unit file
    • Logging to syslog and journald
    • Customize Kong’s Nginx instance using the Nginx directive injection system
    • Customize Kong’s Nginx instance using ––nginx-conf
    • Customize Kong’s Nginx instance including files via the injected Nginx directives
Kong Gateway
3.2.x (latest)
  • Home
  • Kong Gateway
  • Production Deployment
  • Running Kong
  • Control Kong Gateway through systemd

Control Kong Gateway through systemd

This document includes instructions on how to integrate Kong Gateway with systemd for Debian and RPM based packages.

Note that some of the supported GNU/Linux distributions for Kong Gateway may not have adopted systemd as their default init system (for example, CentOS 6 and RHEL 6). For the following instructions, it is assumed that Kong Gateway has already been installed and configured on a systemd-supported GNU/Linux distribution.

systemd commands for working with Kong Gateway

Start Kong Gateway

# For Kong Gateway
sudo systemctl start kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl start kong

Stop Kong Gateway

# For Kong Gateway
sudo systemctl stop kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl stop kong

Start Kong Gateway at system boot

Enable starting Kong Gateway automatically at system boot

# For Kong Gateway
sudo systemctl enable kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl enable kong

Disable starting Kong Gateway automatically at system boot

# For Kong Gateway
sudo systemctl disable kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl disable kong

Restart Kong Gateway

# For Kong Gateway
sudo systemctl restart kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl restart kong

Query Kong Gateway status

# For Kong Gateway
sudo systemctl status kong-enterprise-edition

# For Kong Gateway (OSS)
sudo systemctl status kong

Customize the Kong Gateway unit file

The official systemd service is located at /lib/systemd/system/kong-enterprise-edition.service for Kong Gateway, or at /lib/systemd/system/kong.service for Kong Gateway (OSS).

For scenarios where customizations are needed (for example, configuring Kong or modifying the service file behavior), we recommend creating another service at /etc/systemd/system/kong-enterprise-edition.service for Kong Gateway, or at /etc/systemd/system/kong.service for Kong Gateway (OSS), to avoid conflicts upon reinstalling or upgrading Kong.

All environment variables prefixed with KONG_ and capitalized will override the settings specified in the /etc/kong/kong.conf.default file. For example: log_level = debug in the .conf file translates to the KONG_LOG_LEVEL=debug environment variable.

You can also choose use a configuration file instead of environment variables. In this case, modify the ExecStartPre systemd directive to execute kong prepare with the -c argument to point to your configuration file. For example, if you have a custom configuration file at /etc/kong/kong.conf, modify the ExecStartPre directive as follows:

ExecStartPre=/usr/local/bin/kong prepare -p /usr/local/kong -c /etc/kong/kong.conf

When linking non environment files using the EnvironmentFile systemd directive, note that the systemd parser will only recognize environment variables assignments. For example, if one of the Kong’s default configuration files are linked (/etc/kong/kong.conf.default and /etc/kong.conf), non environment variables assignments in the file could lead to systemd errors. In this case, systemd will not allow the Kong service to be started. For this reason, we recommend specifying an EnvironmentFile other than the default ones:

EnvironmentFile=/etc/kong/kong_env.conf

Logging to syslog and journald

In this case, adding the below Environment systemd directives to your customized systemd service file at /etc/systemd/system/kong-enterprise-edition.service will do it:

Environment=KONG_PROXY_ACCESS_LOG=syslog:server=unix:/dev/log
Environment=KONG_PROXY_ERROR_LOG=syslog:server=unix:/dev/log
Environment=KONG_ADMIN_ACCESS_LOG=syslog:server=unix:/dev/log
Environment=KONG_ADMIN_ERROR_LOG=syslog:server=unix:/dev/log

To view the journald logs:

# For Kong Gateway
journalctl -u kong-enterprise-edition

# For Kong Gateway (OSS)
journalctl -u kong

To view the syslog logs:

tail -F /var/log/syslog

Customize Kong’s Nginx instance using the Nginx directive injection system

To use the injection system with environment variables, add the below Environment systemd directive to your custom service at /etc/systemd/system/kong-enterprise-edition.service (Kong Gateway) or /etc/systemd/system/kong.service (Kong Gateway (OSS)). Note the quoting rules defined by systemd to specify an environment variable containing spaces:

Environment="KONG_NGINX_HTTP_OUTPUT_BUFFERS=4 64k"

Customize Kong’s Nginx instance using ––nginx-conf

To use the --nginx-conf argument, modify the ExecStartPre systemd directive to execute kong prepare with the --nginx-conf argument. For example, if you have a custom template at /usr/local/kong/custom-nginx.template, modify the ExecStartPre directive as follows:

ExecStartPre=/usr/local/bin/kong prepare -p /usr/local/kong --nginx-conf /usr/local/kong/custom-nginx.template

Customize Kong’s Nginx instance including files via the injected Nginx directives

To include files via the injected Nginx directives with environment variables, add the below Environment systemd directive to your custom service at /etc/systemd/system/kong-enterprise-edition.service (Kong Gateway) or /etc/systemd/system/kong.service (Kong Gateway (OSS)):

Environment=KONG_NGINX_HTTP_INCLUDE=/path/to/your/my-server.kong.conf
Thank you for your feedback.
Was this page useful?
  • Kong
    THE CLOUD CONNECTIVITY COMPANY

    Kong powers reliable digital connections across APIs, hybrid and multi-cloud environments.

    • Company
    • Customers
    • Events
    • Investors
    • Careers Hiring!
    • Partners
    • Press
    • Contact
  • Products
    • Kong Konnect
    • Kong Gateway
    • Kong Mesh
    • Get Started
    • Pricing
  • Resources
    • eBooks
    • Webinars
    • Briefs
    • Blog
    • API Gateway
    • Microservices
  • Open Source
    • Install Kong Gateway
    • Kong Community
    • Kubernetes Ingress
    • Kuma
    • Insomnia
  • Solutions
    • Decentralize
    • Secure & Govern
    • Create a Dev Platform
    • API Gateway
    • Kubernetes
    • Service Mesh
Star
  • Terms•Privacy
© Kong Inc. 2023