Configuration Examples
The following examples provide some typical configurations for enabling
the aws-lambda
plugin on a
service.
Make the following request:
curl -X POST http://localhost:8001/services/SERVICE_NAME|SERVICE_ID/plugins \
--data "name=aws-lambda" \
--data "config.aws_key=<AWS_KEY>" \
--data "config.aws_secret=<AWS_SECRET>" \
--data "config.aws_region=<AWS_REGION>" \
--data "config.aws_assume_role_arn=<AWS_ASSUME_ROLE_ARN>" \
--data "config.aws_role_session_name=<AWS_ROLE_SESSION_NAME>" \
--data "config.function_name=<LAMBDA_FUNCTION_NAME>" \
--data "config.proxy_url=http://my-proxy-server:3128"
Replace SERVICE_NAME|SERVICE_ID
with the id
or name
of the service that this plugin configuration will target.
First, create a KongPlugin resource:
echo "
apiVersion: configuration.konghq.com/v1
kind: KongPlugin
metadata:
name: aws-lambda-example
plugin: aws-lambda
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
" | kubectl apply -f -
Next, apply the KongPlugin
resource to an ingress by annotating the service
as follows:
kubectl annotate service SERVICE_NAME konghq.com/plugins=aws-lambda-example
Replace SERVICE_NAME
with the name of the service that this plugin configuration will target.
You can see your available ingresses by running kubectl get service
.
Note: The KongPlugin resource only needs to be defined once and can be applied to any service, consumer, or route in the namespace. If you want the plugin to be available cluster-wide, create the resource as aKongClusterPlugin
instead ofKongPlugin
.
Add this section to your declarative configuration file:
plugins:
- name: aws-lambda
service: SERVICE_NAME|SERVICE_ID
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
Replace SERVICE_NAME|SERVICE_ID
with the id
or name
of the service that this plugin configuration will target.
The following examples provide some typical configurations for enabling
the aws-lambda
plugin on a
route.
Make the following request:
curl -X POST http://localhost:8001/routes/ROUTE_NAME|ROUTE_ID/plugins \
--data "name=aws-lambda" \
--data "config.aws_key=<AWS_KEY>" \
--data "config.aws_secret=<AWS_SECRET>" \
--data "config.aws_region=<AWS_REGION>" \
--data "config.aws_assume_role_arn=<AWS_ASSUME_ROLE_ARN>" \
--data "config.aws_role_session_name=<AWS_ROLE_SESSION_NAME>" \
--data "config.function_name=<LAMBDA_FUNCTION_NAME>" \
--data "config.proxy_url=http://my-proxy-server:3128"
Replace ROUTE_NAME|ROUTE_ID
with the id
or name
of the route that this plugin configuration will target.
First, create a KongPlugin resource:
echo "
apiVersion: configuration.konghq.com/v1
kind: KongPlugin
metadata:
name: aws-lambda-example
plugin: aws-lambda
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
" | kubectl apply -f -
Next, apply the KongPlugin
resource to an ingress by annotating the ingress
as follows:
kubectl annotate ingress INGRESS_NAME konghq.com/plugins=aws-lambda-example
Replace INGRESS_NAME
with the name of the ingress that this plugin configuration will target.
You can see your available ingresses by running kubectl get ingress
.
Note: The KongPlugin resource only needs to be defined once and can be applied to any service, consumer, or route in the namespace. If you want the plugin to be available cluster-wide, create the resource as aKongClusterPlugin
instead ofKongPlugin
.
Add this section to your declarative configuration file:
plugins:
- name: aws-lambda
route: ROUTE_NAME|ROUTE_ID
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
Replace ROUTE_NAME|ROUTE_ID
with the id
or name
of the route that this plugin configuration
will target.
The following examples provide some typical configurations for enabling
the aws-lambda
plugin on a
consumer.
Make the following request:
curl -X POST http://localhost:8001/consumers/CONSUMER_NAME|CONSUMER_ID/plugins \
--data "name=aws-lambda" \
--data "config.aws_key=<AWS_KEY>" \
--data "config.aws_secret=<AWS_SECRET>" \
--data "config.aws_region=<AWS_REGION>" \
--data "config.aws_assume_role_arn=<AWS_ASSUME_ROLE_ARN>" \
--data "config.aws_role_session_name=<AWS_ROLE_SESSION_NAME>" \
--data "config.function_name=<LAMBDA_FUNCTION_NAME>" \
--data "config.proxy_url=http://my-proxy-server:3128"
Replace CONSUMER_NAME|CONSUMER_ID
with the id
or name
of the consumer that this plugin configuration will target.
in the same request, to further narrow the scope of the plugin.
First, create a KongPlugin resource:
echo "
apiVersion: configuration.konghq.com/v1
kind: KongPlugin
metadata:
name: aws-lambda-example
plugin: aws-lambda
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
" | kubectl apply -f -
Next, apply the KongPlugin
resource to an ingress by annotating the KongConsumer
object as follows:
kubectl annotate KongConsumer CONSUMER_NAME konghq.com/plugins=aws-lambda-example
Replace CONSUMER_NAME
with the name of the consumer that this plugin configuration will target.
You can see your available consumers by running kubectl get KongConsumer
.
To learn more about KongConsumer
objects, see Provisioning Consumers and Credentials
.
Note: The KongPlugin resource only needs to be defined once and can be applied to any service, consumer, or route in the namespace. If you want the plugin to be available cluster-wide, create the resource as aKongClusterPlugin
instead ofKongPlugin
.
Add this section to your declarative configuration file:
plugins:
- name: aws-lambda
consumer: CONSUMER_NAME|CONSUMER_ID
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
Replace CONSUMER_NAME|CONSUMER_ID
with the id
or name
of the consumer that this plugin configuration will target.
A plugin which is not associated to any service, route, or consumer is considered global, and will be run on every request. Read the Plugin Reference and the Plugin Precedence sections for more information.
The following examples provide some typical configurations for enabling
the AWS Lambda
plugin globally.
Make the following request:
curl -X POST http://localhost:8001/plugins/ \
--data "name=aws-lambda" \
--data "config.aws_key=<AWS_KEY>" \
--data "config.aws_secret=<AWS_SECRET>" \
--data "config.aws_region=<AWS_REGION>" \
--data "config.aws_assume_role_arn=<AWS_ASSUME_ROLE_ARN>" \
--data "config.aws_role_session_name=<AWS_ROLE_SESSION_NAME>" \
--data "config.function_name=<LAMBDA_FUNCTION_NAME>" \
--data "config.proxy_url=http://my-proxy-server:3128"
Create a KongClusterPlugin resource and label it as global:
apiVersion: configuration.konghq.com/v1
kind: KongClusterPlugin
metadata:
name: <global-aws-lambda>
annotations:
kubernetes.io/ingress.class: kong
labels:
global: "true"
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128
plugin: aws-lambda
Add a plugins
entry in the declarative
configuration file:
plugins:
- name: aws-lambda
config:
aws_key: "<AWS_KEY>"
aws_secret: "<AWS_SECRET>"
aws_region: "<AWS_REGION>"
aws_assume_role_arn: "<AWS_ASSUME_ROLE_ARN>"
aws_role_session_name: "<AWS_ROLE_SESSION_NAME>"
function_name: "<LAMBDA_FUNCTION_NAME>"
proxy_url: http://my-proxy-server:3128