Centralized consumer management
A consumer is a Kong Gateway entity that consumes or uses the APIs managed by Kong Gateway. These can be things like applications, services, or users who interact with your APIs. Consumers can be scoped to a Konnect region and managed centrally, or be scoped to a control plane in Gateway Manager.
Centralized consumer management provides the following benefits:
- Set up consumer identity centrally instead of defining it in multiple control planes.
- Share consumers across multiple control planes. Users don’t need to replicate changes to consumer identity in multiple control planes and consumer configuration doesn’t conflict.
- Reduce configuration sync issues between the control plane and the data planes. Consumers that are managed centrally aren’t part of the configuration that is pushed down from the control plane to the data planes, so it reduces config size and latency.
How centralized consumer management works
When you create a consumer centrally, you must assign it to a realm. A realm groups consumers around an identity, defined by organizational boundaries, such as a production realm or a development realm. Realms are connected to a geographic region in Konnect. Centrally managed consumers exist outside of control planes, so they can be used across control planes.
Create consumers and realms
You can manage consumers centrally using the Konnect API. Only Org Admins and Control Plane Admins have CRUD permissions for these consumers.
Centralized consumer management is only available for Kong Gateway 3.10 data planes. Make sure your control plane uses 3.10 data planes at minimum when configuring these consumers.
- Use the
/realms
endpoint to create a realm and optionally associate it with allowed control planes and time-to-live values:curl -X POST \ https://{region}.api.konghq.com/v1/realms \ -H "Content-Type: application/json" \ -H "Authorization: Bearer $KONNECT_TOKEN" \ -d '{ "name": "prod", "allowed_control_planes": [ "$CONTROL_PLANE_UUID" ], "ttl": 10, "negative_ttl": 10, "consumer_groups": [ "$CONSUMER_GROUP" ] }'
Save the ID of the realm.
Be sure to replace the following with your own values:
-
{region}
: Region for your Konnect instance. Data planes can only reach out to realms in the same region as the data plane. -
$KONNECT_TOKEN
: Replace with your Konnect personal access token. -
$CONTROL_PLANE_UUID
: (Optional) Replace with your control plane UUID. -
ttl
: (Optional) ‘ttl’ is the time-to-live (TTL) in minutes of the consumer for this realm in the Kong Gateway cache. -
negative_ttl
: (Optional) Represents the TTL of a bad login cache entry. -
$CONSUMER_GROUP
: (Optional) Replace with the name of the consumer groups you want to associate with the realm.
-
- Use the
/realms/{realmId}/consumers
endpoint to create a centrally managed consumer and optionally assign it to a consumer group:curl -X POST \ https://{region}.api.konghq.com/v1/realms/{realmId}/consumers \ -H "Content-Type: application/json" \ -H "Authorization: Bearer TOKEN" \ -d '{ "username": "$CONSUMER_NAME", "consumer_groups": ["$CONSUMER_GROUP"] }'
Save the ID of the consumer.
Be sure to replace the following with your own values:
-
{region}
: Region for your Konnect instance. Data planes can only reach out to realms in the same region as the data plane. -
$KONNECT_TOKEN
: Replace with your Konnect personal access token. -
{realmId}
: The ID of the realm you created previously. -
$CONSUMER_NAME
: Replace with the name of the consumer. -
$CONSUMER_GROUP
: (Optional) Replace with the name of the consumer groups you want to associate with the consumer. Consumer groups set here are additive. This means that if you configure the realm with consumer groups A and B, and then configure the consumer with consumer group C, the authenticated consumer will be assigned to consumer groups A, B, and C.
-
- Configure authentication keys for consumers:
curl -X POST \ https://{region}.api.konghq.com/v1/realms/{realmId}/consumers/{consumerId}/keys \ -H "Content-Type: application/json" \ -H "Authorization: Bearer TOKEN" \ -d '{ "type": "new" }'
Be sure to replace the following with your own values:
-
{region}
: Region for your Konnect instance. Data planes can only reach out to realms in the same region as the data plane. -
$KONNECT_TOKEN
: Replace with your Konnect personal access token. -
{realmId}
: The ID of the realm you created previously. -
{consumerId}
: The ID of the consumer you created previously.
-
-
Consumers require authentication. Configure authentication using the Key Auth plugin.
identity_realms
are scoped to the control plane by default (scope: cp
). The order in which you configure theidentity_realms
dictates the priority in which the data plane attempts to authenticate the provided API keys:- Realm is listed first: The data plane will first reach out to the realm. If the API key is not found in the realm, the data plane will look for the API key in the control plane config.
- Control plane scope listed first: The data plane will initially check the control plane configuration (LMDB) for the API key before looking up the API Key in the realm.
-
Realm only: You can also configure a single
identity_realms
by omitting thescope: cp
from the example. In this case, the data plane will only attempt to authenticate API keys against the realm. If the API key isn’t found, the request will be blocked. -
Control plane only: You can configure a look up only in the control plane config by only specifying
scope: cp
foridentity_realms
. In this scenario, the data plane will only check the control plane configuration (LMDB) for API key authentication. If the API key isn’t found, the request will be blocked.
Note: If you are using KIC to manage your data plane nodes in Konnect, ensure that you configure the
telemetry_endpoint
in the data plane. You can find thetelemetry_endpoint
in the Konnect UI in Gateway Manager in the data plane node instructions.