Skip to content
Kong Docs are moving soon! Our docs are migrating to a new home. You'll be automatically redirected to the new site in the future. In the meantime, view this page on the new site!
Kong Logo | Kong Docs Logo
  • Docs
    • Explore the API Specs
      View all API Specs View all API Specs View all API Specs arrow image
    • Documentation
      API Specs
      Kong Gateway
      Lightweight, fast, and flexible cloud-native API gateway
      Kong Konnect
      Single platform for SaaS end-to-end connectivity
      Kong AI Gateway
      Multi-LLM AI Gateway for GenAI infrastructure
      Kong Mesh
      Enterprise service mesh based on Kuma and Envoy
      decK
      Helps manage Kong’s configuration in a declarative fashion
      Kong Ingress Controller
      Works inside a Kubernetes cluster and configures Kong to proxy traffic
      Kong Gateway Operator
      Manage your Kong deployments on Kubernetes using YAML Manifests
      Insomnia
      Collaborative API development platform
  • Plugin Hub
    • Explore the Plugin Hub
      View all plugins View all plugins View all plugins arrow image
    • Functionality View all View all arrow image
      View all plugins
      AI's icon
      AI
      Govern, secure, and control AI traffic with multi-LLM AI Gateway plugins
      Authentication's icon
      Authentication
      Protect your services with an authentication layer
      Security's icon
      Security
      Protect your services with additional security layer
      Traffic Control's icon
      Traffic Control
      Manage, throttle and restrict inbound and outbound API traffic
      Serverless's icon
      Serverless
      Invoke serverless functions in combination with other plugins
      Analytics & Monitoring's icon
      Analytics & Monitoring
      Visualize, inspect and monitor APIs and microservices traffic
      Transformations's icon
      Transformations
      Transform request and responses on the fly on Kong
      Logging's icon
      Logging
      Log request and response data using the best transport for your infrastructure
  • Support
  • Community
  • Kong Academy
Get a Demo Start Free Trial
Kong Konnect
  • Home icon
  • Kong Konnect
  • Gateway Manager
  • Control Plane Groups
github-edit-pageEdit this page
report-issueReport an issue
  • Kong Gateway
  • Kong Konnect
  • Kong Mesh
  • Kong AI Gateway
  • Plugin Hub
  • decK
  • Kong Ingress Controller
  • Kong Gateway Operator
  • Insomnia
  • Kuma

  • Docs contribution guidelines
  • Introduction
    • Overview of Konnect
    • Architecture
    • Network Resiliency and Availability
    • Port and Network Requirements
    • Private Connections to Other Cloud Providers
      • Create a private connection with AWS PrivateLink
    • Geographic Regions
    • Centralized consumer management
    • Compatibility
    • Stages of Software Availability
    • Release Notes
    • Support
      • Control Plane Upgrades FAQ
      • Supported Installation Options
  • Get Started
    • Overview
    • Add your API
    • Migrating a Self-Managed Kong Gateway into Konnect
  • Gateway Manager
    • Overview
    • Dedicated Cloud Gateways
      • Overview
      • Provision a Dedicated Cloud Gateway
      • Securing Backend Traffic
      • Transit Gateways
      • Azure VNET Peering
      • Custom Domains
      • Custom Plugins
      • Data plane logs
    • Serverless Gateways
      • Overview
      • Provision a serverless Gateway
      • Securing Backend Traffic
      • Custom Domains
    • Data Plane Nodes
      • Installation Options
      • Upgrade a Data Plane Node
      • Verify a Data Plane Node
      • Secure Control Plane/Data Plane Communications
      • Renew Data Plane Certificates
      • Parameter Reference
      • Using Custom DP Labels
    • Control Plane Groups
      • Overview
      • Working with Control Plane Groups
      • Migrate Configuration into Control Plane Groups
      • Conflicts in Control Planes
    • Kong Gateway Configuration in Konnect
      • Overview
      • Manage Plugins
        • Overview
        • Adding Custom Plugins
        • Updating Custom Plugins
        • How to Create Custom Plugins
      • Create Consumer Groups
      • Secrets Management
        • Overview
        • Konnect Config Store
        • Set Up and Use a Vault in Konnect
      • Manage Control Plane Configuration with decK
    • Active Tracing
      • Overview
    • KIC Association
    • Backup and Restore
    • Version Compatibility
    • Troubleshooting
  • Mesh Manager
    • Overview
    • Create a mesh with the Kubernetes demo app
    • Federate a zone control plane to Konnect
    • Migrate a self-managed zone control plane to Konnect
  • Service Catalog
    • Overview
    • Integrations
      • Overview
      • Datadog
      • GitHub
      • GitLab
      • PagerDuty
      • SwaggerHub
      • Traceable
      • Slack
    • Scorecards
  • API Products
    • Overview
    • Product Documentation
    • Productize a Service
  • Dev Portal
    • Overview
    • Dev Portal Configuration Preparation
    • Create a Dev Portal
    • Sign Up for a Dev Portal Account
    • Publish an API to Dev Portal
    • Access and Approval
      • Manage Developer Access
      • Manage Developer Team Access
      • Add Developer Teams from IdPs
      • Manage Application Registrations
      • Configure generic SSO for Dev Portal
      • Configure Okta SSO for Dev Portal
    • Application Lifecycle
    • Register and create an application as a developer
    • Enable and Disable App Registration for API Product Versions
    • Dynamic Client Registration
      • Overview
      • Okta
      • Curity
      • Auth0
      • Azure
      • Custom IdP
    • Portal Management API Automation Guide
    • Audit Logging
      • Overview
      • Set up an Audit Log Webhook
      • Set up an Audit Log Replay Job
    • Portal Customization
      • Overview
      • About Self-Hosted Dev Portal
      • Host your Dev Portal with Netlify
      • Custom Domains
    • Dev Portal SDK
    • Troubleshoot
  • Advanced Analytics
    • Overview
    • Dashboard
    • Explorer
    • Analyze API Usage and Performance with Reports
    • Requests
  • Org Management
    • Plans and Billing
    • Authentication and Authorization
      • Overview
      • Teams
        • Overview
        • Manage Teams
        • Teams Reference
        • Roles Reference
      • Manage Users
      • Manage System Accounts
      • Personal Access Tokens
      • Social Identity Login
      • Org Switcher
      • Configure Generic SSO
      • Configure Okta SSO
      • Login Sessions Reference
      • Troubleshoot
    • Audit Logging
      • Overview
      • Set up an Audit Log Webhook
      • Set up an Audit Log Replay Job
    • Account and Org Deactivation
  • API
    • Overview
    • API Request API (Beta)
      • API Spec
    • API Products API
      • API Spec
    • Audit Logs API
      • API Spec
      • Audit Log Webhooks
    • Control Plane API
      • API Spec
    • Control Plane Configuration API
      • API Spec
    • Cloud Gateways API
      • API Spec
    • Identity API
      • API Spec
      • Identity Integration Guide
      • SSO Customization
    • Konnect Search API (Beta)
      • API Spec
    • Mesh Manager API
      • API Spec
      • Kong Mesh API Reference
    • Portal Client API
      • API Spec
    • Portal Management API
      • API Spec
    • Reference
      • Filtering
      • API Errors
  • Reference
    • Labels
    • Plugin Ordering Reference
    • Konnect Search
    • Terraform Provider
    • Audit Logs
    • Verify audit log signatures
    • IdP SAML attribute mapping
enterprise-switcher-icon Switch to OSS
On this pageOn this page
  • Standard control planes vs groups
  • Data plane nodes
  • Configuring core entities
  • Limitations
  • More information

Control Plane Groups
Available with Kong Gateway Enterprise subscription - Contact Sales

A control plane group is a read-only control plane that combines configuration from its members, which are standard control planes. All of the standard control planes within a control plane group share the same cluster of data plane nodes.

Standard control planes vs groups

In a standard control plane setup, each team configures and manages their own data plane nodes. For example, in the following diagram, Team Blue configures Control Plane Blue, which then uses a set of data plane nodes that only run Blue configuration; the same happens with Team Green.

Figure 1: Standard control plane workflow

In a control plane group setup, each team still administers their own control plane, but the data plane nodes are shared.

The following diagram illustrates using a control plane group for a federated platform administrator model. In this example:

  • Team Blue configures Control Plane Blue, which is then combined with the configuration from Team Green.
  • The control plane group also contains Control Plane Purple, which is managed by a central platform team.
  • The central platform team manages global plugin configuration in Control Plane Purple, which is added to any configuration that teams Blue and Green provide.

The data plane nodes in the cluster use the combined configuration from all three groups.

 
flowchart LR
  A(fa:fa-users Team Blue)
  B(fa:fa-users Team Green)
  C(Control plane Blue
  #40;standard group#41;)
  D(Control plane Purple
    global config
    #40;standard group#41;)
  E(Control plane Green
   #40;standard group#41;)
  F(fa:fa-layer-group Data plane nodes)
  G(fa:fa-layer-group Data plane nodes)

  A -- deck gateway sync --> C
  B -- deck gateway sync --> E

  subgraph id1 ["`**KONNECT ORG**`"]
    subgraph id2 [
Control plane group Steel] C D E end end id2 -- Get config from control plane group Steel--> F & G subgraph id3 [Data centers] F G end style A stroke:none,fill:#286FEB,color:#fff style B stroke:none,fill:#11A06B,color:#fff style C stroke:none,fill:#286FEB,color:#fff style D stroke:none,fill:#5F43E9,color:#fff style E stroke:none,fill:#11A06B,color:#fff style F stroke:#a2afb7 style G stroke:#a2afb7 linkStyle 0 stroke:#286FEB linkStyle 1 stroke:#11A06B style id1 rx:10,ry:10,stroke:#a2afb7,stroke-dasharray:3 style id2 rx:10,ry:10,stroke:none,fill:#dae3f2 style id3 rx:10,ry:10,stroke:#a2afb7,stroke-dasharray:3

Figure 2: Control plane group workflow

A control plane group can contain up to 256 control planes. You can add or remove up to 50 member control planes at a time.

Each standard control plane can be a member of no more than 5 control plane groups.

Data plane nodes

In a control plane group, the combined configuration from all member control planes is pushed to each data plane node.

A data plane node can only connect to a single control plane in a cluster. This means that in a control plane group, all data plane nodes must be managed from the control plane group itself. Members of a control plane group can’t have their own data plane nodes.

When adding a standard control plane to a group, make sure it has no connected data plane nodes.

The data plane nodes of a control plane group are not visible to a member control plane.

Configuring core entities

There are some special cases and behaviors to note for core entities in a control plane group.

All entities in a control plane group must have unique names and IDs. For example, if two members of a control plane group both have a service named example_service, it will cause a conflict which must be resolved to restore function.

A number of Kong entities can be associated with another Kong entity. Based on the type of association, the behavior of these associated entities in a control plane group follows one of these patterns:

  • If the entity relationship is referenced by ID, associations remain constrained to the behavior of the individual control plane.
  • If the entity relationship is referenced by a string, then associations across one or more member control planes are possible.
Entity Associated Entity Type of Association
Service Route By ID
Upstream Target By ID
Certificate SNI By ID
Consumer Credential By ID
Consumer Consumer group By ID
Consumer ACL group By string
Consumer groups Plugin By string
Plugin (Non-Global) Service, route, consumer By ID
Global plugin Control plane By control plane
Key Key set By ID
Vault Control plane By control plane
deGraphQL route Service By ID
GraphQL Rate Limiting cost decoration Service By ID

The Kong Gateway resource associated with an entity must be part of the same standard control plane as the entity.

Entity-specific behavior exceptions:

  • Consumers: A consumer of a standard control plane becomes a consumer of the control plane group once the originating control plane becomes a member of the control plane group. The authentication credentials of a consumer in a standard control plane become valid credentials of the control plane group. The ID of a consumer from one control plane group member can’t be used in authorization for another control plane group member.

  • Consumer groups: Only consumers from the same control plane can be added to a consumer group. Consumer group names in the Rate Limiting Advanced plugin can reference group names from other control plane group members.

  • Vaults: The prefix of each Vault must be unique. Once a Vault from a standard control plane becomes part of a control plane group, it becomes available to the whole control plane group. An entity field in a standard control plane can successfully reference a secret in a Vault from another standard control plane, now both part of the control plane group.

  • Global plugins: A plugin that is globally scoped in the standard control plane remains globally scoped in the control plane group. This plugin will affect the entire control plane group. For example, two instances of the Rate Limiting plugin cannot be installed in the control plane group.

Note: If you want to limit which users can apply global plugins, add all global plugins into a single control plane, and then grant access to only your limited set of users. If any other member control planes add a global plugin to their configuration, a conflict will result and prevent the changed configuration from being applied.

Limitations

A control plane group composition will be applied even if the configurations of the standard control planes are not combined successfully. This means that even if there is some conflict and the member control planes weren’t merged successfully, a control plane group still gets created.

Control plane groups are read-only (with some exceptions), so configuration modifications must be made via a member control plane.

The following are exceptions to the read-only rule:

  • A data plane node client certificate can be generated in the UI or uploaded to a control plane group.
  • Data plane nodes can be connected to a control plane group, however, members of a control plane group cannot have any data plane nodes connected to them.

Kong Ingress Controller control planes can’t be part of a control plane group.

One control plane group cannot be a member of another control plane group.

Conflict detection in a control plane group happens only after you have added a data plane node to the control plane group.

More information

  • Set up and manage control planes
  • Migrate configuration into a control plane group
  • Conflicts in control planes
Thank you for your feedback.
Was this page useful?
Too much on your plate? close cta icon
More features, less infrastructure with Kong Konnect. 1M requests per month for free.
Try it for Free
  • Kong
    Powering the API world

    Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

    • Products
      • Kong Konnect
      • Kong Gateway Enterprise
      • Kong Gateway
      • Kong Mesh
      • Kong Ingress Controller
      • Kong Insomnia
      • Product Updates
      • Get Started
    • Documentation
      • Kong Konnect Docs
      • Kong Gateway Docs
      • Kong Mesh Docs
      • Kong Insomnia Docs
      • Kong Konnect Plugin Hub
    • Open Source
      • Kong Gateway
      • Kuma
      • Insomnia
      • Kong Community
    • Company
      • About Kong
      • Customers
      • Careers
      • Press
      • Events
      • Contact
  • Terms• Privacy• Trust and Compliance
© Kong Inc. 2025