kong
Estimated reading time: 6 minutesOpen-source Microservice & API Management layer built on top of NGINX.
GitHub repo: https://github.com/Mashape/kong
Library reference
This content is imported from the official Docker Library docs, and is provided by the original uploader. You can view the Docker Store page for this image at https://store.docker.com/images/kong
Supported tags and respective Dockerfile
links
0.11-alpine
,0.11.1-alpine
(alpine/Dockerfile)0.11
,0.11.1
,latest
(centos/Dockerfile)0.10
,0.10.4
(legacy/Dockerfile)0.9
,0.9.9
(Dockerfile)
Quick reference
-
Where to get help:
the Docker Community Forums, the Docker Community Slack, or Stack Overflow -
Where to file issues:
https://github.com/Mashape/kong/issues -
Maintained by:
the Mashape Docker Maintainers -
Published image artifact details:
repo-info repo’srepos/kong/
directory (history)
(image metadata, transfer size, etc) -
Image updates:
official-images PRs with labellibrary/kong
official-images repo’slibrary/kong
file (history) -
Source of this description:
docs repo’skong/
directory (history) -
Supported Docker versions:
the latest release (down to 1.6 on a best-effort basis)
What is Kong?
Kong is a scalable, open source API Layer (also known as an API Gateway, or API Middleware). Kong was originally built at Mashape to secure, manage and extend over 15,000 Microservices for its API Marketplace, which generates billions of requests per month.
Backed by the battle-tested NGINX with a focus on high performance, Kong was made available as an open-source platform in 2015. Under active development, Kong is now used in production at hundreds of organizations from startups, to large enterprises and government departments including: The New York Times, Expedia, Healthcare.gov, The Guardian, Condè Nast and The University of Auckland.
Kong’s documentation can be found at getkong.org/docs.
How to use this image
First, Kong requires a running Cassandra 2.2.x/3.x or PostgreSQL 9.4/9.5 cluster before it starts. You can either use the official Cassandra/PostgreSQL containers, or use your own.
1. Link Kong to either a Cassandra or PostgreSQL container
It’s up to you to decide which datastore between Cassandra or PostgreSQL you want to use, since Kong supports both.
Cassandra
Start a Cassandra container by executing:
$ docker run -d --name kong-database \
-p 9042:9042 \
cassandra:3
Postgres
Start a PostgreSQL container by executing:
docker run -d --name kong-database \
-p 5432:5432 \
-e "POSTGRES_USER=kong" \
-e "POSTGRES_DB=kong" \
postgres:9.4
2. Prepare your database
Run the database migrations with an ephemeral Kong container:
docker run --rm \
--link kong-database:kong-database \
-e "KONG_DATABASE=postgres" \
-e "KONG_PG_HOST=kong-database" \
-e "KONG_CASSANDRA_CONTACT_POINTS=kong-database" \
kong kong migrations up
In the above example, both Cassandra and PostgreSQL are configured, but you should update the KONG_DATABASE
environment variable with either cassandra
or postgres
.
Note: migrations should never be run concurrently; only one Kong node should be performing migrations at a time.
Start Kong
Once the database has been started and prepared, we can start a Kong container and link it to the database container, and configuring the KONG_DATABASE
environment variable with either cassandra
or postgres
depending on which database you decided to use:
$ docker run -d --name kong \
--link kong-database:kong-database \
-e "KONG_DATABASE=cassandra" \
-e "KONG_CASSANDRA_CONTACT_POINTS=kong-database" \
-e "KONG_PG_HOST=kong-database" \
-p 8000:8000 \
-p 8443:8443 \
-p 8001:8001 \
-p 8444:8444 \
kong
If everything went well, and if you created your container with the default ports, Kong should be listening on your host’s 8000
([Proxy][http://getkong.org/docs/latest/configuration/#proxy_port]), 8443
(Proxy SSL), 8001
(Admin API) and 8444
(Admin API SSL) ports.
You can now read the docs at getkong.org/docs to learn more about Kong.
3. Use Kong with a custom configuration (and a custom Cassandra/PostgreSQL cluster)
You can override any property of the Kong configuration file with environment variables. Just prepend any Kong configuration property with the KONG_
prefix, for example:
$ docker run -d --name kong \
-e "KONG_LOG_LEVEL=info" \
-e "KONG_CUSTOM_PLUGINS=helloworld" \
-e "KONG_PG_HOST=1.1.1.1" \
-p 8000:8000 \
-p 8443:8443 \
-p 8001:8001 \
-p 7946:7946 \
-p 7946:7946/udp \
kong
Reload Kong in a running container
If you change your custom configuration, you can reload Kong (without downtime) by issuing:
$ docker exec -it kong kong reload
This will run the kong reload
command in your container.
Image Variants
The kong
images come in many flavors, each designed for a specific use case.
kong:<version>
This is the defacto image. If you are unsure about what your needs are, you probably want to use this one. It is designed to be used both as a throw away container (mount your source code and start the container to start your app), as well as the base to build other images off of.
kong:alpine
This image is based on the popular Alpine Linux project, available in the alpine
official image. Alpine Linux is much smaller than most distribution base images (~5MB), and thus leads to much slimmer images in general.
This variant is highly recommended when final image size being as small as possible is desired. The main caveat to note is that it does use musl libc instead of glibc and friends, so certain software might run into issues depending on the depth of their libc requirements. However, most software doesn’t have an issue with this, so this variant is usually a very safe choice. See this Hacker News comment thread for more discussion of the issues that might arise and some pro/con comparisons of using Alpine-based images.
To minimize image size, it’s uncommon for additional related tools (such as git
or bash
) to be included in Alpine-based images. Using this image as a base, add the things you need in your own Dockerfile (see the alpine
image description for examples of how to install packages if you are unfamiliar).
License
View license information for the software contained in this image.
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
Some additional license information which was able to be auto-detected might be found in the repo-info
repository’s kong/
directory.
As for any pre-built image usage, it is the image user’s responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.
library, sample, kong