Tutorial: Using Kong Kubernetes Ingress Controller as an API Gateway
In this first section, I’ll provide a quick overview of the business case and the tools you can use to create a Kubernetes ingress API gateway. If you’re already familiar, you could skip ahead to the tutorial section.
Digital transformation has led to a high velocity of data moving through APIs to applications and devices. Companies with legacy infrastructures are experiencing inconsistencies, failures and increased costs. And most importantly, dissatisfied customers.
All this has led to significant restructuring and modernization, especially within IT. A primary strategy is to embrace Kubernetes and decouple monolithic systems. On top of that, IT leadership is tasking DevOps teams to find systems, like an API gateway or Kubernetes ingress controller, to support API traffic growth while minimizing costs.
API gateways are crucial components of microservice architectures. The API gateway acts as a single entry point into a distributed system, providing a unified interface for clients who don’t need to care (or know) that the system aggregates their API call response from multiple microservices.

How an API gateway works
Some everyday use cases for API gateways include:
- Routing inbound requests to the appropriate microservice
- Presenting a unified interface to a distributed architecture by aggregating responses from multiple backend services
- Transforming microservice responses into the format required by the caller
- Implementing non-functional/policy concerns such as authentication, logging, monitoring and observability, rate-limiting, IP filtering, and attack mitigation
- Facilitating deployment strategies such as blue/green or canary releases
API gateways can simplify the development and maintenance of a microservice architecture. As a result, freeing up development teams to focus on the business logic of individual components.
Like Papa John’s, many companies select a Kubernetes API gateway at the beginning or partway through their transition to multi-cloud. Doing so makes it necessary to choose a solution that can function with on-prem services and the cloud.
Kubernetes
Kubernetes is becoming the hosting platform of choice for distributed architectures. It offers auto-scaling, fault tolerance and zero-downtime deployments out of the box.
By providing a widely accepted, standard approach with a carefully designed API, Kubernetes has spawned a thriving ecosystem of products and tools that make it much easier to deploy and maintain complex systems.
Kong Kubernetes Ingress Controller
As a native Kubernetes application, Kong is installed and managed precisely as any other Kubernetes resource. It integrates well with other CNCF projects and automatically updates itself with zero downtime in response to cluster events like pod deployments. There’s also a great plugin ecosystem and native gRPC support.
This article will walk through how easy it is to set up the open source Kong Ingress Controller as a Kubernetes API gateway on a cluster.
Use Case: Routing API Calls to Backend Services
To keep this article to a manageable size, I will only cover a single, straightforward use case.

Kong foo/bar routing
I will create a Kubernetes cluster, deploy two dummy microservices, “foo” and “bar,” install and configure Kong to route inbound calls to /foo to the foo microservice and send calls to /bar to the bar microservice.
The information in this post barely scratches the surface of what you can do with Kong, but it’s a good starting point.
Prerequisites
There are a few things you’ll need to work through in this article.
I’m going to create a “real” Kubernetes cluster on DigitalOcean because it’s quick and easy, and I like to keep things as close to real-world scenarios as possible. If you want to work locally, you can use minikube or KinD. You will need to fake a load-balancer, though, either using the minikube tunnel or setting up a port forward to the API gateway.
For DigitalOcean, you will need:
- A DigitalOcean account
- A DigitalOcean API token with read and write scopes
- The doctl command-line tool
To build and push docker images representing our microservices, you will need:
- Docker
- An account on Docker Hub
Note: Optional because you can deploy the images I’ve already created.
You will also need kubectl to access the Kubernetes cluster.
Setting Up doctl
After installing doctl, you’ll need to authenticate using the DigitalOcean API token:
1 2 3 4 | $ doctl auth init ... Enter your access token: <-- paste your API token, when prompted Validating token... OK |
Create Kubernetes Cluster
Now that you have authenticated doctl, you can create your Kubernetes cluster with this command:
1 | $ doctl kubernetes cluster create mycluster --size s-1vcpu-2gb --count 1 |
Note: The command spins up a Kubernetes cluster on DigitalOcean. Doing so will incur charges (approximately $0.01/hour, at the time of writing) as long as it is running. Please remember to destroy any resources you create when you finish with them.
The command creates a cluster with a single worker node of the smallest viable size in the New York data center. It’s the smallest and simplest cluster (and also the cheapest to run). You can explore other options by running doctl kubernetes --help.
The command will take several minutes to complete, and you should see an output like this:
1 2 3 4 5 6 7 8 | $ doctl kubernetes cluster create mycluster --size s-1vcpu-2gb --count 1 Notice: Cluster is provisioning, waiting for cluster to be running .................................................... Notice: Cluster created, fetching credentials Notice: Adding cluster credentials to kubeconfig file found in "/Users/david/.kube/config" Notice: Setting current-context to do-nyc1-mycluster ID Name Region Version Auto Upgrade Status Node Pools 4cf2159a-01c1-423c-907d-51f19c3f9a01 mycluster nyc1 1.20.2-do.0 false running mycluster-default-pool |
As you can see, the command automatically adds cluster credentials and a context to the ~/.kube/config file, so you should be able to access your cluster using kubectl:
1 2 3 4 5 6 | $ kubectl get namespace NAME STATUS AGE default Active 24m kube-node-lease Active 24m kube-public Active 24m kube-system Active 24m |
Create Dummy Microservices
To represent backend microservices, I’m going to use a trivial Python Flask application that returns a JSON string:
foo.py
1 2 3 4 5 6 7 8 9 | from flask import Flask app = Flask(__name__) @app.route('/foo') def hello(): return '{"msg":"Hello from the foo microservice"}' if __name__ == "__main__": app.run(debug=True, host='0.0.0.0') |
This Dockerfile builds a docker image you can deploy:
Dockerfile
1 2 3 4 5 6 7 8 9 10 11 | FROM python:3-alpine WORKDIR /app RUN echo "Flask==1.1.1" > requirements.txt RUN pip install -r requirements.txt COPY foo.py . EXPOSE 5000 CMD ["python", "foo.py"] |
The files for our “foo” and “bar” services are almost identical, so I’m only going to show the “foo” files here.
This gist contains files and a script to build foo and bar microservices docker images and push them to Docker Hub as:
- digitalronin/foo-microservice:0.1
- digitalronin/bar-microservice:0.1
Note: You don’t have to build and push these images. You can just use the ones I’ve already created.
Deploy Dummy Microservices
You’ll need a manifest that defines a Deployment and a Service for each microservice, both for “foo” and “bar.” The manifest for “foo” (again, I’m only showing the “foo” example here, since the “bar” file is nearly identical) would look like this:
foo.yaml
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 | apiVersion: apps/v1 kind: Deployment metadata: name: foo-deployment spec: replicas: 1 selector: matchLabels: app: foo template: metadata: labels: app: foo spec: containers: - name: api image: digitalronin/foo-microservice:0.1 ports: - containerPort: 5000 --- apiVersion: v1 kind: Service metadata: name: foo-service labels: app: foo-service spec: ports: - port: 5000 name: http targetPort: 5000 selector: app: foo |
This gist has manifests for both microservices, which you can download and deploy to your cluster like this:
1 2 | $ kubectl apply -f foo.yaml $ kubectl apply -f bar.yaml |
Access the Services
You can check that the microservices are running correctly using a port forward:
1 | $ kubectl port-forward service/foo-service 5000:5000 |
Then, in a different terminal:
1 2 | $ curl http://localhost:5000/foo {"msg":"Hello from the foo microservice"} |
Ditto for bar, also using port 5000.
Install Kong for Kubernetes
Now that you have our two microservices running in our Kubernetes cluster, let’s install Kong.
There are several options for this, which you will find in the documentation. I’m going to apply the manifest directly, like this:
1 | $ kubectl create -f https://bit.ly/k4k8s |
The last few lines of output should look like this:
1 2 3 4 | ... service/kong-proxy created service/kong-validation-webhook created deployment.apps/ingress-kong created |
Note: You may receive several API deprecation warnings at this point, which you can ignore. Kong’s choice of API versions allows Kong Ingress Controller to support the broadest range of Kubernetes versions possible.
Installing Kong will create a DigitalOcean load balancer. It’s the internet-facing endpoint to which you will make API calls to access our microservices.
Note: DigitalOcean load balancers incur charges, so please remember to delete your load balancer along with your cluster when you are finished.
Creating the load balancer will take a minute or two. You can monitor its progress like this:
1 2 3 | $ kubectl -n kong get service kong-proxy NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kong-proxy LoadBalancer 10.245.14.22 <pending> 80:32073/TCP,443:30537/TCP 71s |
Once the system creates the load balancer, the EXTERNAL-IP value will change from <pending> to a real IP address:
1 2 3 | $ kubectl -n kong get service kong-proxy NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE kong-proxy LoadBalancer 10.245.14.22 167.172.7.192 80:32073/TCP,443:30537/TCP 3m45s |
For convenience, let’s export that IP number as an environment variable:
1 | $ export PROXY_IP=167.172.7.192 # <--- use your own EXTERNAL-IP number here |
Now you can check that Kong is working:
1 2 | $ curl $PROXY_IP {"message":"no Route matched with those values"} |
Note: It’s the correct response because you haven’t yet told Kong what to do with any API calls it receives.
Configure Kong Gateway
You can use Ingress resources like this to configure Kong to route API calls to the microservices:
foo-ingress.yaml
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 | apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: foo namespace: default spec: ingressClassName: kong rules: - http: paths: - path: /foo pathType: Prefix backend: service: name: foo-service port: number: 5000 |
This gist defines ingresses for both microservices. Download and apply them:
1 2 | $ kubectl apply -f foo-ingress.yaml $ kubectl apply -f bar-ingress.yaml |
Now, Kong will route calls to /foo to the foo microservice and /bar to bar.
You can check this using curl:
1 2 3 4 5 | $ curl $PROXY_IP/foo {"msg":"Hello from the foo microservice"} $ curl $PROXY_IP/bar {"msg":"Hello from the bar microservice"} |
What Else Can You Do?
In this article, I have:
- Deployed a Kubernetes cluster on DigitalOcean
- Created Docker images for two dummy microservices, “foo” and “bar”
- Deployed the microservices to the Kubernetes cluster
- Installed the Kong Ingress Controller
- Configured Kong to route API calls to the appropriate backend microservice
I’ve demonstrated one simple use of Kong, but it’s only a starting point. With Kong for Kubernetes, here are several examples of other things you can do:
Authentication
By adding an authentication plugin to Kong, you can require your API callers to provide a valid JSON Web Token (JWT) and check each call against an Access Control List (ACL) to ensure callers are entitled to perform the relevant operations.
Certificate management
You can enable integration with cert-manager to provision and auto-renew SSL certificates for your API endpoints so that all your API traffic is encrypted as it travels over the public internet.
gRPC support
Kong natively supports gRPC, so it’s easy to add gRPC support to your API.
You can do a lot more with Kong, and I’d encourage you to look at the documentation and start to explore some of the other features.
The API gateway is a crucial part of a microservices architecture, and the Kong Ingress Controller is well suited for this role in a Kubernetes cluster. You can manage it in the same way as any other Kubernetes resource.
Cleanup
Don’t forget to destroy your Kubernetes cluster when you are finished with it so that you don’t incur unnecessary charges:
1 2 3 4 5 6 | $ kubectl delete -f https://bit.ly/k4k8s # <-- this will destroy the load-balancer $ doctl kubernetes cluster delete mycluster Warning: Are you sure you want to delete this Kubernetes cluster? (y/N) ? y Notice: Cluster deleted, removing credentials ... |
Note: If you delete the cluster first, the load balancer will be left behind. You can delete any leftover resources via the DigitalOcean web interface.