Support legacy applications with Sticky Sessions
While typically our customers route traffic to workloads that follow the principles of the 12-factor application, sometimes we need to route traffic to applications that store a lot of user-specific context in memory. This might be a legacy application that was only ever designed to run as a single process – storing session context only in memory. Or it might be a long-lived computational task that you need to query the state on. In either scenario it is useful to route traffic to a specific upstream target based on the value of a session cookie.
To support these kinds of use cases, we’re delighted to announce support for sticky-sessions as a new upstream load balancer algorithm. When a request is proxied through an Upstream using the sticky-sessions algorithm, Kong Gateway sets a cookie on the response (via the Set-Cookie header). On subsequent requests, if the cookie is still valid and the original Target is available, traffic is routed to that same Target.
Kong Event Gateway Advances with Solace Integration and Kafka Schema Validation
Back in May, we announced Kong Event Gateway, significantly expanding our support for Kafka both in terms of brokering HTTP-based access to Kafka topics and our new Kong Native Event Proxy to manage Kafka-native protocol traffic. Kong Event Gateway makes your event-driven architecture more accessible, secure, and powerful — all while lowering costs. If you missed our Event Gateway announcements, read more about the new capabilities here, and find out more about why we think it is so game-changing here.
We promised to keep adding new Event Gateway capabilities, and with this release, we're building on that momentum, with some significant additions to our protocol mediation story.
Support for Solace PubSub+ messaging (BETA)

Our Event Gateway vision extends beyond Kafka, and we’re pleased to announce our support for Solace with our new Solace Upstream plugin. Solace PubSub+ is a leading event streaming and messaging platform, with fine-grained routing and event mesh capabilities.
With Kong’s Solace producer plugin, you can now publish messages to a Solace queue or topic using a standard HTTP API request, bringing new consumers into the scope of Solace’s EDA while re-using authentication, encryption, and other policies that you're already using in Kong Gateway. The plugin supports Solace’s Message VPNs, and OAuth/OIDC authentication. You can find more details in the plugin documentation.
Shift left on data quality in your event streams
Kafka has long supported adding schema metadata to messages, and the Confluent schema registry provides a widely used repository for event schemas. While Kafka passes along the schema metadata, it leaves it to the client application to actually perform the validation. With this new capability in Kong’s Kafka and Confluent Upstream plugins, Kong will validate the message before it is published to a topic. If schema validation fails, it will block the message and return an error to the Kafka client.
With this release, we're supporting the Confluent Schema registry for both AVRO and JSON message types, and we’ll add support for other schema registries in the future. Schemas in the registry are cached in the proxy for performance.
To get started, use the schema_registry parameter in your Kafka upstream or Confluent plugin configuration.
The Kafka Consume, Confluent Consume, and Kafka Log plugins can also use the schema to deserialize the payload.
When you're expanding the set of producers, perhaps even to external organizations, it’s important that all producers with access to the cluster respect the schema. Kong Event Gateway provides data owners the means to ensure adherence to the schema and block poison messages.
Fixing data quality problems at source means fewer failures and less time and pain trawling through logs and finding “needle” errors in the proverbial messaging haystack when things go wrong.
Konnect updates and teasers
We recently launched significant feature updates for Service Catalog and the Developer Portals in Konnect. Here’s some more Konnect news.
Dedicated Cloud Gateways support for VPC Peering and Route 53 Private DNS
Until now, AWS Transit Gateways were the only option in AWS to establish a private connection between Konnect-hosted Dedicated Cloud Gateways (DCGW) to your own AWS VPCs. Transit gateways are excellent for more complex network topologies as it allows you to avoid creating a full mesh of peering connections between VPCs.
VPC Peering, on the other hand, uses a point-to-point model. It's simpler and cheaper to set up when connecting DCGWs to a small number of VPCs.Now you can configure VPC Peering to route traffic from Konnect-hosted DCGW to specific VPCs, circumventing the complexity and cost of AWS Transit Gateways.
Another AWS networking improvement for DCGW is support for private DNS with the AWS Route 53 service. Kong’s private DNS support allows the gateway to query your hosted zone as if it were inside your VPC with no special changes needed to your DNS setup. This works well with both VPC peering and Transit Gateway, assuming the proper VPC association and DNS resolution settings are in place.
For more on this topic, I highly recommend this awesome deep-dive on Dedicated Cloud Gateways by Michael Field, which covers these updates and more.
Active Tracing improvements coming soon
We’re receiving A LOT of positive feedback on Active Tracing — a feature in Konnect that lets you analyze traces to build a sub-millisecond picture of exactly what is happening in your request flow, helping you to resolve issues faster. Customers are reporting hours, sometimes even days' worth, of time saved finding and resolving issues