tree: 54812701b7c06169433142767c58e27246e5ea5e [path history] [tgz]
  1. examples/
  2. images/
  3. json/
  4. plugins/
  5. zh-cn/
  6. admin-api.md
  7. apisix-plugin-design.graffle
  8. architecture-design.md
  9. aws.md
  10. batch-processor.md
  11. benchmark.md
  12. customize-nginx-configuration.md
  13. discovery.md
  14. getting-started.md
  15. grpc-proxy.md
  16. health-check.md
  17. how-to-build.md
  18. https.md
  19. install-dependencies.md
  20. mtls.md
  21. plugin-develop.md
  22. plugin-interceptors.md
  23. plugins.md
  24. powered-by.md
  25. profile.md
  26. README.md
  27. router-radixtree.md
  28. stand-alone.md
  29. stream-proxy.md
doc/README.md

Reference Documentation

Plugins

General

  • batch-requests: Allow you send mutiple http api via http pipeline.
  • hot reload: Hot reload without reload service.
  • HTTPS/TLS: Dynamic load the SSL Certificate by Server Name Indication (SNI).
  • serverless:Allows to dynamically run Lua code at different phase in APISIX.
  • redirect: URI redirect.

Transformation

  • response-rewrite: Set customized response status code, body and header to the client.
  • proxy-rewrite: Rewrite upstream request information.
  • grpc-transcode: REST <--> gRPC transcoding.
  • fault-injection: The specified response body, response code, and response time can be returned, which provides processing capabilities in different failure scenarios, such as service failure, service overload, and high service delay.

Authentication

  • key-auth: User authentication based on Key Authentication.
  • JWT-auth: User authentication based on JWT (JSON Web Tokens) Authentication.
  • basic-auth: User authentication based on Basic Authentication.
  • authz-keycloak: Authorization with Keycloak Identity Server.
  • wolf-rbac User Authentication and Authorization based on RBAC.
  • openid-connect

Security

Traffic

  • limit-req: Request rate limiting and adjustment based on the “leaky bucket” method.
  • limit-conn: Limite request concurrency (or concurrent connections).
  • limit-count: Rate limiting based on a “fixed window” implementation.
  • proxy-cache: Provides the ability to cache upstream response data.
  • request-validation: Validates requests before forwarding to upstream.
  • proxy-mirror: Provides the ability to mirror client requests.
  • api-breaker: Circuit Breaker for API that stops requests forwarding to upstream in case of unhealthy state.

Monitoring

  • prometheus: Expose metrics related to APISIX and proxied upstream services in Prometheus exposition format, which can be scraped by a Prometheus Server.
  • OpenTracing: Supports Zikpin and Apache SkyWalking.
  • Skywalking: Supports Apache SkyWalking.

Loggers

Deploy

AWS

The recommended approach is to deploy APISIX with AWS CDK on AWS Fargate which helps you decouple the APISIX layer and the upstream layer on top of a fully-managed and secure serverless container compute environment with autoscaling capabilities.

Kubernetes

See this guide and learn how to deploy apisix in Kubernetes.