Hello everyone, I am ApeJava. What is an API Gateway? What does it do? Why do we need it? Let's talk about it today. I. DefinitionFrom Wikipedia, a gateway is defined as follows:
As can be seen from the definition, the gateway is also a group of servers. It is located between the client and the server and is the only entry point for client requests to enter the server. As shown in the figure below, the API gateway provides several important functions:
2. Typical Process AnalysisNext, we will explain the API gateway and its important functions through the classic process of a client initiating an HTTP request to a server. Step 1: The client sends a request to the API GatewayThe client initiates a request to the server, which is usually based on the HTTP protocol. It can be REST, GraphQL or some other higher-level abstraction. As shown below: Step 2: API Gateway Verifies HTTP RequestAfter receiving the client's request, the API gateway will verify the parameters in the HTTP request, as shown below: Step 3: IP blacklist and whitelist verificationFor security reasons, you can set up an IP black and white list on the API gateway to mark the IP addresses that are allowed and not allowed to access the server. The API gateway allows and denies the caller's IP address based on the IP black and white list. See the figure below: At the same time, the API Gateway can also perform basic rate limit checks on attributes such as IP addresses and HTTP headers. For example, it can reject requests from IP addresses that exceed a certain rate. As shown below: Step 4: Authentication and AuthorizationThe API Gateway passes the HTTP request to the identity provider for authentication and authorization. The API Gateway receives an authenticated session from the provider, which contains the scope of operations that the request is allowed to perform. As shown below: Authentication is the process of verifying the identity of a user or client to confirm that an entity is who it claims to be. In the context of an API, this means ensuring that the requester is a legitimate user or client and has the authority to access the requested resource or service. Common authentication methods include:
Authorization is the process of determining whether a user or client has the right to access a specific resource or perform a specific operation after successful authentication. It defines the user's permissions and roles in the system and restricts access to resources based on these permissions. Common authorization methods include:
In general, authentication is used to confirm the identity of the user or client, while authorization is used to determine whether the user or client has the right to access specific resources or perform specific operations. These two steps together ensure that only legitimate and authorized users or clients can use the API and protect the system from unauthorized access. In the API gateway, authentication and authorization are very important functions because they directly affect the security of the entire system and the protection of data. Step 5: Flow Control and Current LimitationAfter the client's request passes authentication, the API gateway can perform higher-level traffic control and current limiting. As shown in the following figure: Flow control and current limiting are important concepts used in API Gateway to manage and control request traffic. They help maintain the stability of backend services, prevent overloads, and provide better performance and reliability. The following explains these two concepts in detail: Rate Limiting refers to controlling the request rate to limit the frequency of client requests to the API. This process ensures that the backend service is not overloaded with requests, avoiding excessive consumption of server resources, resulting in system crashes or slow responses. Common rate control methods include:
Rate Limiting refers to limiting the number or rate of requests within a specific time period to prevent requests from exceeding the system's processing capacity. Unlike flow control, rate limiting does not reject additional requests, but temporarily places excess requests in a queue to wait for subsequent processing. Common rate limiting methods include:
Traffic control and current limiting are effective means to protect backend services from excessive requests. By setting reasonable request rate limits, you can balance the interaction between the client and the server and ensure the availability and stability of the service. In the API gateway, traffic control and current limiting are usually used together with authentication, authorization and other security measures to form a secure and efficient API management solution. Step 6: Match the backend serverAfter HTTP verification is passed, the API Gateway finds the appropriate backend service to process the request through path matching, as shown below: Step 7: Dynamic RoutingAfter matching the corresponding server, the request needs to be dynamically routed to any matched server. As shown below: Step 8: Protocol ConversionBecause some companies are using microservices, and RPC protocol is used between microservices, the HTTP protocol needs to be converted into the corresponding RPC protocol in the API gateway. As shown in the following figure: When the backend service processes the request, it returns a response to the API gateway, which converts the response back to the HTTP protocol and returns the response to the client. The API gateway also provides other key services. For example, the API gateway should track errors and provide circuit breaking functions to prevent service overload. The API gateway should also provide logging, monitoring, and analysis services to achieve operational observability. Monitoring and logging are key components for achieving observability and troubleshooting in API gateways and systems. They help developers and system administrators track API usage, performance metrics, and error information in real time, so as to better understand the health of the system and quickly discover and resolve problems. The following explains these two concepts in detail: Monitoring refers to the process of real-time collection, analysis, and display of various indicators and performance data in the API gateway and system. Through monitoring, we can understand the system's operating status, load, and resource usage, so that we can take timely measures to prevent or resolve potential problems. Common monitoring indicators include:
Monitoring can be achieved through various monitoring tools and services, such as Prometheus, Grafana, DataDog, etc. The monitoring results can be displayed in the form of charts, dashboards or alerts, allowing developers and operation and maintenance teams to understand the status of the system in real time and make corresponding optimizations and adjustments. Logging refers to the process of recording key events, status, and error information in the API gateway and system. Logging is an important tool for tracking and debugging, which can provide valuable information when problems occur, helping developers to quickly locate problems and troubleshoot. Common logging content includes:
Logs can be stored in local file systems, databases, or centrally managed and analyzed through log aggregation tools (such as ELK Stack: Elasticsearch, Logstash, Kibana). Logging is not only useful for troubleshooting, but also helps analyze user behavior, monitor security risks, etc. In summary, monitoring and logging are important means to achieve observability and troubleshooting in API gateways and systems. Through monitoring and logging, we can detect potential problems in a timely manner, optimize system performance, and provide a better user experience. ConclusionThis article explains the gateway and its main functions by analyzing the classic process of a client sending an HTTP request to a server. Because each company's business is different, the above process will also be different. In addition, because the degree of perfection of each company's basic services is different, the implementation of the gateway is different. For example, some small companies directly use Nginx as a gateway because of their small business traffic, and then purchase some cloud security services. However, some companies with large business volumes need to develop an API gateway separately and then deploy it in a cluster. In short, the gateway is a protective umbrella for the back-end server, and it acts as a barrier for requests from clients. |
<<: How often does an Ethernet cable lose signal?
>>: Rethinking the future of 5G through the lens of extended reality (XR)
Sharktech is a computer room that focuses on high...
The ubiquitous wireless technology Wi-Fi has beco...
In the ever-changing information age, companies t...
BGP.TO is currently offering promotions for serve...
In today's digitally connected world, Etherne...
Everyone must be familiar with DNS (Domain Name S...
[[387141]] This article is reprinted from the WeC...
This is a very "pure" partner conferenc...
We have previously shared information about CMIVP...
[51CTO.com original article] At the just conclude...
Aoyoyun is a long-established hosting company, fo...
[[255035]] On January 7, Tencent Cloud Vice Presi...
Now many operators support IPv6. The day before y...
[51CTO.com original article] On July 21-22, 2017,...
"China Unicom launched a 5G package for 239 ...