Hello Kong people!
It’s time to start a new release cycle, and we are happy to announce the first release candidate, Kong 1.2.0rc1!
This release brings improvements to reduce P95 latency and declarative configuration support. It also comes with a newly open sourced plugin, previously only available to Enterprise customers, among other new features.
Download
Download Kong 1.2.0rc1 today — as always we are looking forward for your feedback!
-
All Bintray repositories have been renamed from
kong-community-edition-*
tokong-*
. -
All Kong packages have been renamed from
kong-community-edition
tokong
.
For more details about the updated installation, please visit the official docs: https://konghq.com/install.
What’s new in Kong 1.2.0rc1
-
Core
-
Asynchronous router updates: introduce a configuration properties
router_consistency
, with two possible values:strict
andeventual
. If set toeventual
, whenever your Kong configuration changes, router update operations are performed out of the proxy path, asynchronously, reducing P95 latency when performing runtime Services/Routes manipulation. -
Cache warmup of Kong entities at initialization. A new configuration directive
db_cache_warmup_entities
was introduced, allowing users to specify which entities should be preloaded. Cache warmup allows for ahead of time DNS resolution for Services with a hostname. This feature reduces first requests latency, improving P99 latency. -
Wildcard SNI matching: the
ssl_certificate_by_lua
phase (and stream preread) is now able to match an SNI against any registered wildcard SNI. -
HTTPS routes can now be matched by SNI : the
snis
route attribute can now be set for HTTPS routes and is used as a routing attribute - New optional configuration properties for PostgreSQL concurrency control:
pg_max_concurrent_queries
sets the maximum number of concurrent queries to the database;pg_semaphore_timeout
allows you to tune the timeout for acquiring access to the database connection. The default behavior remains the same, with no concurrency limitation.
-
Asynchronous router updates: introduce a configuration properties
-
Declarative configuration
-
Hash checking for declarative configuration, avoiding reloading if the configuration has not changed. The
/config
endpoint now accepts acheck_hash
query argument; hash checking only happens if its value is set to1
. - The loading of declarative configuration is now done atomically, and with a safety check to verify that the new configuration fits in memory.
-
Hash checking for declarative configuration, avoiding reloading if the configuration has not changed. The
-
Admin API
-
Entity schema validation endpoints: you can use the new endpoint
/schemas/:entity_name/validate
to validate an instance of any entity type in Kong without creating the entity -
Memory statistics in the
/status
endpoint. The response now includes amemory
field, which containslua_shared_dicts
andworkers_lua_vms
, with stats on shared dictionaries and workers Lua VM memory usage.
-
Entity schema validation endpoints: you can use the new endpoint
-
Plugins
- proxy-cache: we open sourced the HTTP proxy cache plugin, previously an Enterprise-only feature
- New data available for logging plugins: log request TLS version, cipher, and verification status.
-
PDK
- New function
kong.node.get_memory_stats
- Inheriting from
BasePlugin
is now optional
- New function
Plus of course the usual amount of bugfixes and internal improvements!
Upgrade Path
You can upgrade from 0.14.1 or any release in the 1.x series (Note: upgrading from a pre-0.14 cluster is not supported). You can use a Blue/Green deployment method to update: “Blue” means your current version (for example, 0.14.1, 1.0.x or 1.1.x), “Green” means the new version 1.2.0rc1:
- Download 1.2.0rc1, and configure it to point to the same datastore as your Blue cluster (running 0.14, 1.0 or 1.1). Run
kong migrations up
. - Both Blue and Green nodes can now run simultaneously on the same datastore. Start provisioning 1.2.0rc1 nodes, but do not use their Admin API yet. Prefer making Admin API requests to your Blue cluster instead.
- Gradually divert traffic away from your Blue nodes, and into your 1.2.0rc1 cluster. Monitor your traffic to make sure everything is going smoothly.
- When your traffic is fully migrated to the Green 1.2.0rc1 cluster, decommission your Blue nodes.
- From your 1.2.0rc1 cluster, run:
kong migrations finish
. From this point on, it will not be possible to start Blue nodes pointing to the same datastore anymore. Only run this command when you are confident that your migration was successful. From now on, you can safely make Admin API requests to your 1.2.0rc1 nodes.
Install 1.2.0rc1 on a fresh datastore
Since version 1.0, Kong uses a new, improved migrations framework. The following commands can be run to prepare a new 1.2 cluster from a fresh datastore:
$ kong migrations bootstrap [-c kong.conf]
$ kong start [-c kong.conf]
What’s next
Depeding on the community feedback, we are going to either tag and release 1.2.0 final or make a new release candidate 1.2.0rc2.
As always, consider yourself encouraged to reach out to us here or via GitHub issues if you have any questions or feedback about this release! Your feedback is essential to make Kong better!