News Changing component execution order with KrakenD Workflows

Document updated on Jan 23, 2025

Writing and building custom plugins

Plugins are soft-linked libraries, thus a separated .so file that can participate in the processing when running in conjunction with KrakenD. When we talk about plugins, we refer to Go plugins. You can create custom code, inject it into different parts of KrakenD processing, and still use the official KrakenD software without forking the code.

Do I need a plugin?
In most cases, you don’t need a custom plugin. The combination of different functionalities offered by the built-in functionality might help you solve a myriad of scenarios, with special mention to CEL, Martian, or even Lua scripting. If you’d like to introduce custom business logic, a plugin does not limit what you can do. Also, if you need a lot of performance, a Go plugin is much faster than a Lua script (generally speaking, at least x10).

Plugins are an independent binary of your own and are not part of KrakenD itself. Plugins allow you to “drag and drop” (so to speak) custom functionality that interacts with KrakenD while still using the official binaries without needing to fork the code.

Let’s get you started building custom code!

Requirements to write plugins

If you have gone through the different functionalities of KrakenD and think that a combination of components does not fulfill your needs, writing a plugin can be the solution. This document omits the initial parts of the development lifecycle (plan, analyze, design…) and jumps directly to the implementation part.

System requirements

To build custom plugins, you will need:

  • Docker to run the Plugin builder (even if you don’t plan to run on Docker)
  • You don’t need Go in your machine. Yep, that’s right.
  • Any Docker-capable operating system

Plugin requirements

Writing plugins isn’t complicated per se, but Go is very strict with the environment where you compile and load them. When you use the Plugin builder, the complicated parts are taken care of for you. The following principles are essential:

  • Right interface: Your plugin must implement the proper interface for the type of plugin you are coding.
  • Same Go version: Your plugin and KrakenD are compiled with the same Go version. E.g., you cannot build a plugin on Go 1.19 and load it on a KrakenD assembled with Go 1.22. Run krakend version to get the required Go and Glibc versions.
  • Same architecture/platform: KrakenD and plugins must have been compiled in the same architecture. E.g., you cannot compile a plugin in a Mac and use it in a Docker container
  • Same shared library versions: If the KrakenD core also uses external libraries, they must import identical versions.
  • Injection in the configuration: Besides coding and compiling your plugin, you must add it to the krakend.json configuration.

Yes, it sounds rigorous, but fortunately, KrakenD has developed many tools, so you don’t have to spend time thinking about this. Let’s see them below.

Writing your first plugin

These are all the steps needed to create a plugin from scratch and successfully deploy it:

plugin-sdlc.mmd diagram

  1. Choose the type of plugin you want to create.
  2. Write the Go file with the right interface and custom logic
  3. Check the dependencies are compatible with the binary
  4. Compile the plugin for your architecture
  5. Test the plugin is loadable
  6. Inject your plugin and run KrakenD

These steps are detailed below.

Types of plugins

There are different types of plugins you can write, and most of the job is to understand what kind of plugin you are going to need. Look at the following diagram, the most striking colors are where you can inject plugins:

Diagram of plugin placement

The types of plugins depicted are:

  1. server HTTP server plugins (or handler plugins) belong to the router layer and let you do anything as soon as the request hits KrakenD and before the routing. For example, you can modify the request before KrakenD starts processing it, block traffic, make validations, change the final response, connect to third-party services, databases, or anything else you imagine, scary or not. You can also stack several plugins at once.
  2. req/resp Request/Response Modifier plugins are strictly data modifiers and let you change the request or response data to and from your backends. These are lighter than the rest.
  3. client HTTP client plugins (or proxy client plugins) belong to the proxy layer and let you change how KrakenD interacts (as a client) with a specific backend service. They are as powerful as server plugins, but their working influence is smaller. You can have one plugin for the connecting backend call, because client plugins are terminators. When you set a client plugin, you are replacing the internal KrakenD client, which means you can lose instrumentation and other features.

In a nutshell, the sequence of a request-response depicted in the graph of the plugins above is as follows:

  1. The end-user/server sends an HTTP request to KrakenD that is processed by the router pipe. One or more HTTP server plugins (a.k.a http handlers) can be injected in this stage.
  2. The router pipe transforms the HTTP request into one or several proxy requests -HTTP or not- through a handler function. The request modifier plugin can intercept this stage and make modifications, before or after the split/aggregation.
  3. The proxy pipe fetches the data for all the requests through the selected transport layer. The HTTP client plugin modifies any interaction with the backend.
  4. The proxy pipe manipulates, aggregates, applies components… and returns the context to the router pipe. The response modifier plugin) can manipulate the data per backend or when everything is aggregated.
  5. The router pipe finally converts the proxy response into an HTTP response.

All different types of plugins let you freely implement your logic without restrictions. However, make sure to write them down, implement the correct interface, and compile them with respect to the requirements.

Write the Go file

Enterprise users
In KrakenD Enterprise, you only need to run the command krakend plugin init to create all the boilerplate necessary to build a plugin. See documentation

KrakenD open-source users need to create a Go file and implement the interface, as shown in every type of plugin.

When the interface is correct, implement the rest of the custom logic you’d like to have.

Check the dependencies

Before compiling the plugin, you must ensure the libraries you use in your code are compatible with KrakenD. To do so, execute the command krakend plugin check that analyzes your go.sum file and warns you about incompatibilities.

This is a crucial step because your custom plugins need to match the Go and library versions used to build KrakenD

Checking plugins 

$krakend plugin check -v 1.17.0 -s ../myplugin/go.sum
1 incompatibility(ies) found...
go
 have: 1.17.0
 want: 1.16.4

Once you have written your plugin with the interface you have chosen, compile it in the same architecture type as follows:

Go compilation 

$go mod init myplugin
go build -buildmode=plugin -o yourplugin.so .

Compile the plugin

Do not compile locally, use the builder

Regardless of where you want to use your plugin, compiling your plugins using the right builder is the way to go. The builder makes sure that the system architecture and Go version match the destination, making the plugin loadable.

If you choose to compile locally without the builder, you will use a different architecture and underlying libc/musl libraries, making your plugin unusable.

There are two builders you should use, depending on where you want to run the plugin:

ArchitectureAlpine (Docker)Non-Docker (on-premises)
AMD64krakend/builder-ee:2.9.1krakend/builder-ee:2.9.1-linux-generic
ARM64krakend/builder-ee:2.9.1 with cross-compile instructionskrakend/builder-ee:2.9.1-linux-generic with cross-compile instructions

When using Docker to deploy your gateway, our official KrakenD container uses Alpine as the base image. Therefore, to use your custom plugins, they must compile using the Alpine builder.

Compile plugins for AMD64

To build your plugin for Docker targets, you only need to execute the following command inside the folder where your plugin is:

Build your plugin for Alpine 

$docker run -it -v "$PWD:/app" -w /app krakend/builder-ee:2.9.1 go build -buildmode=plugin -o yourplugin.so .

The command will generate a yourplugin.so file (name it as you please) that you can now copy into a krakend/krakend-ee:2.9.1 Docker image, and load it as described in injecting plugins. Never use a tag that mismatches the builder and KrakenD. If you want to load the plugin in a KrakenD version x.y.x make sure to build it on a builder x.y.z. Using .so files that were compiled in a builder with a different version, will mostly fail.

To build the plugin for on-premises installations, use the following command instead:

Build your plugin for Non-Docker 

$docker run -it -v "$PWD:/app" -w /app krakend/builder-ee:2.9.1-linux-generic go build -buildmode=plugin -o yourplugin.so .

Compile plugins for ARM64

Regardless of your host architecture when running the Docker builder, the default plugin architecture target is AMD64. Therefore, if you want to test the plugin on ARM64 (e.g., a Macintosh, Raspberry, etc.), you must cross-compile it. This is because the plugin builder is available for AMD64 only, as emulation does not work well on Go compilation.

To cross-compile a plugin for Docker ARM64, you need to add extra flags when compiling the plugin:

Build your plugin for Alpine ARM64 

$docker run -it -v "$PWD:/app" -w /app \
-e "CGO_ENABLED=1" \
-e "CC=aarch64-linux-musl-gcc" \
-e "GOARCH=arm64" \
-e "GOHOSTARCH=amd64" \
krakend/builder-ee:2.9.1 \
go build -ldflags='-extldflags=-fuse-ld=bfd -extld=aarch64-linux-musl-gcc' \
-buildmode=plugin -o yourplugin.so .

And the same command, changing the builder, when you need on-premises plugins for ARM64:

Build your plugin for non-Alpine ARM64 

$docker run -it -v "$PWD:/app" -w /app \
-e "CGO_ENABLED=1" \
-e "CC=aarch64-linux-gnu-gcc" \
-e "GOARCH=arm64" \
-e "GOHOSTARCH=amd64" \
krakend/builder-ee:2.9.1-linux-generic \
go build -ldflags='-extldflags=-fuse-ld=bfd -extld=aarch64-linux-gnu-gcc' \
-buildmode=plugin -o yourplugin.so .

Remember that the resulting plugin will only work on ARM64 and that you cannot reuse plugins from one platform into another.

Test the plugin

Once your .so file is available, you must check that the plugin is loadable by KrakenD. You can test the plugin using the test command

Here’s an example:

Testing the plugin 

$krakend plugin test -smc yourplugin.so
[OK] MODIFIER   yourplugin.so

Inject your plugin and run KrakenD

The final step before running the plugin is including the configuration of the new plugin.

To inject a plugin, you must copy it into a KrakenD directory and add it to the plugin configuration at the service level of your configuration. Then, add your plugin namespace where necessary across the configuration.

When you run KrakenD, the plugin shows as loaded in the log.

See the detailed information to inject plugins)

Unresolved issues?

The documentation is only a piece of the help you can get! Whether you are looking for Open Source or Enterprise support, see more support channels that can help you.

See all support channels