News KrakenD CE v2.11 released with improved AMQP, JWT, caching and more

Document updated on May 21, 2025

AI Security

RAG Pipelines (DRAFT)

You can use KrakenD as a secure, lightweight proxy layer in a RAG (Retrieval-Augmented Generation) pipeline, and even enforce exfiltration prevention and data sanitization on the fly.

As per today, the usage of RAG requires you to make manual use of the sequential proxy and implement the flow in the configuration.

A typical RAG pipeline looks like this:

  1. User prompt
  2. API Gateway (KrakenD)
  3. Retriever (e.g., vector DB)
  4. Enricher / Processor (e.g., metadata enrichers, relevance filters)
  5. LLM
  6. Response to user (with or without additional data manipulation)

See the Sequential Proxy and Workflow components to implement this logic.

This component is valid both for:

  1. Training the LLM
  2. Query model

Unresolved issues?

The documentation is only a piece of the help you can get! Whether you are looking for Open Source or Enterprise support, see more support channels that can help you.

See all support channels