Gateway management

Updated at: 2025-01-17 02:38

This topic provides guidance on configuring and using cloud-native gateways, covering the creation of gateways, management of Server Load Balancer (SLB) instances as Ingresses, modification of gateway parameters, configuration of security group rules, and activation of trace analysis for cloud-native gateways.

Create a cloud-native gateway

You need to create a cloud-native gateway instance before you can use a cloud-native gateway to manage traffic and services. For more information, see Create a cloud-native gateway.

View the details of a cloud-native gateway

After you create a cloud-native gateway, you can view its basic information, Ingresses, and security group rules. For more information, see View the details of a cloud-native gateway.

View the monitoring data of a cloud-native gateway

You can view log data and the monitoring statistics of a cloud-native gateway on the following tabs in the Microservices Engine (MSE) console: Log Center, Global Dashboard, Top Business List, Access Center, and Canary Release Comparison Dashboard. For more information, see View the monitoring data of a cloud-native gateway.

Manage SLB instances that are specified as Ingresses

Cloud-native gateways use Alibaba Cloud Server Load Balancer (SLB) to distribute requests and manage traffic flows. You can associate one or more Internet-facing or internal-facing SLB instances with a cloud-native gateway. For more information, see Manage SLB instances that are specified as Ingresses.

CLB-based migration

The Classic Load Balancer (CLB)-based migration feature allows you to gradually migrate traffic from a source gateway to an MSE cloud-native gateway. For more information, see CLB-based migration.

Modify gateway parameters

You can adjust parameters of cloud-native gateways to improve the performance, reliability, and security of the network and ensure stable network operation and user experience. For more information, see Modify gateway parameters.

Configure security group rules

Your cloud-native gateway and the node on which your backend service is deployed belong to different security groups. In this case, you can configure a security group rule to authorize your cloud-native gateway to access the backend service. For more information, see Configure security group rules.

Enable log shipping for a cloud-native gateway

The log shipping feature is implemented by integrating cloud-native gateways and Alibaba Cloud Simple Log Service (SLS). After log shipping is enabled for a cloud-native gateway, you can analyze the access logs of the cloud-native gateway to understand the behavior and geographical locations of client users for troubleshooting. For more information, see Enable log shipping for a cloud-native gateway.

Enable trace analysis for a cloud-native gateway

Cloud-native gateways are integrated with Alibaba Cloud Managed Service for OpenTelemetry and SkyWalking. This helps you analyze and diagnose performance bottlenecks in the distributed application architecture and improves the efficiency in developing and diagnosing microservice applications. For more information, see Enable trace analysis for a cloud-native gateway.

Enable WAF protection

Cloud-native gateways are integrated with Alibaba Cloud Web Application Firewall (WAF) 3.0 and offer protection at both the instance and route levels. For more information, see Enable WAF protection.

  • On this page (1, T)
  • Create a cloud-native gateway
  • View the details of a cloud-native gateway
  • View the monitoring data of a cloud-native gateway
  • Manage SLB instances that are specified as Ingresses
  • CLB-based migration
  • Modify gateway parameters
  • Configure security group rules
  • Enable log shipping for a cloud-native gateway
  • Enable trace analysis for a cloud-native gateway
  • Enable WAF protection
Feedback