Advanced Gateway features configuration
As a system programmer who wants to configure advanced Gateway features of the API Mediation Layer, you can customize Gateway parameters by modifying either of the following files:
<Zowe install directory>/components/gateway/bin/start-gateway.sh
<Zowe instance directory>/instance.env
The parameters begin with the -D
prefix, similar to all the other parameters in the file.
Note: Restart Zowe to apply changes to the parameter.
Follow the procedures in the following sections to customize Gateway parameters according to your preferences:
- Prefer IP Address for API Layer services
- SAF as an Authentication provider
- Gateway retry policy
- Gateway client certificate authentication
- Gateway timeouts
- CORS handling
- Encoded slashes
- Connection limits
- Replace or remove catalog with another service
- API Mediation Layer as a standalone component
#
Prefer IP Address for API Layer servicesAPI Mediation Layer services use the hostname when communicating with each other. This behavior can be changed so that the IP address is used instead.
Follow these steps:
- Open the
<Zowe instance directory>/instance.env
configuration file. - Find the property
APIML_PREFER_IP_ADDRESS
and set the value totrue
. - Restart Zowe&trade.
Note: Changing the value of this property might introduce problems with certificates. Ensure that the IP Address is present on the certificate SAN name.
#
SAF as an Authentication providerBy default, the API Gateway uses z/OSMF as an authentication provider. It is possible to switch to SAF as the authentication provider instead of z/OSMF. The intended usage of SAF as an authentication provider is for systems without z/OSMF. If SAF is used and the z/OSMF is available on the system, the created tokens are not accepted by z/OSMF. Use the following procedure to switch to SAF.
Follow these steps:
- Open the
<Zowe instance directory>/instance.env
configuration file. - Find the property
APIML_SECURITY_AUTH_PROVIDER
and set the value tosaf
. - Restart Zowe&trade.
Authentication requests now utilize SAF as the authentication provider. API ML can run without z/OSMF present on the system.
#
Gateway retry policyTo change the Gateway retry policy, edit properties in the <Zowe install directory>/components/gateway/bin/start.sh
file:
All requests are disabled as the default configuration for retry with one exception: the server retries GET
requests that finish with status code 503
.
To change this default configuration, include the following parameters:
ribbon.retryableStatusCodes
Provides a list of status codes, for which the server should retry the request.
Example:
-Dribbon.retryableStatusCodes="503, 404"
ribbon.OkToRetryOnAllOperations
Specifies whether to retry all operations for this service. The default value is
false
. In this case, onlyGET
requests are retried if they return a response code that is listed inribbon.retryableStatusCodes
. Setting this parameter totrue
enables retry requests for all methods which return a response code listed inribbon.retryableStatusCodes
.Note: Enabling retry can impact server resources due to request body buffering.
ribbon.MaxAutoRetries
Specifies the number of times a failed request is retried on the same server. This number is multiplied with
ribbon.MaxAutoRetriesNextServer
. The default value is0
.ribbon.MaxAutoRetriesNextServer
Specifies the number of additional servers that attempt to make the request. This number excludes the first server. The default value is
5
.
#
Gateway client certificate authenticationNote:
Beginning with release 1.19 LTS, it is possible to authenticate using client certificates. The feature is functional and tested, but automated testing on various security systems is not complete. As such, the feature is provided as a beta release for early preview. If you would like to offer feedback using client certificate authentication, please create an issue against the api-layer repository. Client Certificate authentication will move out of Beta once test automation is fully implemented across different security systems.
Use the following procedure to enable the feature to use a client certificate as the method of authentication for the API Mediation Layer Gateway.
Follow these steps:
Open the
<Zowe instance directory>/instance.env
configuration file.Configure the following properties:
APIML_SECURITY_X509_ENABLED
This property is the global feature toggle. Set the value to
true
to enable client certificate functionality.APIML_SECURITY_ZOSMF_APPLID
When z/OSMF is used as an authentication provider, provide a valid
APPLID
to allow for client certificate authentication. The API ML generates a passticket for the specifiedAPPLID
and subsequently uses this passticket to authenticate to z/OSMF. The default value in the installation of z/OSMF isIZUDFLT
.Note: The following steps are only required if the ZSS hostname or default Zowe user name are altered:
Open the file
<Zowe install directory>/components/gateway/bin/start.sh
.Configure the following properties:
apiml.security.x509.externalMapperUrl
The API Mediation Gateway uses an external API to map a certificate to the owner in SAF. This property informs the Gateway about the location of this API. ZSS is the API provider in Zowe. Provide the ZSS URL in the following format:
The default port is
8542
. The hostname islocalhost
as the ZSS server is accessible only locally.apiml.security.x509.externalMapperUser
To authenticate to the mapping API, a JWT token is sent with the request. The token represents the user that is configured with this property. The user authorization is required to use the
IRR.RUSERMAP
resource within theFACILITY
class. The default value isZWESVUSR
. Permissions are set up during installation with theZWESECUR
JCL or workflow.To customize the
ZWESECUR
JCL or workflow (// SET ZOWEUSER=ZWESVUSR * userid for Zowe started task
), change theapiml.security.x509.externalMapperUser
to a new value.
Restart
Zowe&trade
.
#
Gateway timeoutsUse the following procedure to change the global timeout value for the API Mediation Layer instance.
Follow these steps:
- Open the file
<Zowe instance directory>/instance.env
. - Find the property
APIML_GATEWAY_TIMEOUT_MILLIS
, and set the value to the desired value. - Restart
Zowe&trade
.
If you require finer control, you can edit the <Zowe install directory>/components/gateway/bin/start.sh
, and modify the following properties:
apiml.gateway.timeoutMillis
This property defines the global value for http/ws client timeout.
Add the following properties to the file for the API Gateway:
Note: Ribbon configures the client that connects to the routed services.
ribbon.connectTimeout
Specifies the value in milliseconds which corresponds to the period in which API ML should establish a single, non-managed connection with the service. If omitted, the default value specified in the API ML Gateway service configuration is used.
ribbon.readTimeout
Specifies the time in milliseconds of inactivity between two packets in response from this service to API ML. If omitted, the default value specified in the API ML Gateway service configuration is used.
ribbon.connectionManagerTimeout
The HttpClient employs a special entity to manage access to HTTP connections called by the HTTP connection manager. The purpose of an HTTP connection manager is to serve as a factory for new HTTP connections, to manage the life cycle of persistent connections, and to synchronize access to persistent connections. Internally, the connections that are managed serve as proxies for real connections.
ConnectionManagerTimeout
specifies a period during which managed connections with API ML should be established. The value is in milliseconds. If omitted, the default value specified in the API ML Gateway service configuration is used.
#
CORS handlingBy default, Cross-Origin Resource Sharing (CORS) is disabled in the API Gateway for the Gateway routes api/v1/gateway/**
. To enable CORS at the service level, it is necessary to enable CORS in the Gateway. Use the following procedure to enable CORS.
Follow these steps:
- Open the file
<Zowe instance directory>/instance.env
. - Find the property
APIML_CORS_ENABLED
and set the value totrue
. - Restart
Zowe&trade
.
Requests through the Gateway now contain a CORS header.
#
Encoded slashesBy default, the API Mediation Layer accepts encoded slashes in the URL path of the request. If you are onboarding applications which expose endpoints that expect encoded slashes, it is necessary to keep the default configuration. We recommend that you change the property to false
if you do not expect the applications to use the encoded slashes.
Use the following procedure to reject encoded slashes.
Follow these steps:
- Open the file
<Zowe instance directory>/instance.env
. - Find the property
APIML_ALLOW_ENCODED_SLASHES
and set the value tofalse
. - Restart
Zowe&trade
.
Requests with encoded slashes are now rejected by the API Mediation Layer.
#
Connection limitsBy default, the API Gateway accepts up to 100 concurrent connections per route, and 1000 total concurrent connections. Any further concurrent requests are queued until the completion of an existing request. The API Gateway is built on top of Apache HTTP components that require these two connection limits for concurrent requests. For more information, see Apache documentation.
Use the following procedure to change the number of concurrent connections.
Follow these steps:
- Open the file
<Zowe instance directory>/instance.env
. - Find the property
APIML_MAX_CONNECTIONS_PER_ROUTE
and set the value to an appropriate positive integer. - Find the property
APIML_MAX_TOTAL_CONNECTIONS
and set the value to an appropriate positive integer.
#
Replace or remove catalog with another serviceBy default, the API Mediation Layer contains API Catalog as a service showing available services. As the API Mediation Layer can be successfully run without this component it is possible to replace or remove the service from the Gateway home page and health checks. The following section describes the behavior of the Gateway home page and health checks.
The default option displays the API Catalog.
A value can also be applied to API_GATEWAY_CATALOG_ID
.
Examples:
none
Nothing is displayed on the Gateway home page and the Catalog is removed from
/application/health
alternative-catalog
An alternative to the API Catalog is displayed
metrics-dashboard
A possible dashboard that could appear in place of the API Catalog
Notes:
- If the application contains the
homePageUrl
andstatusPageRelativeUrl
, then the full set of information is displayed. - If the application contains the
homePageUrl
the link is displayed without theUP
information - If the application contains the
statusPageRelativeUrl
thenUP
orDOWN
is displayed based on thestatusPage
without the link.
Use the following procedure to change or replace the Catalog service:
Follow these steps:
Open the file
<Zowe instance directory>/instance.env
.At the end of the file with the property
APIML_GATEWAY_CATALOG_ID
add a new line. Set the value with the following options:- Set the value to
none
to remove the Catalog service. - Set the value to the ID of the service that is onboarded to the API Mediation Layer.
- Set the value to
#
API Mediation Layer as a standalone componentYou can start the API Mediation Layer independently of other Zowe components. By default, the Gateway, Zowe System Services, and Virtual Desktop start when Zowe runs. To limit consumed resources when the Virtual Desktop or Zowe System Services are not required, it is possible to specify which components start in the context of Zowe. No change is required during the installation process to support this setup.
Once Zowe is installed, use the following procedure to limit which components start.
Follow these steps:
- Open the file
<Zowe instance directory>/instance.env
. - Find the property
ZWE_LAUNCH_COMPONENTS
and setdiscovery,gateway,api-catalog
- Restart
Zowe&trade
.
To learn more about the related section of the environment file, see Creating and configuring the Zowe instance directory. We recommend you open this page in a new tab.