Frequently Asked Questions (FAQs)

About WSO2 Choreo Connect

What is WSO2 Choreo Connect?

WSO2 Choreo Connect is a cloud-native, open-source, and developer-centric API Gateway. It provides first-class support for Kubernetes while facilitating an array of API management quality of services (QoS), such as message security, rate-limiting, observability, and message mediation.

What are the key technologies used underneath WSO2 Choreo Connect?

The main components of WSO2 Choreo Connect are listed below along with the primary technologies that are used.

  • Router - Envoy proxy
  • Adapter - Management service written in Go
  • Enforcer - Authentication and authorization service written in Java

What are the differences between WSO2 API Manager Synapse Gateway and Choreo Connect?

WSO2 Choreo Connect is a lightweight, decentralized API gateway designed for microservices-related applications whereas WSO2 Synapse Gateway is primarily designed for monolithic applications. For more information, refer Deploying APIs in API Gateway vs Choreo Connect

What are the differences between WSO2 API Microgateway (Ballerina MGW) and WSO2 Choreo Connect?

Earlier versions of the Choreo Connect were named as WSO2 API Microgateway (Ballerina MGW) and it was a completely different implementation done using the Ballerina programming language. The final version of API Microgateway is 3.X.X and it is compatible with WSO2 API Manager 3.0 series only. With the release of WSO2 API Manager 4.0.0, Choreo Connect 1.0.0 released as the new version of API Microgateway. Refer to the migration guide for more information.

What is the open source license of WSO2 Choreo Connect?

Apache Software License Version 2.0

Does WSO2 Choreo Connect offer any commercial support?

It is completely supported from evaluation to production. For more details, see WSO2 Support.

Installation and deployment

What are the minimum requirements needed to run WSO2 Choreo Connect?

Refer to the installation prerequisites section.

How to deploy WSO2 Choreo Connect in production?

It is recommended to use the helm charts based deployment option for production. Refer to the helm charts based deployment guide for more information.

Can I run Choreo Connect using Docker Compose?

It is recommended to use Docker Compose to run Choreo Connect if you want to try it out. Kubernetes should be used for production deployments as Kubernetes provides container management capabilities.

When Choreo Connect is deployed in Kubernetes, some pods are in pending status. What can be the root causes?

Use kubectl describe pod to find the root cause. Allocate more resources if you do not have enough memory or CPU. If you are deploying this to try it out, decrease the values.

What are the default ports used in WSO2 Choreo Connect?

  • HTTP - 9090
  • HTTPS - 9095
  • Enforcer Auth server - 8081
  • Adapter management server - 9843
  • Envoy admin port - 9000
  • Adapter debug port - 6060
  • Adapter xDS port - 18000
  • Enforcer admin port - 9001

What are the different deployment patterns available for WSO2 Choreo Connect?

Is it possible to scale different components of WSO2 Choreo Connect separately ?

Yes, you can define the number of replicas you want and scale the services accordingly. The Router and Enforcer components can be scaled based on the traffic but no scaling is required for the Adapter component as it is a management server.

How do I apply configuration changes?

config.toml file is used by the Adapter to read the configuration and the Adapter should be restarted to apply the new configuration. If the configuration changes should be applied to the Enforcer, the Enforcer should be restarted as it only reads data at the startup. The Router gets updates directly from the Adapter so a restart is not required.

Is Choreo Connect 1.1.0 supported with API-M 4.0.0?

No, supported API Manager versions are listed below with the respective Choreo Connect versions.

API Manager Choreo Connect
API Manager 4.0.0 Choreo Connect 1.0.0
API Manager 4.1.0 Choreo Connect 1.1.0

Why do I keep getting gRPC xDS errors during the start up?

During the start up, the Enforcer service tries to connect with the Adapter to fetch applications, subscriptions, and other required resources. The Adapter waits for the API-M to start and, relative to the Adapter, API-M takes more time to start. So during this time duration, xDS config discovery client errors are thrown.

Functionality

What are the application layer protocols supported by WSO2 Choreo Connect ?

HTTP/1.1

What are the API types supported by WSO2 Choreo Connect ?

REST, WebSocket

I want to do a custom validation for all the API requests in addition to the default validations. How can I do that?

You can write a custom filter in the Enforcer component or use a separate interceptor service.

Can I perform API request/response transformations?

Yes, use a separate interceptor service. Also API policies can be used to perform simple transformations like adding/removing headers, rewriting paths, adding query params, changing HTTP methods, etc.

Security

What are the different methods available for API authentication?

Choreo Connect supports several API authentication mechanisms including OAuth 2.0. Refer to the API authentication documentation for more information.

Can I use a custom authorization header?

Yes, you can configure a custom authorization header name in Choreo Connect. Refer to Custom Authorization Header for more information.

Can I disable API security for a specific API deployed in WSO2 Choreo Connect?

Yes, security can be disabled at API, resource and operation level. Refer to Disabling Security for more information.

What are the different methods of API authorization supported by WSO2 Choreo Connect?

Scope validation, subscription validation and custom claims mapping. Refer to API Authorization for more information.

Troubleshooting

Why am I getting Cross-Origin Resource Sharing (CORS) errors?

It could be due to an invalid CORS configuration in the Router component. Also, another possibility is that the API is not deployed at all. Since the preflight request is usually sent prior to the actual request, users would see a CORS failure. Refer to the [CORS configuration] for more information.

How can I enable debug logs?

Debug and trace logs can be enabled separately for each of the components. Refer to Enable Debug Logs for more information.

Where can I get more information about the error codes?

Refer to Error handling for information regarding the error codes.

Why am I getting an Unclassified Validation Failure with 500 HTTP status code?

This error occurs when the Router is unable to connect to the Enforcer service to perform authentication. Possible reasons could be:

  • Enforcer service not being available.
    • Execute the following command to see the status of the Enforcer service.
      • docker ps for Docker Compose-based deployments.
      • kubectl get deployments for Kubernetes-based deployments.
  • Runtime exception in the Enforcer service causes a timeout.
    • Enable debug logs and Router access logs to see whether there’s any unusual behavior/exception.
  • Invalid network configuration like host name, port, port bindings, etc.
  • Enforcer service does not have enough resources to process the request (insufficient memory or high CPU usage).

Why am I getting an upstream connection termination error with 503 status code?

Enable access logs in the Router and inspect the logs. Refer to the response error codes to find the exact reason for upstream connection termination. If further analysis is required, enable Router trace logs.

Why do I get a 404 that says resource not found when I deploy the API?

Check Adapter logs for API deployment and verify whether the API has been successfully deployed or not. Check the Router config dump to verify whether a relevant route exists for the invoked resource. To access the Router config dump, use Kubernetes port forwarding to access the Router admin interface.

kubectl port-forward <POD_NAME> 9000:9000

Why do I get a 401 unauthorized error for an API request?

401 Unauthorized is returned when the authentication fails in the Enforcer for the provided credentials.

  • Check whether the provided credentials are valid or not.
  • Check Enforcer logs to see the reason for the failure.
  • Enable debug logs to further verify.
Top