Claude-skill-registry api-gateway-configuration
Configures API gateways for routing, authentication, rate limiting, and request transformation in microservice architectures. Use when setting up Kong, Nginx, AWS API Gateway, or Traefik for centralized API management.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/api-gateway-configuration" ~/.claude/skills/majiayu000-claude-skill-registry-api-gateway-configuration && rm -rf "$T"
manifest:
skills/data/api-gateway-configuration/SKILL.mdsource content
API Gateway Configuration
Design and configure API gateways for microservice architectures.
Gateway Responsibilities
- Request routing and load balancing
- Authentication and authorization
- Rate limiting and throttling
- Request/response transformation
- Logging and monitoring
- SSL termination
Kong Configuration (YAML)
_format_version: "3.0" services: - name: user-service url: http://user-service:3000 routes: - name: user-routes paths: ["/api/users"] plugins: - name: rate-limiting config: minute: 100 policy: local - name: jwt - name: order-service url: http://order-service:3000 routes: - name: order-routes paths: ["/api/orders"]
Nginx Configuration
upstream backend { server backend1:3000 weight=5; server backend2:3000 weight=5; keepalive 32; } server { listen 443 ssl; location /api/ { proxy_pass http://backend; proxy_http_version 1.1; proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_cache_valid 200 1m; } location /health { return 200 'OK'; } }
AWS API Gateway (SAM)
Resources: ApiGateway: Type: AWS::Serverless::Api Properties: StageName: prod Auth: DefaultAuthorizer: JWTAuthorizer Authorizers: JWTAuthorizer: JwtConfiguration: issuer: !Sub "https://cognito-idp.${AWS::Region}.amazonaws.com/${UserPoolId}"
Best Practices
- Authenticate at gateway level
- Implement global rate limiting
- Enable request logging
- Use health checks for backends
- Apply response caching strategically
- Never expose backend details in errors
- Enforce HTTPS in production