2021-02-26 21:40:08 +08:00
---
2021-03-01 12:00:06 +08:00
title: gRPC Proxy
2021-02-26 21:40:08 +08:00
---
2019-11-01 11:22:49 +08:00
<!--
#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
-->
2019-11-01 10:09:01 +08:00
proxying gRPC traffic:
2021-01-26 11:04:16 +08:00
gRPC client -> APISIX -> gRPC/gRPCS server
2019-11-01 10:09:01 +08:00
2020-04-20 09:07:42 +08:00
## Parameters
2019-11-01 10:09:01 +08:00
2021-01-26 11:04:16 +08:00
* `scheme` : the `scheme` of the route's upstream must be `grpc` or `grpcs` .
* `uri` : format likes /service/method, Example: /helloworld.Greeter/SayHello
2019-11-01 10:09:01 +08:00
### Example
2019-11-01 11:22:49 +08:00
#### create proxying gRPC route
2019-11-01 10:09:01 +08:00
Here's an example, to proxying gRPC service by specified route:
2021-01-26 11:04:16 +08:00
* attention: the `scheme` of the route's upstream must be `grpc` or `grpcs` .
2021-06-11 17:23:16 +08:00
* attention: APISIX use TLS‑ encrypted HTTP/2 to expose gRPC service, so need to [config SSL certificate ](certificate.md )
2021-02-19 09:04:48 +08:00
* attention: APISIX also support to expose gRPC service with plaintext HTTP/2, which does not rely on TLS, usually used to proxy gRPC service in intranet environment
2019-11-14 11:57:16 +08:00
* the grpc server example: [grpc_server_example](https://github.com/iresty/grpc_server_example)
2019-11-01 10:09:01 +08:00
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2019-11-01 10:09:01 +08:00
{
"methods": ["POST", "GET"],
"uri": "/helloworld.Greeter/SayHello",
"upstream": {
2021-01-26 11:04:16 +08:00
"scheme": "grpc",
2019-11-01 10:09:01 +08:00
"type": "roundrobin",
"nodes": {
"127.0.0.1:50051": 1
}
}
}'
```
2021-02-19 09:04:48 +08:00
#### testing HTTP/2 with TLS‑ encrypted
2019-11-01 10:09:01 +08:00
Invoking the route created before:
```shell
$ grpcurl -insecure -import-path /pathtoprotos -proto helloworld.proto -d '{"name":"apisix"}' 127.0.0.1:9443 helloworld.Greeter.SayHello
{
"message": "Hello apisix"
}
```
This means that the proxying is working.
2021-01-26 11:04:16 +08:00
2021-02-19 09:04:48 +08:00
#### testing HTTP/2 with plaintext
By default, the APISIX only listens to `9443` for TLS‑ encrypted HTTP/2. You can support HTTP/2 with plaintext via the `node_listen` section under `apisix` in `conf/config.yaml` :
```yaml
apisix:
node_listen:
- port: 9080
enable_http2: false
- port: 9081
enable_http2: true
```
Invoking the route created before:
```shell
$ grpcurl -plaintext -import-path /pathtoprotos -proto helloworld.proto -d '{"name":"apisix"}' 127.0.0.1:9081 helloworld.Greeter.SayHello
{
"message": "Hello apisix"
}
```
This means that the proxying is working.
2021-01-26 11:04:16 +08:00
### gRPCS
If your gRPC service encrypts with TLS by itself (so called `gPRCS` , gPRC + TLS), you need to change the `scheme` to `grpcs` . The example above runs gRPCS service on port 50052, to proxy gRPC request, we need to use the configuration below:
```shell
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
{
"methods": ["POST", "GET"],
"uri": "/helloworld.Greeter/SayHello",
"upstream": {
"scheme": "grpcs",
"type": "roundrobin",
"nodes": {
"127.0.0.1:50052": 1
}
}
}'
```