Creates new KrakenD configurations with best practices, proper structure, and edition-appropriate features
/plugin marketplace add krakend/claude-code-plugin/plugin install krakend-ai-assistant@krakendThis skill inherits all available tools. When active, it can use any tool Claude has access to.
Guides users through creating new KrakenD configurations with best practices, proper structure, and edition-appropriate features. Provides interactive creation with validation at each step.
Creates KrakenD configurations using one of two approaches:
When: 1-3 endpoints with straightforward routing Approach: Generate directly using tools
When: >3 endpoints, advanced features, or microservices architecture
Approach: Spawn config-architect agent
generate_basic_config - Create complete configurationgenerate_endpoint_config - Create individual endpointsgenerate_backend_config - Create backend configurationsget_feature_config_template - Get templates for specific featureslist_features - Browse available features and check edition requirementscheck_edition_compatibility - Verify if config requires CE or EEvalidate_config - Validate generated configurationsearch_documentation - Find relevant examplesAsk user about:
Simple (1-3 endpoints): Continue with direct generation
Complex (>3 services): Spawn config-architect agent
1. Start with basic structure (generate_basic_config)
2. Add endpoints one by one (generate_endpoint_config)
3. Add features as needed (get_feature_config_template)
4. Validate after each addition (validate_config)
Always include:
validate_config on final resultAfter generating config, provide test command based on: (1) Version from $schema, (2) Edition (CE/EE by features used), (3) FC if applicable, (4) LICENSE file for EE.
Examples:
# CE
docker run --rm -v $(pwd):/etc/krakend krakend:VERSION check -tlc /etc/krakend/krakend.json
# EE (requires LICENSE file)
docker run --rm -v $(pwd):/etc/krakend krakend/krakend-ee:VERSION check -tlc /etc/krakend/krakend.json
Flags: Use -tlc (test + lint + config) to catch anti-patterns and best practices violations.
FC: CE requires FC_ENABLE=1 + env vars; EE auto-detects. Images: krakend:VERSION (CE), krakend/krakend-ee:VERSION (EE).
# KrakenD Configuration Created
I've created a KrakenD configuration for you:
## Summary
- Port: 8080
- Endpoints: 3
- Features: JWT validation, rate limiting, circuit breakers
- Edition: Community Edition compatible
## Configuration
\`\`\`json
{
"version": 3,
"$schema": "https://www.krakend.io/schema/krakend.json",
"port": 8080,
"timeout": "3000ms",
"endpoints": [
...
]
}
\`\`\`
## Features Included
### Authentication (JWT)
- Validates tokens from your identity provider
- **Location**: endpoints[0].extra_config["auth/validator"]
- **Docs**: https://www.krakend.io/docs/authorization/jwt-validation/
### Rate Limiting
- Protects endpoints from overload
- **Config**: 100 requests/second per endpoint
- **Docs**: https://www.krakend.io/docs/endpoints/rate-limit/
### Circuit Breakers
- Prevents cascade failures
- **Config**: Opens after 5 errors in 60 seconds
- **Docs**: https://www.krakend.io/docs/backends/circuit-breaker/
## Next Steps
1. **Save this configuration** to `krakend.json`
2. **Test it**: `docker run --rm -v $(pwd):/etc/krakend krakend:latest check -tlc /etc/krakend/krakend.json`
3. **Run it**: `docker run --rm -p 8080:8080 -v $(pwd):/etc/krakend krakend:latest run -c /etc/krakend/krakend.json`
4. **Monitor**: Check logs at startup
Would you like me to:
- Add more endpoints?
- Add additional features (caching, CORS, etc.)?
- Optimize for specific use case?
- Explain any part in detail?
User: "Create a config for my REST API at https://api.example.com"
Response: "I'll create a KrakenD configuration for your REST API. Let me ask a few questions:
Or should I create a basic setup and you can tell me what to adjust?"
[User provides answers] [Generate configuration using tools] [Present as shown in output format above]
User: "I need a gateway for my microservices: user-service, order-service, payment-service, and inventory-service. Each has multiple endpoints."
Response: "This sounds like a complex microservices architecture with 4+ services. I'm going to spawn the config-architect agent to design this properly. The agent will:
One moment while I analyze your requirements..."
[Spawn config-architect agent]
User: "Add JWT validation to my existing config"
Response: "I'll add JWT validation to your configuration. I need a few details:
Also, which endpoints need JWT validation? (all, or specific ones?)"
[User provides details]
[Use get_feature_config_template for JWT]
[Merge into existing config]
[Validate with validate_config]
[Present updated configuration with test command]
config-validator skillfeature-explorer skillsecurity-auditor skillMaster authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.