All posts

How to configure Dagster Kong for secure, repeatable access

You know the feeling. Another data pipeline ships, and someone asks if it’s safe to expose metrics from Dagster through an internal API gateway. Half the team reaches for Kong, the other half groans at the thought of YAML archaeology. The tension is real: you want fast visibility without breaking policy. Dagster handles orchestration like a pro—type-safe, version-aware, and delightfully composable. Kong manages edge traffic, auth decisions, and rate limits at scale. Put them together and you ge

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You know the feeling. Another data pipeline ships, and someone asks if it’s safe to expose metrics from Dagster through an internal API gateway. Half the team reaches for Kong, the other half groans at the thought of YAML archaeology. The tension is real: you want fast visibility without breaking policy.

Dagster handles orchestration like a pro—type-safe, version-aware, and delightfully composable. Kong manages edge traffic, auth decisions, and rate limits at scale. Put them together and you get a workflow where your data pipelines aren’t just reliable, they’re securely reachable without giving your ops team another incident to chase.

Here’s the logic: Dagster defines jobs, schedules, and materializations. Kong provides an identity-aware layer between clients and Dagster’s GraphQL or gRPC endpoints. The magic happens when you treat Kong as an identity proxy instead of a plain reverse proxy. Each Dagster service registers with Kong, and Kong verifies request context using OIDC tokens from providers like Okta or Auth0. Every pipeline trigger and status request then carries user identity cleanly through to Dagster’s workspace.

That setup solves three things Ops teams actually care about: fine-grained access, consistent audit trails, and zero leakage of credentials inside CI/CD jobs. The integration is straightforward once identity is mapped. Connect Kong’s plugin for OIDC upstream, define routes for Dagster’s instance endpoints, and restrict internal traffic using service-to-service auth backed by AWS IAM or GCP Service Accounts. When someone retriggers a daily asset refresh, they hit Dagster via a managed token instead of whatever random secret lives in a config file.

Small but vital best practice: rotate Kong’s signing keys at the same cadence as Dagster’s deployment tokens. Cross-team token rotation eliminates stale credentials, which is usually where breaches start. If an error reads “unauthorized” mid-run, the fix is often a mismatched issuer claim. Update Kong’s identity plugin to trust the correct OIDC issuer URL and you’re back in business.

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of Dagster Kong integration:

  • Unified identity enforcement across data jobs and API endpoints
  • Less manual policy; access rules live with the gateway, not the repo
  • Better auditability with structured request logs
  • Reduced latency from granting local tokens instead of fetching remote secrets
  • Compliance alignment for SOC 2 and least-privilege principles

For developers, this pairing feels right. You code pipelines in Dagster, deploy via Terraform, and hit them from any environment knowing Kong decides who gets through. No spilled keys, no Slack threads about “broken OAuth,” just clean access and faster onboarding.

AI assistants and internal copilots can also use Kong-signed tokens to invoke Dagster tasks securely. With identity-aware routing, AI agents fetch metadata without overstepping permissions. It’s how automation stays both smart and contained.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of scripting temporary gateways, you configure identity-aware access once and let it secure every endpoint you expose.

How do I connect Dagster to Kong easily?
Define Kong upstreams for Dagster’s webserver, enable OIDC authentication, link your identity provider, and test token propagation. A successful request returns authenticated Dagster job data without manual credential handling.

That’s the real beauty of Dagster Kong—secure data orchestration without all the glue work.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts