You know that feeling when your infrastructure looks stable, yet access policies feel like spaghetti? That’s the gap Kong Spanner aims to close. It bridges the high-traffic, API management power of Kong with the transactional consistency and automation control of Spanner, Google Cloud’s globally distributed database. Together they make distributed systems less chaotic and access logic predictable.
Kong handles the front door. It routes traffic, authenticates requests, and enforces policies at the gateway. Spanner sits downstream, managing relational data that refuses to give up strong consistency even across regions. The magic happens when you sync authorization and data policies between them. Kong Spanner isn’t a single product but a workflow: a way of connecting identity-aware traffic control with consistent data updates.
The integration logic is simple but powerful. Kong receives a request, checks identity through JWTs or OIDC tokens, maps roles through plugins, and forwards only what complies with policy. Spanner consumes the request safely because every call carries verified context. That consistency between access control and data enforcement stops race conditions and stale reads before they start. It is modern access meets transactional integrity.
To get it right, design your Kong routes with clear RBAC mapping. Avoid writing conditional logic in your services that duplicates gateway rules. Let Kong authenticate, then let Spanner validate. Rotate credentials often and test latency under concurrent load. A few milliseconds of saved round trips matter when thousands of clients are involved.
Benefits of the Kong Spanner pattern: