All posts

What Kong TCP Proxies Actually Do and When to Use Them

Picture this: your team’s new service talks over raw TCP instead of HTTP, and suddenly your shiny API gateway turns into a grumpy doorman who only speaks REST. You still need visibility, control, and security across those TCP connections. That is exactly where Kong TCP Proxies come into play. Kong TCP Proxies extend Kong Gateway beyond HTTP and gRPC to handle raw TCP streams. They let you apply the same security and traffic policies that protect your APIs to non-HTTP protocols like PostgreSQL,

Free White Paper

End-to-End Encryption + Kong Security Plugins: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Picture this: your team’s new service talks over raw TCP instead of HTTP, and suddenly your shiny API gateway turns into a grumpy doorman who only speaks REST. You still need visibility, control, and security across those TCP connections. That is exactly where Kong TCP Proxies come into play.

Kong TCP Proxies extend Kong Gateway beyond HTTP and gRPC to handle raw TCP streams. They let you apply the same security and traffic policies that protect your APIs to non-HTTP protocols like PostgreSQL, Redis, or SMTP. In short, you gain governance for everything that speaks over TCP, not just web traffic.

A Kong TCP Proxy works by establishing a stream route. Instead of routing URLs, it inspects connection metadata such as IP, SNI, or port. You can attach plugins just like you would to normal HTTP routes, but applied at the TCP layer. That means SSL termination, rate limits, or authentication can be enforced before the connection ever touches your backend. Once configured, Kong becomes the universal policy engine across all network traffic types.

When integrating TCP proxies into an existing environment, the real work is less about configs and more about flow. Each connection first hits Kong’s stream listener, which evaluates routing rules and executes plugin chains. Identity and access can be bound through mTLS or by pairing with OpenID Connect. This tight mapping prevents implicit trust based on IP addresses. Kong handles the transport, your policy defines the logic, and both stay independent of app code.

Best practices:
Keep stream plugins lightweight. A TCP proxy should never become a bottleneck. If latency spikes, check certificate renegotiation or upstream DNS lookups. Rotate secrets frequently and, when possible, integrate identity via systems like Okta or AWS IAM. That eliminates static credential sprawl.

Continue reading? Get the full guide.

End-to-End Encryption + Kong Security Plugins: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of Kong TCP Proxies

  • Unified policy enforcement for both REST APIs and low-level services
  • Centralized monitoring and audit trails for all traffic flows
  • Simplified TLS termination and lifecycle management
  • Resilient traffic control without touching client code
  • Reduced attack surface with fine-grained protocols

For developers, it means fewer exceptions in infrastructure as code. No more waiting for network approvals before exposing a new port. You define the route once, attach the right plugin set, and move on. The proxy does the heavy lifting quietly in the background, improving developer velocity and reducing operational toil.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of juggling multiple gateways or scripts, hoop.dev manages identity-aware TCP access rules across environments, enabling SOC 2 compliant patterns without manual babysitting.

Quick Answer: How do you secure a Kong TCP Proxy?
Attach stream-level authentication, set up mTLS between Kong and clients, and audit logs regularly. This ensures end-to-end verification even for non-HTTP workloads.

As AI agents and automation tools begin to issue TCP or DB connections directly, the same controls apply. A secure proxy becomes the difference between safe delegation and uncontrolled sprawl.

Kong TCP Proxies push consistent governance into corners of infrastructure that used to hide from policy. If your network has more than one protocol, it is time those connections spoke the same secure language.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts