What is Tyk Cloud
Tyk cloud is a fully managed service that makes it easy for API teams to create, secure, publish and maintain APIs at any scale, anywhere in the world. Tyk Cloud includes everything you need to manage your global API ecosystem: Tyk Gateways, Tyk Dashboard, Tyk Developer Portal and Universal Data Graph.- No need to wrestle with infrastructure: You can be up and running within a few clicks. No need for complex deployments or large infrastructure teams.
- Flexible deployment options: Whether you’re a startup or a large enterprise, Tyk Cloud has deployment options to suit your needs. You can scale and manage your API ecosystem easily and efficiently. The control plane is hosted by Tyk in the cloud, in one of the 5 regions available. Meanwhile, the data planes, composed of Tyk Gateways and Redis for temporary storage, can be either hosted by Tyk or managed by you on your infrastructure.
- Geographical freedom: Tyk Cloud allows you to select your preferred AWS location as your home region, ensuring your data and Tyk Gateways are live and secured in the region that suits you best.
- Designed for platform teams: With Tyk Cloud, you can use role-based access control (RBAC) to manage your team structure, as well as multiple environments and multiple organizations.
Why Tyk Cloud?
Next Level SaaS
Tyk is cloud native and has always been a true multi-cloud product and now we’re taking it to the next level with our next level SaaS platform, Tyk Cloud. Now you don’t need to worry about vendor lock-in, or complex deployments, you can benefit from being able to optimize your platforms across and between a myriad of providers such as AWS, Google Cloud etc.Quick deployments Wherever you need them
Want to handle Govt API traffic in Singapore? With just a few clicks your data and Tyk Gateways are live and secured in the AWS Gov cloud. Want to add local Gateways in Australia to improve performance and resilience? It’s just a click away. Want to deploy your management layer to your own hosted servers rather than a cloud provider? We make it simple. The new Tyk Cloud platform allows you to quickly setup the full Tyk Enterprise API Management platform, simply choosing the regions where you wish to locate your gateways and where you wish your data to reside, resulting in immediate and secure data sovereignty. Seamlessly wire your environments between cloud providers, and your own infrastructure, anywhere in the world at the click of a button, not only eliminating lock-in but making it possible to expand your platform to cater for the changing needs of your clients.Designed for Enterprises
Tyk Cloud is designed for Enterprises who may have multi-organizations and multi-teams, so you can combine or isolate your platform and the underlying providers, the choice is completely yours! To make it even simpler, Tyk Cloud is pre-configured so you can be up and running within a few clicks, no laborious tasks for your internal teams and best practice configuration and security is delivered out of the box.Where is Tyk Cloud hosted?
Tyk Cloud is currently available to auto-deploy on AWS. Paid plans and Enterprise trials allow users to select one of 6 AWS locations as their home region as well as the locations of their Cloud Data Planes. The 6 AWS regions to choose from are:- aws-ap-southeast-1, Singapore
- aws-eu-central-1, Frankfurt, Germany
- aws-eu-west-2, London, UK
- aws-us-east-1, N. Virginia, USA
- aws-us-west-2, Oregon, USA
- aws-ap-southeast-2, Australia
Quick Start Tyk Cloud
The Tyk Cloud trial is limited to 48 hours. After this period, your data will be deleted.
The Tyk Cloud trial does not include access to Hybrid deployments or the Developer Portal.
To try out these capabilities, please get in touch for a guided evaluation with our team.
- Signing up with Tyk Cloud .
- Creating your first API using the Tyk Dashboard.
- Setting up a Policy and Key to secure your APIs.
Steps for Setting up Tyk Cloud
- Create Tyk Cloud Account
- Get started with your first API with Tyk Dashboard
Tyk Cloud Feature Setups
Configuration
Python custom pluginsImplement your own custom logic with Python based plugins
Configuration
Using custom domainsConfigure custom domain for your Dashboard and Developer Portal
Administration
Manage environmentsCreate and manage multiple environments within your Tyk Cloud organization
Administration
Manage deploymentsCreate and manage your Cloud Control Plane and Cloud Data Plane deployments
Administration
Manage teams & usersCreate teams in your organization, define roles and manage user access
Account
Manage billingUpgrade your subscription, billing details or card information
Comprehensive Tyk Cloud Setup
This section walks you through how to start using Tyk Cloud, creating organization, environment and users before creating an API. If you are in a hurry, try the Quick Start guide for a 5 min version of this tutorial.- Creating your Tyk Cloud account
- Your first Organization
- Creating your first Team and Environment
- Configuring and deploying your Control Plane and creating your Cloud Data Plane
-
Adding and testing your first API
Comprehensive Tyk Cloud Setup
requires access toTyk Cloud Console
(management UI). Please note that free trial users do not have access to theTyk Cloud Console
. To obtain the required access, contact support.
Prerequisites
The following information would be useful so you can set up Tyk Cloud as quickly as possible:- Team member information including their email address and the role you plan to assign to them.
- We have some specific terminology used within Tyk Cloud. It would be useful to checkout our Glossary so you understand what we are referring to.
Hierarchy
This diagram shows how Organization, Teams, Environments, Control Planes and Cloud Data Planes fit in with each other and which object contains which:
Complete Cloud Setup Tasks
Create an Account
You can use Tyk Cloud to manage your APIs effectively and with minimal effort. This page explains how to create an account, in order to start doing so.What happens when you create your Tyk Cloud account?
When you create your Tyk Cloud account, we do the following for you:- Assign the account creator as a Billing admin for the Organization. This user role allows you to manage the billing and plans for your org. You can also add other billing admins as required.
- Assign the new account to our 48 hours free trial plan
Creating your first account
Start here.- To create your account, you will have to fill in first-level details like your first name, last name and email.
- Then, set up a password for your Tyk Cloud account.
- Following that check the box at the bottom of the page to confirm that you have read and accepted our Terms and Conditions.
- Finally, click Create new account
- After completing the Account Creation form, click Start Organization Setup.
Set Up Your Organisation
Now that you have created the new Tyk Cloud account with your basic details, it is time to set up your organization. This page will tell you how to set up your organization and also about the two ways of setting it up.What is an organization?
- An organization is the main entity for all your data (Environments, APIs, Users, etc)
- An Organization is connected to a single region and once connected, cannot be changed.
Steps to set up your organization
- Step 1 - Name your Organization: Give your organization a name. This is up to you, but most users use their company name.
-
Step 2 - Select a Home Region: Select a region from the drop-down list where your Control Plane will be deployed and your data stored. The number of regions available will depend on your license. Further regions can be added as an upgrade option.
Tyk Cloud can currently be deployed across 2 AWS regions in the USA plus UK, Germany and Singapore. If you have any concerns about Brexit impacting the way you store data you should read AWS regularly updated Brexit statement.
Types of Setups
You can now select how to configure your deployment. Option 1: Demo Setup Our demo setup will quickly configure your first deployment setup automatically, creating your first team, Cloud Control Plane and Cloud Data Plane. Option 2: Manual Setup This setup option gives you full control on creating the following:- Teams
- Environments
- Configuration and deployment of Control Planes and Cloud Data Planes
Create Your First Team
Following organization setup, you will have to set up your team(s) on Tyk Cloud. This page will tell you all about the process.What is a team?
- A team is a sub-grouping inside an organization.
- Inside a team, you can define users(team members) and roles(permissions that can be applied to a user or a team of users).
Steps to set up your team
After creating your Organization you’ll land on the success screen. Click Get Started.- Step 1 - Name your Team: Give your Team a name. You may find it useful to reflect the names used within your organization.
- Step Two - Invite your Users: Invite your users to your team. You’ll only need their email address and which of the available roles you want to assign to them. This step is optional and can be completed within the dashboard later.
User Roles in Tyk Cloud
Out of the box, the following roles are setup:- Team member: They can manage deployment activity for the team they are added to.
- Team admin: They can manage deployment activity and users for the team they are added to.
- Organization admin: They can manage deployment activity and users for a single organization.
Configure Environment and Deployments
An Environment allows you to group deployments together. In this step we will create an Environment and configure our first Control Plane and Cloud Data Plane deployments.What is an environment?
An environment is a grouping of ‘deployments’ that can have multiple Control Planes and Cloud Data Planes.Steps to set up your environment
- Step 1 - Name your Environment: Give your Environment a name. You may find it useful to reflect the names used within your organization such as Development, Production etc.
- Step 2 - Name your Control Plane: Give your Control Plane a name. Again, this is up to you and you may already have an infrastructure you want to re-create in Tyk Cloud.
-
Step 3 - Configure your first Cloud Data Plane: Select the region you want to locate your Cloud Data Plane in from the drop-down list. Your Cloud Data Plane is not confined to the same region as your Organization and Control Plane but the amount of regions you have to choose from can be limited depending on your subscription plan. Give your Cloud Data Plane a name.
You need to have at least one Cloud Data Plane with a Deployed status connected to your Control Plane.
- Step 4 - Deployment:
- Click Deploy Control Plane and Create a Cloud Data Plane. You can watch your Control Plane being deployed and your Cloud Data Plane being created. You will then be taken to the Control Plane overview screen within the Tyk Cloud dashboard.
- From your Control Plane overview you will see the Cloud Data Plane is in a Not Deployed state. Click on your Cloud Data Plane to open its overview.
- In the top right of your Cloud Data Plane overview, click Not Deployed and choose Deploy from the drop-down.
- With your Cloud Data Plane successfully deployed, make a note of the tags assigned to your Cloud Data Plane. One tag is “edge” and the other is the location of your Cloud Data Plane. You’ll add a tag when creating your API.
Deploy and Add Your First API
Your onboarding is now complete! The next step will be to setup a very basic API to demonstrate how APIs are managed within Tyk Cloud.WarningIn Tyk Gateway release 5.3.0, Tyk OAS APIs gained feature maturity. Tyk Dashboard will automatically migrate any pre-5.3.0 Tyk OAS APIs to the feature mature standard when you upgrade to 5.3.0 or later. Feature mature Tyk OAS APIs may not work with pre-5.3.0 versions of Tyk Gateway.It is not possible to rollback to previous versions of Tyk components with Tyk OAS APIs created in 5.3.0.For further details, please refer to the release notes for Tyk Gateway v5.3.0.
Steps to add an API in Tyk Cloud
- Step 1 - Access the Dashboard: Go to the Control Plane overview and click the dashboard link in the Ingress list. You’ll be redirected to the Tyk Dashboard for your Control Plane.
- Step 2 - Add a New API: Click the APIs menu item and then click Add New API.
-
Step 3 - Core Settings:
- Give Your API a name - We’ll use “my app” for the rest of this Getting Started journey.
- Scroll down to the Target URL setting and use the URL https://httpbin.org/
- Then scroll down to the Authentication section and select Open(Keyless) to keep things simple for this demo.
Ensure you configure a valid API Listen path. Root (”/”) listen paths are not supported on Tyk Cloud deployments prior to version v3.2.0. -
Step 4 - Advanced Options:
- Click the Advanced Options tab of the API Designer.
- Scroll to the Segment Tags (Node Segmentation) setting and add the cloud data plane tag (edge) you saw when creating the Cloud Data Plane.

Note:How Segment Tags work in Tyk Cloud?When a Cloud Data Plane is deployed, the tag ‘edge’ and a location tag are automatically generated for the Cloud Data Plane. You use these tags to connect your API to the appropriate Cloud Data Plane. It works as follows:
- Add the edge tag to your API to connect it to all Cloud Data Planes within the Control Plane.
- Add the location tag to your API to connect it to only Cloud Data Planes with that location within the Control Plane.
All APIs must be connected to a Cloud Data Plane by adding the appropriate tag in the Segment Tags (Node Segmentation) in the API Designer.
- Step 5 - Save Your API: Click Save from the API Designer. Your API will now be added to the APIs list and as the next step you’ll access your API from the Gateway Ingress.
Test Your API
Your first API has been added. What’s next? Testing it! This page shows how you can test an API that you have added to Tyk Cloud, to ensure that it’s functioning correctly. You’ll now access the API you setup in Task 5 from the Cloud Data Plane within Tyk Cloud.Steps to test your API
- Step 1 - Access the Gateway Ingress: From the Cloud Data Plane overview, copy the Ingress link and open it in a browser tab. You will get a 404 error.
-
Step 2 - Append the URL with your API: You created a API named my app in Task 5. Add
/my-app/
to the end of the URL. You should be taken to https://httpbin.org/, which you added as the Target URL for the API in Task 5.
View Analytics
We have now created and tested our API. How do we know that they are performing well? This page walks you through how to then view your API analytics so that you can ensure your APIs are performing perfectly.Steps to check your API analytics
- Step 1 - Access the Dashboard: You’ll now look at the analytics for the API you created in Task 5.If you’re not still in the Tyk Dashboard for your Control Plane, click the dashboard link in the Control Plane Ingress list. Click the Gateway Dashboard menu item and you can see the successful calls made to your API from the Cloud Data Plane you created.
-
Step 2 - Create an Error: From the Cloud Data Plane, make a call that will throw an error. For example, use
me-app
instead ofmy-app
. You should see the error displayed in the Analytics.
Review Your Setup
This summary page explains the steps required to implement Tyk Cloud, which enables you to manage your APIs seamlessly. We’ve covered the following to get you started with the Tyk Cloud way of managing Tyk deployments:- We’ve created a new Organization
- We’ve added a Team
- We’ve added an Environment, including a Control Plane and an associated Cloud Data Plane and deployed them
- We’ve added a very simple API to the Control Plane Dashboard and tested it via the first Cloud Data Plane
- We’ve seen the data from the Gateways displayed in the Analytics section of the Control Plane Dashboard
- Managing your Deployments
- Adding Plugins and Middleware to your Control Plane
Import Existing APIs
Tyk supports importing both API Blueprint and Swagger (OpenAPI) JSON definitions from either the Gateway or the Dashboard. Tyk will output the converted file to tostdout
. Below are the commands you can use to get Tyk to switch to command mode and generate the respective API definitions for both API Blueprint and Swagger files.
API Blueprint is being Deprecated
Our support for API Blueprint is being deprecated. We have been packaging aglio in our Docker images for the Dashboard which enables rendering API Blueprint Format in the portal. This module is no longer maintained and is not compatible with newer NodeJS. If you wish to continue using this feature, you can do so by installing the module yourself in your Dockerfile. The imapct of this change is that our Docker images will no longer contain this functionality. As a work around, you can do the following:- Create API Blueprint in JSON format using the Apiary Drafter tool
- Convert API Blueprint to OpenAPI (Swagger) using the Apiary API Elements CLI tool.
Import APIs via the Gateway
Using API Blueprint
See note above regarding deprecation of support for API Blueprint.
stdout
, so redirecting the output to a file is advised in order to generate new definitions to use in a real configuration.
Importing a Blueprint as a new API:
Create a new definition from the Blueprint:
--as-mock
parameter.
Using Swagger (OpenAPI)
Tyk supports importing Swagger documents to create API definitions and API versions. Swagger imports do not support mocking though, so sample data and replies will need to be added manually later. Importing a Swagger document as a new API Create a new definition from Swagger:When creating a new definition from an OAS 3.0 spec, you will have to manually add the listen path after the API is created.
use_extended_paths
setup, adding mocked URL data to one of the three list types (white_list, black_list or ignored). In order to handle a mocked path, use an entry that has action
set to reply
:
Import APIs via the Dashboard API
Import API - Swagger
Property | Description |
---|---|
Resource URL | /api/import/swagger/ |
Method | POST |
Type | None |
Body | None |
Param | None |
insert_into_api
: If set totrue
the import will replace an existing API. Setting tofalse
will import into a new API.api_id
: The internal MongoDB object id for your API.version_name
: Your versioning convention name for the imported API.upstream_url
: The URL the API is served by.
Import API - Blueprint
Property | Description |
---|---|
Resource URL | /api/import/blueprint/ |
Method | POST |
Type | None |
Body | None |
Param | None |
insert_into_api
: If set totrue
the import will replace an existing API. Setting tofalse
will import into a new API.api_id
: The internal MongoDB object id for your API.as_mock
: If set to true, enables our mocking support for Blueprint imported API. See Mocks above for more details.version_name
: Your versioning convention name for the imported API.upstream_url
: The URL the API is served by.
Import APIs via the Dashboard UI
- Select “APIs” from the “System Management” section

- Click “IMPORT API”

- From an Existing Tyk API definition
- From a Apiary Blueprint (JSON) file
- From a Swagger/OpenAPI (JSON only) file
- From a SOAP WSDL definition file (new from v1.9)


- Enter API Information
- Your Upstream Target
- A Version Name (optional)
- An optional Service Name and Port (WSDL only)
- Copy code into the editor
- Click “Generate API”
Creating a new API Version by importing an API Definition using Tyk Dashboard
As well as importing new APIs, with Tyk, you can also use import to create a new version of an existing Tyk Classic API.- Open the API Designer page and select Import Version from the Options drop-down.

- Select either OpenAPI (v2.0 or 3.0) or WSDL/XML as your source API
- You need to add a new API Version Name. Upstream URL is optional.

- Click Import API.

- Select the Versions tab and your new version will be available.
- Open the Endpoint Designer for your API and select your new version from Edit Version.
- You will see all the endpoints are saved for your new version.

Additional Cloud Configuration
Manage Environments and Deployments
This section covers the administration of the various components of your Tyk Cloud installation: It also covers links to how to start managing your APIs via the Tyk Dashboard, accessible from your Control Plane.Organisations Overview
Your Organization is your “container” for all your Environments, Control Planes and Cloud Data Planes. When you setup your Organization when creating your account, you assign it to a Home Region where all your data is stored. You cannot change this home region after creating your organization. Organization Overview Screen If you are an Organization Admin, when you log in you will see the Overview screen for the Organization you are connected to. If you are a team admin or team member you will see the Team Overview Screen. The Organization Overview screen displays the following info:- Quick Stats
- All Teams
- All Deployments
- All Environments




Managing Environments
Environments are used to group your Control Plane and Cloud Data Planes into logical groups. For example you may want to create environments that reflect different departments of your organization.The number of Environments you can create is determined by your plan
Prerequisites
The following user roles can perform Environment Admin tasks:- Org Admin
- Team Admin
Adding a New Environment
- From the Environments screen, click Add Environment
- Select the team you want to assign to the Environment
- Give your new Environment a name
- Click Create
Editing an Existing Environment
An Org Admin can perform the following:- Rename an Environment
- Delete an Environment
- Click the environment Name from your list

- Click Edit

- You can now rename the environment, or delete it from your organization

Deleting an environment will also delete all the Control Planes and Cloud Data Planes associated with it
Managing Control Planes
Control Planes are situated in your Organization’s home region and provide links to an instance of the Tyk Dashboard and the Developer Portal. The Dashboard is where you perform all your API tasks. The developer portal allows your 3rd party developers access to your APIs. Cloud Data Planes are then connected to your Control Planes.Prerequisites
All user roles can edit, deploy, undeploy, restart, redeploy all deployments within a team. Only the Organization Admin and the Team Admin can create or delete deployments.Adding a new Control Plane
Watch our video on setting up a Control Plane and a Cloud Data Plane.The number of Control Planes you can add is dependent on your plan
- From the Deployments screen click Add Deployment (you can also add a Deployment from within an Environment overview)
- Enter a name for the new Control Plane
- Select Control Plane from the Type drop-down list
- Select the Bundle Channel and Version
- (Optional) Enter a custom domain if required
- (Optional) Enable plugins if required
Edit Control Planes
You can edit the following Control Plane settings:- Change the Control Plane name
- Add a custom domain
- Change the Bundle Channel and Bundle Version
-
Enable plugins
The use of custom domains is dependent on your plan
- From the Deployments screen, click the Control Plane Name from the list
- Select Edit from the Deployed drop-down list

Upgrade Control Planes
To upgrade an existing Control Plane:- Go to the Control Plane settings using the Edit Control Planes instructions and scroll down to the Version section.
- Select a Bundle Channel.

- Next, select a Bundle Version.

- To apply your changes, click the “Save and Re-Deploy” button located at the top right. After a few seconds, you will be redirected to the overview page of the Control Plane and a “Deploying” indicator button will appear.

- A “Deployed” button indicates a successful upgrade.

Managing Cloud Data Plane
Cloud Data Planes do all the heavy lifting of actually managing your requests: traffic proxying, access control, data transformation, logging and more.Prerequisites
All user roles can edit, deploy, undeploy, restart, redeploy all deployments within a team. Only the Organization Admin and the Team Admin can create or delete deployments.Adding a new Cloud Data Plane
Watch our video on setting up a Control Plane and a Cloud Data Plane.The number of Cloud Data Planes you can add is dependent on your plan
- From the Deployments screen click Add Deployment
- Enter a name for the new Gateway
- Select Cloud Data Plane from the Type drop-down list
- Select the Bundle Channel and Version
- (Optional) Enter a custom domain if required
- (Optional) Enable plugins if required
Edit Cloud Data Planes
You can edit the following Control Plane settings:- Change the Gateway name
- Add a custom domain
- Change the Bundle Channel and Bundle Version
-
Enable plugins
The use of custom domains is dependent on your plan
- On the Deployments screen, expand the Control Plane and click on the Cloud Data Plane to access the Cloud Data Plane overview screen.
- Select Edit from the Deployed drop-down list

Upgrade Cloud Data Planes
To upgrade an existing Cloud Data Plane:- Go to the Cloud Data Plane settings using the Edit Cloud Data Planes instructions and scroll down to the Version section.
- Select a Bundle Channel.

- Next, select a Bundle Version.

- To apply your changes, click the “Save and Re-Deploy” button located at the top right. After a few seconds, you will be redirected to the overview page of the Control Plane and a “Deploying” indicator button will appear.

- A “Deployed” button indicates a successful upgrade.

Deploy Hybrid Gateways
Tyk Cloud hosts and manages the control planes for you. You can deploy the data planes across multiple locations:- as Cloud Gateways: Deployed and managed in Tyk Cloud, in any of our available regions. These are SaaS gateways, so there are no deployment or operational concerns.
- as Hybrid Gateways: This is a self-managed data plane, deployed in your infrastructure and managed by yourself. Your infrastructure can be a public or private cloud, or even your own data center.
Prerequisites
- Tyk Cloud Account, register here if you don’t have one yet: free trial
- A Redis instance for each data plane, used as ephemeral storage for distributed rate limiting, token storage and analytics. You will find instructions for a simple Redis installation in the steps below.
- No incoming firewall rules are needed, as the connection between Tyk Hybrid Gateways and Tyk Cloud is always initiated from the Gateways, not from Tyk Cloud.
Tyk Hybrid Gateway configuration
The hybrid gateways in the data plane connect to the control plane in Tyk Cloud using the Tyk Dashboard API Access Credentials. Follow the guides below to create the configuration that we will be used in later sections to create a deployment: Login to your Tyk Cloud account deployments section and click onADD HYBRID DATA PLANE



Docker | Helm | |
---|---|---|
key | api_key | gateway.rpc.apiKey |
org_id | rpc_key | gateway.rpc.rpcKey |
data_planes_connection_string (mdcb) | connection_string | gateway.rpc.connString |


Deploy with Docker
1. In your terminal, clone the demo application Tyk Gateway Docker repositoryrpc_key
- Organization IDapi_key
- Tyk Dashboard API Access Credentials of the user created earlierconnection_string
: MDCB connection stringgroup_id
(optional) - if you have multiple data planes (e.g. in different regions), specify the data plane group (string) to which the gateway you are deploying belongs. The data planes in the same group share one Redis.
- (optional) you can enable sharding to selectively load APIs to specific gateways, using the following:
storage
section in tyk.hybrid.conf:
<docker-compose.yml>
file to use the tyk.hybrid.conf that you have just configured.
From:
Deploy in Kubernetes with Helm Chart
Prerequisites- Kubernetes 1.19+
- Helm 3+
- Connection details to remote control plane from the above section.
- Redis for key storage
- Tyk Pump to send analytics to Tyk Cloud and Prometheus
gateway-svc-hybrid-dp-tyk-gateway
at port 8080
. Pump is also configured with Hybrid Pump which sends aggregated analytics to Tyk Cloud, and Prometheus Pump which expose metrics locally at :9090/metrics
.
1. Set connection details
Set the below environment variables and replace values with connection details to your Tyk Cloud remote control plane. See the above section on how to get the connection details.
gateway-svc-hybrid-dp-tyk-gateway
at port 8080
. Pump is also configured with Hybrid Pump which sends aggregated analytics to Tyk Cloud, and Prometheus Pump which expose metrics locally at :9090/metrics
.
For the complete installation guide and configuration options, please see Tyk Data Plane Chart.
Remove hybrid data plane configuration
Please note the action of removing a hybrid data plane configuration cannot be undone.To remove the hybrid data plane configuration, navigate to the page of the hybrid data plane you want to remove and click OPEN DETAILS



Manage APIs
You can manage your APIs in Tyk Dashboard UI. To access it, click on your desired Control Plane name in the Deployments screen and then on the MANAGE APIS button From there you have access to the full scope of Tyk API management functionality, including:- Adding APIs to Tyk, including REST and GraphQL APIs
- Applying Quotas and Rate limits via Security Policies and Keys
- Securing your APIs
- Viewing granular Analytics for your Tyk managed APIs
- Transform traffic with the Tyk API Designer
- Add integration options such as SSO and 3rd Party IdentityProviders
- Adding Segment Tags
Secure Your APIs
If you decide to use Tyk Cloud to protect your APIs, you need to make APIs accessible to your Tyk Cloud Data Planes so that Tyk can connect your clients to them. A common question that arises is, “how do I secure my APIs (backend services)?”. Here are the most popular ways to secure your APIs. 1. Mutual TLS or Client authorization- This is the most secure method to protect your APIs. With Client authorization, you need to add your Tyk Gateway certificates to an allow-list in all your backends and they will then accept access requests only from clients that present these pre authorized certificates. There are a few limitations with this approach: a. Depending on your setup, you might need to add it to every backend service. If you have a Load Balancer (LB), then it can be set at the LB level. b. Sometimes the LBs (like Application Load Balancers) do not support mTLS and then you need to find other solutions, like Request Signing (below). Another option that might be possible, is to front your services or your LB with an L7 API Gateway (Like Tyk!) to do mTLS with the Tyk Cloud Data Planes on Tyk Cloud.
- You need to be able to update the list in case certificates expire or get revoked.
Managing Teams and Users
This section covers the following:- Managing Teams
- Managing Users
- Available Tyk Cloud User Roles
- Tyk Cloud Single Sign-On (SSO)
Managing Teams
The following user roles can perform existing Team Admin tasks:- Organization Admin - Can manage all teams in the organization they are a member of.
- Team Admin - Can only manage the team they are a member of.
- Change the team name
- Create or delete a team (Organization Admin only)
- Invite and manage users in a team
Change the Team Name
- From the Teams screen, select the team name.
- Click Edit.
- Change the existing name for the team.
- Click Save.
Create a New Team
You need to be a Organization Admin to create a new team.- From the Admin > Teams screen, click Add Team.
- Enter a name for the new team that will be added to the organization.
- Click Create.
Delete a Team
You need to be a Organization Admin to delete a team.- From the Teams screen, select the team name.
- Click Edit.
- Click Delete Team.
- You’ll be asked to confirm the deletion. Click Delete Team from the dialog box to confirm, or click Cancel.
Managing Users
The following user roles can perform existing User Admin tasks:- Organization Admin - Can manage all users in the organization they are a member of.
-
Team Admin - Can only manage the users of the team they are a member of.
Organization Admins, Team Admins and Team Members are responsible for managing the Tyk Cloud organization hierarchy and deploying/managing stacks, as well as having access to the Tyk Dashboard to manage APIs. Users of Tyk Cloud are usually DevOps, Architects and sometimes Engineers or Managers.You can also add users to the Tyk Dashboard itself instead of inviting them as Tyk Cloud users. These users would likely be your API Developers and Engineers who manage the APIs.
Invite a new user to your team
- From the Teams screen, select the team name.
- Click Invite User.
- Complete the form for the new user.
Editing Existing Users
- Select the team with the user you want to edit.
- Click the user name from the team user list.
- You can change the following details
- Change the team they are a member of.
- Change the user role assigned to them.
- Click Save to update the user info.
Delete a User
- Select the team with the user you want to edit.
- Click the user name from the team user list.
- Click Delete
- You’ll be asked to confirm the deletion. Click Delete User from the pop-up box to confirm, or click Cancel.
Assign User Roles
This section defines the different user roles within Tyk Cloud, so that you can see at a glance what each role does and manage your account accordingly.User Roles within Tyk Cloud
We have the following user roles defined in Tyk Cloud for your team members- Billing Admin
- Organization Admin
- Team Admin
- Team Member
Use Case Matrix
The following table shows the scope for each user role.Use Case | Billing Admin | Org Admin | Team Admin | Team Members |
---|---|---|---|---|
Create a new account | X | |||
Create a new organization | X | |||
Managing a new account | X | |||
Managing an organization entitlement | X | |||
Ability to create other billing admins | X | |||
Editing organization name | X | X | ||
Create team / delete | X | |||
Future - Edit team entitlements | X | |||
Invite, delete, edit org admins and team admins | X | |||
Invite, delete, edit team members | X | X | ||
Create new environments | X | X | ||
Delete / change environments | X | X | ||
View environments | X | X | X | |
Create and delete cloud data planes | X | X | ||
Create and delete control planes | X | X | ||
View deployments | X | X | X | |
Deploy, undeploy, redeploy, restart a deployment. | X | X | X | |
Create and manage basic SSO | X | X | ||
Upload plugins to the File Server | X | X | X | |
Delete plugins from File Server | X | X | X | |
Viewing Analytics | X | X | X |
Initial Tyk Cloud Account Roles
The user who signs up for the initial Tyk Cloud account is uniquely assigned to two roles:- Org admin of the organization
- Billing admin of the account
This functionality may change in subsequent releases.
Tyk System Integration
and a last name of User (do not delete)
. As the last name infers, you should not delete this user or your access to the Dashboard will be broken from your Tyk Cloud Installation.
Configure Single Sign-On (SSO)
What is SSO? Single Sign-On (SSO) is an authentication process that empowers users to access various services and applications using a single set of credentials. This streamlines the login experience by eliminating the need to remember multiple usernames and passwords for different platforms. These credentials are securely stored with an Identity Provider(IdP). An Identity Provider (IdP) is a service that stores and manages digital identities. Companies can use these services to allow their employees or users to connect with the resources they need. Pre-requisitesThis functionality is a preview feature and may change in subsequent releases.To be able to configure Single Sign-On authentication, an SSO entitlement needs to be enabled in the subscription plan.
If you are interested in getting access, contact your account manager or reach out to our support@tyk.io
Add new SSO profile
To add a new SSO profile, login to Tyk Cloud, navigate to the Profile list and click on the ADD PROFILE button.

Field name | Explanation |
---|---|
Provider name | Used to distinguish between different SSO providers. |
Client ID | Used for client authentication with the IdP provider. The value can be found in your chosen IdP provider’s configuration. |
Client Secret | Used for client authentication with the IdP provider. The value can be found in your chosen IdP provider’s configuration. |
Discovery URL | Used to read your IdP’s openid configuration. This URL can be found in your chosen IdP provider’s configuration. |
Default User Group ID | The ID of the user group that new users are allocated to by default upon registration. |
Only registered users | A check-box that defines which users are allowed to use SSO. If checked, only users who are already registered in Tyk Cloud are allowed to login with SSO. If un-checked, new users will be added to Tyk Cloud in the Default user group upon successful registration. |

Edit SSO profile
To update/re-configure SSO profile, login to Tyk Cloud, navigate to Profile list and click on the profile that you would like to update.

Delete SSO profile
Please note the action of deleting an SSO profile cannot be undone.To delete an SSO profile, login to Tyk Cloud, navigate to Profile list and click on the profile you would like to remove.



Manage Accounts and Billing
This section covers the following:- The available Tyk Cloud Plans
- Adding Payment Methods
- How to upgrade from the free trial plan
- Managing Billing Admins on your account
- What to do if your account goes into retirement
Select a Payment Plan
Our plans cover every use case scenario, from a free trial, to a global enterprise ready plan. You can also purchase addons to increase your functionality. For details on our available plans and pricing go to Tyk Cloud Pricing. Here’s an overview of all of the available plans:Plan | Who’s it for? | About |
---|---|---|
48 hours free trial | This is for POC’s and those testing the Tyk platform. | Tyk Cloud has 48 hours free trial. You can always request a longer trial period or talk to support if you need help. |
Starter | For single teams with low traffic, mostly small businesses that manage few APIs. | This plan includes all of the features of the Tyk Stack. You can have custom domains and plugins, along with management of upto 5 APIs. Standard support is provided. |
Launch | For single teams with low traffic, mostly small businesses. | This plan includes all of the features of the Tyk Stack. You can have custom domains and plugins along with management of unlimited APIs. Standard support is provided. |
Grow | For single teams with high traffic. | This plan includes all of the features of the Tyk Stack. In this plan, you have Hybrid Gateways as an add on, along with standard support. |
Scale | For global organizations with multiple teams, requiring gateway deployments in multiple locations. | This plan includes all of the features of the Tyk Stack. Enhanced(silver) support will be provided. |
- Additional Control Planes
- Additional Cloud Data Planes
- Additional Users
- Additional Teams
- Additional Gateway Region (Enterprise Plans only)
- SLA support (varies according to your plan)
Launch | Entitlement $1,800 | Overage 1 $2,700 | Overage 2 $3,240 | Overage 3 $3,780 | Overage 4 $4,320 |
---|---|---|---|---|---|
Calls (at 10kb) | 15m | 18.75m | 22.5m | 26.5m | 30m |
Throughput | 150GB | 187.5GB | 225GB | 262.5GB | 300GB |
Grow | Entitlement $3,800 | Overage 1 $5,700 | Overage 2 $6,840 | Overage 3 $7,980 | Overage 4 $9,120 |
---|---|---|---|---|---|
Calls (at 10kb) | 100m | 125m | 150m | 175m | 200m |
Throughput | 1TB | 1.25TB | 1.5TB | 1.75TB | 2TB |
Scale | Entitlement $6,800 | Overage 1 $10,200 | Overage 2 $12,240 | Overage 3 $14,280 | Overage 4 $16,320 |
---|---|---|---|---|---|
Calls (at 10kb) | 1b | 1.25b | 1.5b | 1.75b | 2tb |
Throughput | 10TB | 12.5TB | 15TB | 17.5TB | 20TB |
Checking the Tyk Cloud status
If you want to check if there are issues with the environments and any upcoming down times, you can go to the Tyk Status page.Add Payment Methods
This section provides a step-by-step guide on how to add a payment method to your Tyk Cloud account, ensuring uninterrupted access to your API management services. Adding a payment method to your account Note: You must have Billing Admin user rights to add a payment method. Follow these steps:- Ensure you are logged in to Tyk Cloud UI as a Billing Admin user.
- Navigate to ACCOUNT & BILLING —> Payment Method. If you lack the necessary user rights, you will be directed to the main OPERATIONS screen (the main login page).
- Enter your card details and click Save.
-
You’ll see a confirmation that the payment method was successfully added.
Note about card paymentsCurrently, Tyk Cloud exclusively supports card payments. For alternative payment methods, please contact us.
Upgrade Your Free Trial
This section explains how you can upgrade your free trial of Tyk Cloud to a full account, to continue enjoying the benefits of Tyk Cloud. My free trial is coming to an end. What are my options? Every new Tyk Cloud account is assigned to a 48 hour free trial. You have the following options:- Upgrade to a paid plan at any stage of the free trial period.
- Use the free trial period and upgrade after it expires
- Add a payment method to your organization
- Select a new plan from our list
Managing Billing Admin
This page explains what a Tyk Cloud billing admin can do as part of your API management process, giving you complete control over your API management. As a Billing Admin you can perform the following:- Add, edit and delete payment methods
- Add further users as Billing Admins
- Upgrade or downgrade plans
Adding a new Billing Admin
To be added as a Billing Admin, a user cannot have an existing Tyk Cloud account.
- Be an existing Billing Admin
- Be the account creator Organization Admin (this user also has the Billing Admin role assigned to them)
- Select Account & Billing from the Admin menu (if you only have Billing Admin permissions you will automatically be logged into the Account and Billing area).

- Select Billing Admins from the Accounts & Billing menu

- Click Invite Billing Admin

- Complete the Billing Admin form and click Send Invite
Removing Billing Admin Access
For this release, removing a billing Admin is not allowed. We can remove a Billing Admin manually, so contact your Account Manager if you need to remove a Billing Admin user.Retire Your Account
This section explains what it means when your Tyk Cloud account goes into retirement and what your options are when it does, from account reinstatement to closure. Your plan will go into retirement in the following scenarios:- Your subscription is manually canceled by a Billing Admin.
- Your periodic subscription payment fails.
- You are on a Free Trial (5 weeks) and have not signed up to a plan before the expiration of the Free Trial.
- Renew a subscription that was manually canceled.
- Update your payment details and any outstanding payments are cleared.
- Update a Free Trial to a paid plan, and payment is successful.
Configure Developer Portal from Dashboard
After deploying your Control Plane, you need to perform some initial configuration for the Developer Portal to prevent seeing anyPage Not Found
errors when trying to access the portal. You need to set up a Home page from the Control Plane Dashboard.
Watch our video on configuring your Tyk Cloud Developer Portal.
- From the Control Plane Dashboard, select Pages from the Portal Management menu
- Click Add Page

- In the Settings, give your page a name and slug. Below we’ve called it Home
- Select Check to make this page the Home page
- Select Default Home page template from the Page type drop-down list
- You can leave the Registered Fields sections for now

- Click Save.

Further Portal Configuration
Our Developer Portal is completely customizable. See Portal Customization for more details.Configure Custom Domains
You can set up Tyk Cloud to use a custom domain. Using custom domains is available on our free trial and all our paid plans. You can use a custom domain for both your Control Planes and Cloud Data Planes.noteWild cards are not supported by Tyk Cloud in custom domain certificates
Custom Domains with Control Planes
- Currently, you can only use one custom domain per Control Plane deployment.
- The custom domain in this case ties to a Tyk Developer Portal. Please set up a CNAME DNS record such that it points to the “Portal” ingress as displayed on your Control Plane deployment page.
Custom Domains with Cloud Data Planes
You can set multiple custom domains on a Cloud Data Plane. In this instance please set up your CNAME DNS records such that they point to the only ingress displayed on your Cloud Data Plane deployment page. Note: While you can set multiple custom domains for a Cloud Data Plane, a single custom domain cannot be used for multiple Cloud Data Planes.How to set up a Custom Domain
In this example we are going to set up a custom domain calledCloud Data Plane.corp.com
for a Cloud Data Plane deployment.
- Create a CNAME DNS record
edge.corp.com
that points to your Cloud Data Plane ingress (e.g.something-something.aws-euw2.cloud-ara.tyk.io
). - From your Cloud Data Plane deployment, select Edit from the Status drop-down.

- Enter
edge.corp.com
in the Custom Domains field.

- Click Save and Re-deploy.

How our Custom Domain functionality works
When you point your custom domain to your deployment, we use Let’s Encrypt’s HTTP01 ACME challenge type, which verifies ownership by accessing your custom CNAME on your Control Plane or Cloud Data Plane deployment. For example -something-something.aws-euw2.cloud-ara.tyk.io
above.
Configure Plugins
This section explains that you can use plugins with Tyk Cloud and links to details of Python, JSVM and Golang based plugins. Tyk Cloud allows you to take advantage of Tyk’s plugin architecture that allows you to write powerful middleware. For this version of Tyk Cloud, we support the use of Python, JavaScript Middleware and Golang based plugins. For more details, see: Next you’ll set up an Tyk Cloud Control Plane to use a Python Authentication Plugin.Setup Control Plane
This page explains how to set up a control plane with plugins to customize it on Tyk Cloud, so that you can ensure your API management solution is as effective as possible. What do I need to do to use Plugins?
- You need to enable Plugins on a Control Plane and on a Cloud Data Plane.
-
You need to enter Provider details to enable you to store and access your plugins. For this version of Tyk Cloud, we are supporting Amazon AWS S3. If you haven’t got an AWS S3 account, go to https://aws.amazon.com/s3/ and set one up. You will need the following details to configure SW3 within your Control Plane:
- Your AWS Key ID
- Your AWS Secret
- Your AWS Region
For this release of Tyk Cloud, you need to enter your AWS Region manually. You also need to consider that uploading a custom plugin bundle to Tyk Cloud results in a new bucket being created for each bundle uploaded. It also requires that Tyk Cloud has permissions in the form of an AWS IAM policy to have create rights on AWS.
- A policy is an entity that, when attached to an identity or resource, defines their permissions. IAM policies define permissions for an action regardless of the method that you use to perform the operation.
-
We have included a sample IAM policy that you need to create in AWS to allow the plugin bundle to work. For more information on creating IAM policies, see the AWS Documentation.
We recommend you restrict your IAM user as much as possible before sharing the credentials with any 3rd party, including Tyk Cloud. See IAM User Permissions for more details.
Uploading your Bundle
This section walks you through uploading your bundle as part of the process of Python custom authentication on Tyk Cloud, so that you can ensure your API management solution is as effective as possible. How do I upload my bundle file to my Amazon S3 bucket? We are going to use a Tyk CLI tool called mservctl. This acts as a file server for our plugins. You use it to push your plugin bundle to your S3 bucket. Your Tyk Cloud Tyk Gateway will use MServ to retrieve your bundle, instead of connecting directly into S3. Prerequisites- You need to install the mserv binary according to your local environment from the following repo - https://github.com/TykTechnologies/mserv/releases. Linux and MacOS are supported.
- From your Control Plane you need the following settings.

- Your Tyk Cloud Control Plane Ingress File Server Endpoint (1)
- Your File Server API Key (2)
push
command to upload your bundle.zip
file to your bucket.
mservctl settings - Mac
To run mservctl
from your local machine, from the binary directory, run:
mservctl
from your local machine, from the binary directory, run:
You may have to change the CHMOD settings on the binary to make it executable. (
chmod +x <filename>
). On MacOS you may also need to change your security settings to allow the binary to run.- Create a file (we’ll call it
python-demo.mservctl.yaml
) - Copy your Control Plane File Server endpoint URL and use it for your
endpoint
flag. Remember to prepend it withhttps://
. - Copy your File Server API Key and use it for your
token
flag
python-demo.mservctl.yaml
config file should now look like this:
- We are going to use the MacOS binary here, just substitute the binary name for the Linx version if using that OS. Note we have our YAML config file in the same directory as our bundle.zip file. Run the following mserv
push
command:
- You should get confirmation that your middleware has been uploaded to your S3 bucket.
- You will notice that the middleware uploaded has been given an ID. We are going to use that ID with an API that allows you to specify specific middlware. You can also check the contents of the middleware you have just uploaded using the mservctl
list
command. Run:
- You will see the list of middleware you have pushed to your S3 Bucket
- If you use the -f flag with the list command, you will see the functions within your middleware listed:
- As you can see, the 2 middleware hooks specified within your
manifest.json
are returned:
Test Middleware
This section explains how to test out your Python custom authentication on Tyk Cloud, to ensure that it’s working properly. Testing our middleware with an API You now have your middleware uploaded to your S3 bucket. We are now going to create an API from our Control Plane Dashboard and test it via Postman Prerequisites- A Postman API Client from https://www.postman.com/product/api-client/
- Your mserv middleware ID
- The
auth
value token from yourmiddleware.py
code
- From your Control Plane in Tyk Cloud, click the Ingress > Dashboard link

- From the Dashboard screen, click APIs from the System Management menu

- Click Add New API
- From the API Designer, enter the following in the Core Settings tab:
- From the API Settings section, give your API a name. We’ll name this example “test”
- Scroll down to the Authentication section and select Custom authentication (Python, CoProcess and JSVM plugins) from the drop-down menu
- Select the Allow query parameter as well as header option
- From the Advanced Settings tab enter the following:
- In the Plugin Options, enter the Plugin Bundle ID as returned by mservctl. In our example
9c9ecec1-8f98-4c3f-88cd-ca3c27599e6b
- To propagate your API to all your Cloud Data Plane Tyk Gateways connected to your Control Plane, you need to add the tag edge in the API Segment Tags section
- In the Plugin Options, enter the Plugin Bundle ID as returned by mservctl. In our example
- Click Save.
- First, a quick test. Copy the URL of your Cloud Data Plane (Note the “edge” tag in the tags column) and paste it in a browser tab. You should get a 404 page not found error.
- Then add the “test” endpoint to the URL in your browser tab, so in our example
uptight-paddle-gw.usw2.ara.app/test/
. You should now see a 403 “error: “forbidden”. This is because your API has Authentication enabled and you haven’t provided the credentials yet. - Open up your Postman client:
- Paste your Gateway URL with the API appended to the request - (
uptight-paddle-gw.usw2.ara.app/test/
) - Click Send. You’ll see the 403 “error: “forbidden response” again
- In the Headers section in Postman, select Authorization from the Key column. Add some random text in the Value field and click Send. You should again see the 403 error.
- Now replace the random text with the
auth
value from your Python code. In our example47a0c79c427728b3df4af62b9228c8ae
and click Send again. - You should now see the HTTPB in test page
- Paste your Gateway URL with the API appended to the request - (

- As a further test of your plugin, you can add
get
to your API request in Postman. So in our exampleuptight-paddle-gw.usw2.ara.app/test/get
. Click Send. This will return all the get requests, including headers. You should see thex-tyk-request: "something"
which is the post middleware hook you set up in the Python code.

Create a Python Code Bundle
This section demonstrates how to create a Python code bundle as part of the custom authentication process for Tyk Cloud, so that you can ensure your API management solution is as effective as possible. What do I need to do to create my Plugin?- You need to create the Python code bundle on your locally installed Gateway (not an Tyk Cloud Cloud Data Plane stack).
- You will create 2 files, a manifest file (
manifest.json
) and the python file (middleware.py
) - You then create a zipped bundle via our Tyk CLI tool that is built in to your local Gateway instance.
manifest.json
and needs to have the following contents:
File | Description |
---|---|
custom_middleware | contains the middleware settings like the plugin driver you want to use (driver) and the hooks that your plugin will expose. We use the auth_check for this tutorial. For other hooks see here. |
file_list | contains the list of files to be included in the bundle. The CLI tool expects to find these files in the current working directory. |
name | references the name of the function that you implement in your plugin code: MyAuthMiddleware |
middleware.py | an additional file that contains the main implementation of our middleware. |
- You import decorators from the Tyk module that gives us the Hook decorator, and we import Tyk Python API helpers
-
You implement a middleware function and register it as a hook. The input includes the request object, the session object, the API meta data and its specification. The hook checks the authorization header for a specified value. In this tutorial we have called it
Authorization
.
File | Description | |
---|---|---|
MyAuthMiddleware @hook | checks for a value. If it is found it is treated as your authentication token. | |
MyPostMiddleware @hook | adds a header to the request. In this tutorial something |
- You create a bundle to cater for a number of plugins connected to the one API, and using a bundle makes this more manageable.
- To bundle your plugin we run the following command in your working directory where your manifest.json and plugin code is.
- A plugin bundle is a packaged version of the plugin, it may also contain a cryptographic signature of its contents. The -y flag tells the Tyk CLI tool to skip the signing process in order to simplify this tutorial. For more information on the Tyk CLI tool, see here.
- You should now have a
bundle.zip
file in the plugin working directory. - Next you will configure uploading your plugin bundle file to your Amazon S3 bucket.
Add Custom Authentication
This section introduces the process of configuring a custom authentication plugin, so that you can override the default Tyk authentication mechanism with your own authentication logic. What are we going to do? We are going to configure an Tyk Cloud Control Plane to use a custom authentication plugin built in Python. What do I need to configure the Tyk Cloud Control Plane? Here are the requirements:- Firstly you will need a local Tyk Gateway installation that allows you to create your Python plugin bundle. We recommend installing our Self-Managed version on Ubuntu Bionic 18.04.
- Ensure you have a currently stable Python 3.x version installed
- You need install the build tools
apt-get install -y build-essential
- Install our required modules:
Deploy Legacy Hybrid Gateways
tyk-hybrid
chart is deprecated. Please use our Tyk Data Plane helm chart instead.We recommend that all users to migrate to the tyk-data-plane
Chart. Please review the Configuration section of the new helm chart and cross-check with your existing configurations while planning for migration.- Add the Tyk official Helm repo
tyk-helm
to your local Helm repository
- Then create a new namespace that will be hosting the Tyk Gateways
- Get the default values.yaml for configuration
- Configure Tyk Gateway and its connection to Tyk Cloud
values.yaml
file:
gateway.rpc.apiKey
- Tyk Dashboard API Access Credentials of the user created earliergateway.rpc.rpcKey
- Organization IDgateway.rpc.connString
- MDCB connection stringgateway.rpc.group_id
(optional) - if you have multiple data plane (e.g. in different regions), specify the data plane group (string) to which the gateway you are deploying belong. The data planes in the same group share one Redis instance.gateway.sharding.enabled
andgateway.sharding.tags
(optional) - you can enable sharding to selectively load APIs to specific gateways, using tags. By default, sharding is disabled and the gateway will load all APIs.
- Configure the connection to Redis
Please make sure you are installing Redis versions that are supported by Tyk. Please refer to Tyk docs to get list of supported versions.
values.yaml
file:
redis.addrs
: the name of the Redis instance including the port as set by Bitnamityk-redis-master.tyk.svc.cluster.local:6379
redis.pass
: password set in redis ($REDIS_PASSWORD
). Alternatively, you can use —set flag to set it during helm installation. For example--set redis.pass=$REDIS_PASSWORD
.
- Install Hybrid data plane
- Check that the installation was successful
tyk
namespace are running:
gateway-svc-tyk-hybrid
:
Note: you may need to port forward if you’re testing on a local machine, e.g. kubectl port-forward service/gateway-svc-tyk-hybrid -n tyk 8080:443
Tyk Cloud Monitor Metrics
This section explains the various metrics that are monitored by Tyk Cloud.Tyk Cloud Throughput
Tyk Cloud counts the total request/response sizes for traffic transferred through a deployment. Throughput metrics are displayed for the current day. These are calculated as the difference between the throughput usage at the current time and the throughput at last midnight. External traffic is subject to billing, while internal traffic is exempt. The monitoring service aggregates traffic between different services:
- Traffic between user → Control Plane
- Traffic between user → Cloud Data Plane
- Traffic between user → Enterprise Developer Portal
- Traffic between user → Mserv (plugin upload)
- Traffic between Control Plane → Cloud Data Plane cross region
- Traffic between Cloud Data Plane → Mserv cross region
- Traffic between Control Plane → Portal cross region
- Hybrid traffic is currently not counted
- Traffic between Control Plane → Cloud Data Plane in the same region
- Traffic between Cloud Data Plane → Mserv in the same region
- Traffic between Control Plane → Portal in the same region
Tyk Cloud Storage
When a client makes a request to a Tyk Gateway deployment, the details of the request and response are captured and stored in Redis. Tyk Pump processes the records from Redis and forwards them to MongoDB. Finally, Tyk Cloud reads that data from MongoDB and displays its size(bytes) in the Storage section of Monitoring.Tyk Cloud Telemetry
Telemetry in Tyk Cloud enables distributed tracing of your APIs, allowing you to track and analyze how requests flow through your system. This trace data helps you understand request paths, identify bottlenecks, and troubleshoot issues by providing detailed insights into each request’s journey through your API infrastructure. We support distributed tracing forCloud Data Plane
deployments. You can enable it while creating or updating after setting up telemetry.
Since this functionality is powered by Tyk Gateway’s OpenTelemetry integration, we recommend reviewing our comprehensive OpenTelemetry documentation
to understand the underlying architecture, best practices for implementation, and how to maximize the value of distributed tracing in your API infrastructure. The documentation provides detailed insights into configuration options, sampling strategies.
Available Telemetry Providers
Tyk Cloud integrates with these monitoring platforms:- Datadog
- Dynatrace
- New Relic
- Elastic
-
Custom
Before diving into the configuration details, please note that Telemetry is an add-on feature in Tyk Cloud. To enable this capability for your account, please contact our support team. Our team will help you activate this feature and ensure you have access to all the Telemetry options.
Enabling Telemetry in Tyk Cloud
Configuring telemetry in Tyk cloud is a two step process.- Configure a provider/backend at organization level.
-
Enable/Disable telemetry option while creating/updating a
Cloud Data Plane
.Before diving into the configuration details, please note that Telemetry is an add-on feature in Tyk Cloud. To enable this capability for your account, please contact our support team. Our team will help you activate this feature and ensure you have access to all the Telemetry options.
Steps for Configuring Telemetry Provider in Tyk Cloud
-
Choosing Your Provider
In the
Tyk Cloud Console
, selectTelemetry
option. You’ll see a grid displaying all supported backends/providers. Click on your preferred backend/provider to begin the configuration process.Only a single provider/backend can be configured at any given time. -
Configuring Basic Elements
Every telemetry backend shares these fundamental settings:
- Connection Toggle: This switch activates or deactivates your telemetry export. When enabled, Tyk will start sending monitoring data to your chosen platform.
- Sampling Rate: This setting determines what percentage of your API traffic data gets sent to your monitoring platform. The default is 10%, which means Tyk will send data for one out of every ten API calls.
-
Configuring Optional Settings
Beyond the basic settings, you can customize your telemetry with two optional features:
-
Tags to Add to the Traces :
Add custom labels to your telemetry data to make it easier to analyze. For example:
- Fields to Filter : Specify which data fields should be excluded from your telemetry. This is useful for ensuring sensitive information doesn’t get sent to your monitoring platform.
-
Tags to Add to the Traces :
Add custom labels to your telemetry data to make it easier to analyze. For example:
- Configuring Provider-Specific Configuration Each monitoring platform has its own requirements for connection. Let’s explore what you’ll need for each:
Configure Telemetry Export in Cloud Data Plane Deployments
When creating a new Cloud Data Plane deployment or editing an existing one, you can configure telemetry export settings. These settings are specific to Cloud Data Plane deployments only and allow you to monitor API performance through your chosen telemetry provider. When you modify any general telemetry settings in Tyk Cloud, these changes don’t take immediate effect. Your Cloud Data Planes need to be redeployed to activate the new telemetry configuration.
-
Enable Datadog Connection
- Toggle switch to enable/disable Datadog monitoring for this specific Cloud Data Plane deployment
-
Sampling Rate Override
- Choose what percentage of API traffic to monitor (default: 10%)
The sampling level can be configured at both the organization level (while setting up the provider) and theCloud Data Plane
. The configuration at the Cloud Data Plane will override the organization-level settings. -
Verifying Cloud Data Plane Configuration
As shown in the below image, you should observe
Telemetry Export
to be enabled:
Tyk Dashboard Audit Logs
Tyk Cloud provides comprehensive audit logging capabilities to track and monitor all administrative actions performed within your Tyk Dashboard. This feature is essential for compliance and security.What are Audit Logs?
Audit logs capture detailed records of all requests made to endpoints under the/api
route in your Tyk Dashboard. These logs include information about:
- User actions and administrative operations
- API changes and configurations
- Authentication and authorisation events
- System access and modifications
- Response status codes and timestamps
Enabling Audit Logs for Control Plane Deployments
The audit log feature is available for Control Plane versions v5.7.0 or later.
How to Enable Audit Logging
- Contact Your Account Manager: Audit logging must be enabled at the subscription level. Reach out to your Tyk account manager to add this feature to your plan.
-
Enable via Tyk Cloud UI: Once the feature is available in your subscription, you can enable audit logging directly from the Tyk Cloud console:
- Navigate to your Control Plane deployment
- Select Edit from the deployment options
- Enable the Audit Logging option
- Save and redeploy your Control Plane
Viewing and Accessing Audit Logs
Once audit logging is enabled, you can retrieve the logs via the Tyk Dashboard API. For details on the API endpoints and usage, see Retrieving Audit Logs via API.Storage Size Caps
Tyk Cloud enforces audit log storage size caps based on your subscription terms:- Storage Limits: A size cap is applied to audit logs based on your subscription plan
- Automatic Cleanup: When the storage limit is reached, the oldest logs are automatically removed to make space for new entries.
Tyk Cloud MDCB Supported versions
This section lists the supported MDCB version for hybrid setupDashboard | Gateway | MDCB |
---|---|---|
v5.2.0 | v5.2.0 | v2.4.0 |
v5.1.2 | v5.1.2 | v2.3.0 |
v5.1.1 | v5.1.1 | v2.3.0 |
v5.1.0 | v5.1.0 | v2.3.0 |
v5.0.5 | v5.0.5 | v2.2.0 |
v5.0.4 | v5.0.4 | v2.2.0 |
v5.0.3 | v5.0.3 | v2.2.0 |
v5.0.2 | v5.0.2 | v2.2.0 |
v5.0.1 | v5.0.1 | v2.1.1 |
v5.0.0 | v5.0.0 | v2.1.1 |
v4.3.3 | v4.3.3 | v2.1.0 |
v4.3.2 | v4.3.2 | v2.0.4 |
v4.3.1 | v4.3.1 | v2.0.4 |
v4.3.0 | v4.3.0 | v2.0.4 |
v4.2.4 | v4.2.4 | v2.0.3 |
v4.2.3 | v4.2.3 | v2.0.3 |
v4.0.10 | v4.0.10 | v2.0.4 |
v4.0.9 | v4.0.9 | v2.0.3 |
v4.0.8 | v4.0.8 | v2.0.3 |
v3.2.3 | v3.2.3 | v1.8.1 |
v3.0.9 | v3.0.9 | v1.7.11 |
Track Usage
How to check metrics
Login to Tyk Cloud and click on Monitoring within the Operations menu. Enable Throughput to display throughput metrics.



Troubleshooting Tyk Cloud
FAQs
Q1: Is a Cloud Data Plane Deployment considered highly available? Do I need to deploy multiple Cloud Data Planes to a single Data Center? A: On a Production plan and higher there are at least two Gateway instances at all times, usually in different availability zones within a single region (in cloud provider terms). Q2: What are the performance benchmarks of a single Cloud Data Plane? A: In Phase 2 we plan to allow users to choose from a pool of “runtimes” that provide different performance targets, so they’ll be able to have a Tyk Cloud environment with Cloud Data Planes that can sustain more load and then another environment (e.g. for testing) that sustains less. Q3: How can I geo-load balance across multiple Cloud Data Planes? Why should I want to? A: The use case to deploy multiple Cloud Data Planes is either segregating regional traffic and/or segregating APIs. This doesn’t necessarily concern High Availability. The number of actual Gateway instances within a single Cloud Data Plane deployment varies, auto-scales and load balances depending on the plan. If you deploy several Cloud Data Planes and want to use it to e.g. geo-load balance it’s currently your responsibility to put such a system into place, but we have plans to help with this in later phases. Q4: What instance sizes/VMs does a Gateway run on? A: You won’t need to worry. We abstract all the resources and only provide performance “targets”. See Q2. Q5: Can I connect my own Hybrid Gateways? A: Yes. The MDCB Ingress URL is given in the Control Plane details page, which allows for connecting a Hybrid Gateway. Q6: Can we use SSO in the Dashboard and/or Portal? A: Yes, as of v3.0.0, TIB is integrated into Tyk Dashboard, meaning that once a Control Plane is deployed, a user can go into the Identity Management section of Tyk Dashboard and setup SSO with their IdP for both the Dashboard and Developer Portal. Q7: How do I view Gateway/Dashboard logs for troubleshooting? A: This will be exposed in later phases per deployment. Q8: How do Segment tags work with Tyk Cloud? A: When a Cloud Data Plane is deployed, the tag ‘edge’ and a location tag are automatically generated for the Cloud Data Plane. You use these tags to connect your API to the appropriate Cloud Data Plane. It works as follows:- Add the edge tag to your API to connect it to all Cloud Data Planes within the Control Plane.
- Add the location tag to your API to connect it to only Cloud Data Planes with that location within the Control Plane.
You must add one of the above tags to any API you add to your Control Plane Dashboard.