Deploy advanced HTTP traffic shaping with request variables and CEL
You’ve developed a read-only API and delivered it to production. Congratulations! But you notice that your upstream service is getting hammered by requests with POST
, PUT
, and DELETE
methods, each of which returns a 501 Not Implemented
error in response.
These requests aren’t harmful, but they also put an unnecessary load on your API service. Why not just block them at your first opportunity?
---
on_http_request:
- name: "Reject all non-GET requests"
expressions:
- "req.method != 'GET'"
actions:
- type: "deny"
config:
status_code: 404
In this example of ngrok’s Traffic Policy module, you conditionally shape when and in what fashion HTTP traffic passes to and from your API—or device, service, database, and more, depending on what you’ve deployed. ngrok evaluates the rule against every request and denies any that evaluates to true
(such as a request with the POST
method) with a nondescript 404
response code.
You’ve successfully blocked the cruft from your API service entirely with just a few LOCs, a single expression written in Common Expression Language (CEL), and just one item—among dozens—of ngrok’s powerful new library of request variables.
What are these new request variables for?
Like connection variables, request variables are recent additions to Traffic Policy and open up novel use cases for ngrok that weren't possible before. By giving you access to details like headers, cookies, trailers, and the target URL, you can filter, take action on, and ultimately shape the way HTTP traffic hits your upstream service. Let's break down those opportunities, starting with some raw request data that passes through ngrok with every request.
GET /random HTTP/2
X-Forwarded-For: 174.73.243.140
X-Forwarded-Host: foo.example.com
X-Forwarded-Proto: https
Accept: */*
User-Agent: curl/8.7.1
The first line contains the essentials:
GET
: The HTTP method, which defines the type of operation the user wishes to perform. With thereq.method
request variable, you can also see methods likePOST
to create new data orDELETE
to remove a specified document./random
: The path this HTTP request is attempting to access, which you can find in numerous variables likereq.url.path
orreq.url.raw_path
.HTTP/2
: The version of the HTTP protocol used in this request, represented inreq.version
.
The additional five lines are all optional headers that ngrok injects into the request before proxying it to an ngrok agent and the upstream service, app, or API. You can access these as a whole with req.cookies
, or get values from specific cookies with req.cookies[k][i].value
.
You can use request variables in two ways. First, you can include them in CEL expressions, like "req.method == 'POST' || req.method == 'PUT'"
, which evaluate to true/false
whether or not a given request uses the POST
or PUT
method. Second, you can interpolate them into Traffic Policy actions, such as custom responses, adding headers, and logging, for additional flexibility and context-awareness. While you might assume request variables are only usable with rules in the inbound
map, you can also interpolate request variables into your outbound
rules, which apply to the associated response.
Based on ongoing conversations with users, we see a few request variables rise to the top:
req.content_type
: The media type as specified in theContent-Type
header, such asapplication/json
.req.method
: The HTTP method associated with the request.req.user_agent
: An identifier of the application, OS, and vendor that’s attempting to access your endpoint.req.url.uri
: The full path of the requested URL plus any query strings.req.cookies[k][i].value
: The value of a cookie as specified byk
, likesessionId
.
As you can probably tell by now, we’ve organized them into the req namespace to help you find the appropriate request variables in our documentation and utilize them quickly.
One last reminder before you start shaping away: Unlike their connection-based siblings, request variables are only available with HTTP tunnels.
Use cases and examples of request variables in shaping HTTP traffic
Let’s dig into some examples to show you the many-faceted ways you can quickly implement request variables to unlock powerful HTTP traffic shaping strategies.
Protect your services from massive uploads
Any app or API that accepts user input must validate it before processing and storage, but in many cases, you can’t rely on client-side validation as a guarantee you’re not about to receive an unwanted payload. For example, your JavaScript app can apply some validation on file uploads on the client, but your user could also disable JavaScript and fire away. An API endpoint has even less upfront protection.
---
on_http_request:
- name: "Block POST/PUT requests of excessive length"
expressions:
- "req.method == 'POST' || req.method == 'PUT'"
- "req.content_length >= 10000000"
actions:
- type: "custom-response"
config:
status_code: 400
content: "Error: The size of your upload exceeds our maximum of 10 megabytes."
If both expressions return true
, in that a user tries to POST/PUT
a request of more than 10 megabytes, ngrok will block the request from reaching your service and send back an informative error message.
Create ‘pretty’ URLs for better UX and SEO
Many content management systems use URLs with query strings and other implementation-level details to help instruct the application how to respond and with which data. For example, Wordpress’ plain permalink option creates URLs like https://example.com/blog/index.php?p=123&title=your-title
, is rather unintuitive for the typical end user.
Instead, you should map these URLs using regular expressions and URL rewrites to “prettier” alternatives. You’ll make both your user and Google’s ranking algorithm happy, and you get the added bonus of hiding an important implementation detail from prying eyes.
---
on_http_request:
- name: "Rewrite ugly URLs on the /blog/ path"
expressions:
- "req.url.path.startsWith('/blog')"
actions:
- type: "url-rewrite"
config:
from: "/blog/([0-9]+)/([a-zA-Z]+)/"
to: "/blog/index.php?p=$1&title=$2"
This rule filters all requests using the req.url.path
request variable, which applies to all “pretty” URLs, like https://example.com/blog/123/your-title/
. The rule then uses regular expressions to capture the necessary information to build a new URL, including query strings, and perform the mapping via a rewrite. Your backend understands how to respond and the user doesn’t even know the URL changed in the first place.
Not sure whether a rewrite or redirect is the right option for your use case? We have a blog for that.
Deploy A/B tests
Update: This use case has become far more stable with two new CEL macros:—rand.double()
andrand.int()
—and the combination of internal and public endpoints.
The easiest way to create an A/B test is to have two upstream services running different versions. That allows you to direct traffic to service A
or service B
without having to manipulate your app/API directly to add some routing or other business logic.
When you have your two services running, use ngrok to create separate internal endpoints, like https://a.internal
and https://b.internal
.
On your public endpoint, apply the following Traffic Policy, which routes traffic to one or the other based on a randomly generated number between 0
and 1
.
---
on_http_request:
- expressions:
- "rand.double() >= 0.5"
actions:
- type: "forward-internal"
config:
url: https://b.internal
- actions:
- type: "forward-internal"
config:
url: https://a.internal
Hit your endpoint a few times and you'll see different results based on A vs. B!
And now, back to the previous "hacky" version:
Let’s say you’re preparing to release a new major version of your app or API and want to see how it performs against your current baseline. With Traffic Policy, you can set up a rudimentary A/B test that splits requests between the current site and testing deployment at example.com/v2/, while retaining all existing URLs.
---
on_http_request:
- expressions:
- "timestamp(req.ts.header_received).getMilliseconds() <= 500"
actions:
- type: "url-rewrite"
config:
from: "/?([.*]+)?"
to: "/v2/$1"
The “magic” of this policy is in the use of the CEL macro timestamp(req.ts.header_received).getMilliseconds()
, which returns the millisecond value at which ngrok receives the header of a given request. Because that value will be between 0
and 999
, it evaluates based on whether the millisecond value is greater than or equal to 500
, providing a rough degree of randomness. If you’d like to change the weighting between A and B, so that B receives only 30% of incoming requests, you can change the value to 300
.
Deny requests without specific headers and return a custom Problem Details response
Finally, let’s look at how you can filter HTTP traffic based on the content of request headers and provide a better UX. While standard HTTP codes can inform users of why a particular request fails, you can take your error handling a step further by complying with the Problem Details for HTTP APIs spec, which helps you create helpful client error responses in cases where a simple 400
doesn’t tell the full story.
---
on_http_request:
- expressions:
- "!('api-version' in req.headers)"
actions:
- type: custom-response
config:
status_code: 400
content: >
{
"type":"https://example.com/docs/errors/version/",
"title":"Unspecified API version.",
"detail":"You did not specify an API version in your request. The current available versions are `v2` and `v3`. To set the version, add the following header to your request: `api-version:v2` or `api-version-v3`.",
"instance":"${req.url.path}"
}
headers:
content-type: "application/json"
In this example, you check whether a user explicitly specifies the api-version header. If they fail to do so, then you return a helpful error response that points them to relevant documentation and specific steps they can take to fix the issue and get back to working with your API.
What shapes will you create with request variables?
To get started filtering and taking action on HTTP traffic with all these new request variables, sign up for a free ngrok account.
From there, check out the greatest hits compilation of resources on Traffic Policy as a whole:
- Introducing ngrok's Traffic Policy module
- Traffic Policy Engine now supports dynamic configuration with CEL Interpolation
- Developer's guide: Manage traffic with CEL expressions and connection variables
- HTTP Traffic Policy Rule Gallery
If you can’t intuit exactly which request variables would be useful for you right away, let’s visualize request variables another way. When a request reaches your ngrok endpoint, even for the most basic of “tortoise facts” APIs, it contains far more than a target URL and client IP address—and ngrok even adds more context along the way. Your Traffic Inspector dashboard puts all this data into a nicely designed and human-readable format.
As you can imagine, once you understand what new request variables are available to you with every inbound
and outbound
connection, you can use it for far more interesting solutions than logs.
Thoughts or requests on how you’d like request variables and policies to work? Trying to write a particularly obscure policy and can’t quite get the CEL syntax right? Why not reserve your spot in the next edition of ngrok’s Office Hours? Join our DevEd and Product teams to demo common solutions, learn about endpoints and tunnels together, and answer your burning questions live.