This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Application Service

It can easily manage and monitor APIs for application linkage, and efficiently integrate management of corporate assets such as data, software, and applications.

1 - API Gateway

1.1 - Overview

Service Overview

API Gateway is a service that easily creates, manages, and monitors APIs. It defines resources and methods related to APIs in a consistent manner, and can apply built-in security access. Additionally, it can easily and conveniently monitor API usage status and performance metrics.

Features

  • Convenient API Management: Through the console, you can conveniently register and manage APIs, and provide JWT (Json Web Token) for access permission management. It is also linked with SCP Cloud Functions, allowing Cloud Functions function calls via API Gateway.
  • Stable Traffic Handling: API Gateway can manage backend system traffic through usage plans. Usage plans can set the maximum number of calls per hour (hour/day/month), and this prevents excessive traffic from entering, enabling stable service usage.
  • Easy and convenient monitoring: Provides a dashboard that allows you to manage various functions such as API version management that links different deployment versions per stage, and to monitor API usage status. Through this, you can easily and quickly identify performance metrics such as API calls, response times, and error counts.

Service Architecture Diagram

Diagram
Figure. API Gateway Diagram
  • The developer (3rd party Developer) can access various backend services via a single endpoint (API Gateway) using Rest API.
  • API Gateway can route the request to an appropriate backend service or Cloud Function.
  • If authentication and authorization are required, the user is verified with JWT.
  • Request data is transformed as needed, or responses from multiple services are aggregated into one through the API Gateway.
  • When traffic is high, you can apply load balancing and rate limiting to improve service stability.
  • Supports web clients to call APIs from other domains through CORS settings.
  • All requests and responses are logged and monitored in the API Gateway service, allowing rapid detection of failures and anomalies.
  • By separating stages for each environment such as development, testing, and production, you can manage API versions and utilize the required version. API management, security policy application, etc., can be handled consistently centrally through the API Gateway service.

Provided Features

API Gateway provides the following features.

  • API Management and Operations

    • Custom Domain Name: Connect a custom domain to the API to provide a unique URL for the user
    • REST API creation and management: Define resources and methods (GET, POST, etc.) and set authentication method
    • API version and stage management: Operate the same API in multiple versions simultaneously and manage changes
    • Routing: Routing requests to various backend services based on the URI path or request headers
    • Monitoring and Logging: API performance monitoring and logging possible (available December 2025)
  • API security

    • IP ACL setting: Control to allow only specific IPs to access, enhancing security
  • Cloud Functions integration: Execute business logic in response to external requests by integrating with serverless computing

    • CORS support: Set Cross-Origin Resource Sharing (CORS) to allow resource access from other domains

Components

API

An API is a collection of resources and methods integrated with backend HTTP endpoints, Cloud Functions, or other SCP services. APIs provide a logical interface to the actual service and are deployed across multiple stages, allowing use in various environments (development, production, etc.).

Resources

Resources are logical units that represent specific endpoints (URI paths) within an API. Each resource can be organized in a tree structure and can have multiple HTTP methods. For example, paths such as /users , /orders become individual resources.

Method

The method defines the HTTP actions (e.g., GET, POST, PUT, DELETE, etc.) that can be performed on each resource. Each method is integrated with a specific backend to process actual data or execute functionality.

Stage

The stage is a named reference to a specific point in time (snapshot) of an API deployment, distinguishing environments in the API lifecycle such as development (dev), testing (test), and production (prod). Each stage has its own unique URL, and separate settings per environment are possible for caching, logging, throttling, stage variables, etc. Stages support various operational scenarios such as environment-specific configurations and traffic segregation.

Endpoint

The endpoint is a unique URL address used by the client to access the API. A separate endpoint is created for each stage.

Integration

Integration defines how API methods connect to the actual backend (HTTP endpoints, Functions). Through request and response data transformation, authentication, mapping templates, etc., you can finely control the integration with the backend.

JWT (Json Web Token)

It is a token-based web standard (RFC 7519) used for authentication and authorization. JWT encodes a JSON object composed of three parts (Header, Payload, Signature) in Base64 URL-safe format, and prevents tampering by digitally signing with a secret key or public key. When securely exchanging authentication information and permissions between a server and client, or between services, it is used by placing them in the HTTP header, allowing stateless authentication without session storage.

CORS (Cross-Origin Resource Sharing)

It is a mechanism that bypasses the Same-Origin Policy applied in web browsers for security reasons, allowing resource sharing between servers of different origins (when protocol, domain, or port differ). The server specifies which origins’ requests are allowed through HTTP response headers (e.g., Access-Control-Allow-Origin, etc.), enabling the client (browser) to safely perform cross-origin requests. If CORS is not properly configured, the browser blocks requests for resources from other origins, which is a web standard security policy that must be considered when using various resources such as external API calls, fonts, images, and videos.

Regional Provision Status

API Gateway can be provided in the environments below.

RegionAvailability
Korea West 1 (kr-west1)Provided
Korea East1 (kr-east1)Provided
South Korea 1(kr-south1)Not provided
South Korea 2(kr-south2)Not provided
South Korea 3(kr-south3)Not provided
Table. API Gateway Regional Availability

Preliminary Service

This is a list of services that can be optionally configured before creating the service. Please refer to the guide provided for each service for details and prepare in advance. ​

Service CategoryServiceDetailed Description
ComputeCloud FunctionsA service that runs application code in a serverless computing environment
  • When you connect a Cloud Functions function as the integration target of an endpoint in API Gateway, the client’s HTTP request is passed to the function and you can receive the execution result. This allows you to easily implement an API backend in a serverless manner.
Table. API Gateway Pre-service

1.2 - How-to guides

Users can create the API Gateway service by entering required information through the Samsung Cloud Platform Console and selecting detailed options.

Creating an API

An API is a collection of resources and methods integrated with backend HTTP endpoints, Cloud Functions, or other SCP services. An API provides a logical interface to the actual service and can be deployed to multiple stages for use in different environments (development, production, etc.).

You can create and use APIs through the Samsung Cloud Platform Console.

To create an API, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the Create API button on the Service Home page. This will take you to the Create API page.

  3. Enter the required information for creating the service and select detailed options on the Create API page.

    • Select the required information in the Service Information section.
      Item
      Required
      Description
      API NameRequiredEnter API name
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
      API Creation MethodRequiredSelect API creation method
      • Select from Create New, Clone Existing API
      API to CloneRequiredWhen selecting Clone Existing API as the API creation method, select from already created APIs
      DescriptionOptionalEnter additional information or description about the API within 50 characters
      API Endpoint TypeRequiredPath to access the API
      • Region: Process requests within the region where the API is deployed
      • Private: Expose to receive API requests privately from other VPCs
        • When Private is selected, JWT activation is applied
      Table. API service information input items
    • Enter or select the required information in the Additional Information section.
      Item
      Required
      Description
      TagsOptionalAdd tags
      • Click the Add Tag button to create and add a new tag or add an existing tag
      • Up to 50 tags can be added
      • Newly added tags are applied after service creation is complete
      Table. API additional information input items
  4. Review the detailed information and estimated charges in the Summary panel, then click the Complete button.

    • Once creation is complete, verify the created resource on the API List page.

Viewing API Details

You can view and modify the complete resource list and detailed information of API services. The API Details page consists of Details, Tags, and Operation History tabs.

To view detailed information of an API service, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API menu on the Service Home page. This will take you to the API List page.
  3. Click the resource for which you want to view detailed information on the API List page. This will take you to the API Details page.
    • The API Details page displays status information and additional feature information, and consists of Details, Tags, and Operation History tabs.
      ItemDescription
      Status DisplayStatus of the API created by the user
      • Creating: API being created
      • Active: API operating normally
      • Deleting: API being deleted
      • Error: Service unavailable due to API internal error
      Service TerminationButton to terminate the service
      Table. API status information and additional features

Details

On the API Details page, you can view detailed information of the selected resource and modify information if necessary.

ItemDescription
ServiceService name
Resource TypeResource type
SRNUnique resource ID in Samsung Cloud Platform
Resource NameResource name
Resource IDUnique resource ID in the service
CreatorUser who created the service
Creation DateDate and time when the service was created
ModifierUser who modified the service information
Modification DateDate and time when the service information was modified
API NameAPI name
API Endpoint TypeAPI endpoint type
DNS StatusDNS status
  • Displays Creating, Active, Inactive, Error
DescriptionAdditional information or description about the API
Table. API details tab items

Connection Management

On the Connection Management page, you can manage connection requests for PrivateLink Service for API Gateway.

ItemDescription
Request Endpoint IDRequested endpoint ID
Creation DateDate and time when the service was created
StatusResource status value
RejectReject PrivateLink Service connection request
ApproveApprove PrivateLink Service connection request
BlockBlock connected PrivateLink Endpoint
ReconnectReconnect blocked PrivateLink Endpoint
Table. API connection management tab items
Note
  • If the connection status is Rejected or Error, requests such as approval/rejection are not possible.

Tags

On the API Details page, you can view tag information of the selected resource, and add, modify, or delete tags.

ItemDescription
Tag ListTag list
  • Can view Key, Value information of tags
  • Up to 50 tags can be added per resource
  • When entering tags, search and select from existing Key and Value lists
Table. API tag tab detailed information items

Operation History

On the API Details page, you can view the operation history of the selected resource.

ItemDescription
Operation History ListResource change history
  • Can view operation details, operation date/time, resource type, resource name, operation result, operator information
  • Click the corresponding resource in the Operation History List list. The Operation History Details popup window opens.
  • Provides detailed search functionality through the Detailed Search button
Table. API operation history tab detailed information items

Integrating with PrivateLink Service

By integrating API Gateway service with PrivateLink service, you can connect ‘API Gateway and VPC’ or ‘API Gateway and other SCP services’ without external internet. Data uses only the internal network, providing high security, and no public IP, NAT, VPN, or internet gateway is required.

When creating an API, select the endpoint type as Private. You can expose the API to be accessed privately from other VPCs or services.

Note

You can create an entry point to access other PrivateLinks in API Gateway service.

To create a PrivateLink Endpoint, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the PrivateLink Endpoint menu on the Service Home page. This will take you to the PrivateLink Endpoint List page.

  3. Click the Create PrivateLink Endpoint button on the PrivateLink Endpoint List page. This will take you to the Create PrivateLink Endpoint page.

    • Enter or select the required information.
      Item
      Required
      Description
      PrivateLink Endpoint NameRequiredEnter PrivateLink Endpoint name
      • Enter 3 ~ 20 characters using English letters and numbers
      DescriptionOptionalEnter additional information or description within 50 characters
      PrivateLink Service IDRequiredEnter the ID of the PrivateLink Service to connect
      • Check the Service ID with the PrivateLink Service provider in advance, and after creating the Endpoint, provide the Endpoint ID to the provider
      • Enter 3 ~ 60 characters using English letters and numbers
      Table. PrivateLink Endpoint creation information input items
  4. When information entry and selection is complete, click the Confirm button.

  5. Check the message in the notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the PrivateLink Endpoint list.
    • To delete a PrivateLink Endpoint, select the resource to delete from the list and click the Delete button.
Note
  • To request a connection to a service provider through PrivateLink, you must go through an approval process.
  • When applying for a service connection, you must check the PrivateLink Service ID to be connected in advance.
    • Usage agreement with the service provider must be completed before applying for the service.
  • After the user creates a PrivateLink Endpoint, they must provide the Endpoint ID to the service provider. The service provider can check the user’s Endpoint ID and proceed with usage approval quickly.

You can view and modify the complete resource list and detailed information of PrivateLink Endpoint. The PrivateLink Endpoint Details page consists of Details and Operation History tabs.

To view detailed information of an API service, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the PrivateLink Endpoint menu on the Service Home page. This will take you to the PrivateLink Endpoint List page.
  3. Click the resource for which you want to view detailed information on the PrivateLink Endpoint List page. This will take you to the PrivateLink Endpoint Details page.
    • The PrivateLink Endpoint Details page displays status information and additional feature information, and consists of Details and Operation History tabs.
      ItemDescription
      Status DisplayStatus of PrivateLink Endpoint
      • Requesting: Connection request/approval pending, Cancel Request button displayed
      • Active: Creation complete, operating
      • Creating: Being created
      • Deleting: Being deleted
      • Disconnected: Connection blocked
      • Rejected: Connection rejected, Request Approval Again button displayed
      • Error: Error occurred
      • Canceled: Connection request canceled, Request Approval Again button displayed
      Cancel RequestRequest connection cancellation
      Request Approval AgainRequest connection again when connection request is in canceled status
      Table. PrivateLink Endpoint status information and additional features

Details

On the PrivateLink Endpoint Details page, you can view detailed information of the selected resource.

ItemDescription
ServiceService name
Resource TypeResource type
SRNUnique resource ID in Samsung Cloud Platform
Resource NameResource name
Resource IDUnique resource ID in the service
CreatorUser who created the service
Creation DateDate and time when the service was created
ModifierUser who modified the service information
Modification DateDate and time when the service information was modified
PrivateLink Endpoint NamePrivateLink Endpoint name
PrivateLink Endpoint IDPrivateLink Endpoint ID
PrivateLink Service IDConnected PrivateLink Service ID
API Endpoint TypeAPI endpoint type
DescriptionAdditional information or description about the PrivateLink Endpoint
Table. PrivateLink Endpoint details tab items

Operation History

On the PrivateLink Endpoint Details page, you can view the operation history of the selected resource.

ItemDescription
Operation History ListResource change history
  • Can view operation details, operation date/time, resource type, resource name, operation result, operator information
  • Click the corresponding resource in the Operation History List list. The Operation History Details popup window opens.
  • Provides detailed search functionality through the Detailed Search button
Table. PrivateLink Endpoint operation history tab detailed information items

Creating a Resource

A resource is a logical unit representing a specific endpoint (URI path) within an API. Each resource can be organized in a tree structure and can have multiple HTTP methods.

To create a resource, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Resource menu on the Service Home page. This will take you to the Resource page.

  3. Click the Create Resource button on the Resource page. This will take you to the Create Resource popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      Resource NameRequiredEnter resource name
      • Start with lowercase English letters and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-{})
      • When using braces, only the format {character} is allowed and cannot be empty
      Resource PathRequiredSelect the path selected from the resource menu tree
      Table. Resource creation information input items
  4. When information entry and selection is complete, click the Confirm button.

  5. Check the message in the notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the resource list.
    • To delete a resource, select the resource to delete from the list and click the Delete button.
Note
  • Up to 300 resources can be created.
  • The depth of resources is up to 30 including Root.

Creating a Method

A method defines HTTP actions (e.g., GET, POST, PUT, DELETE, etc.) that can be performed on each resource. Each method is integrated with a specific backend to process actual data or execute functions.

To create a method, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Resource menu on the Service Home page. This will take you to the Resource page.

  3. Click the Create Method button on the Resource page. This will take you to the Create Method popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      Method TypeRequiredSelect method type
      • Already created values are not displayed in the list.
      • When ANY is selected, all types of methods are created
      Integration TypeRequiredSelect endpoint type
      • Select from HTTP, Cloud Function, PrivateLink
      Endpoint URLRequiredEnter endpoint URL when selecting HTTP type
      • An endpoint is a unique URL used by clients to access the API. Separate endpoints are created for each stage. Various types such as Regional, Edge-Optimized, Private, etc.
      • Must be a valid URL starting with http:// or https://, and enter within 500 characters using English letters and special characters ($-_.+!*’:(){}/)
      EndpointRequiredSelect endpoint when selecting Cloud Function type
      • Region is provided as the current region and cannot be changed
      URL Query String ParametersOptionalCheck Use and then enter Name
      • Enter using English letters, numbers, and special characters (_)
      HTTP Request HeadersOptionalCheck Use and then enter Name
      • Enter using English letters, numbers, and special characters (-)
      API Key UsageOptionalCheck Use to limit usage through usage policy
      Table. Method creation information input items
  4. When information entry and selection is complete, click the Save button.

  5. Check the message in the notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the method list.
    • To delete a method, select the resource to delete from the list and click the Delete button.
Note

Methods can be created up to 7, one of each type. When created as Any, all types of methods are created.

ItemDescription
ServiceService name
GETRetrieve (read) resource
POSTCreate (register) resource
PUTModify (update) entire resource
PATCHPartially modify only part of resource
DELETEDelete resource
OPTIONSRetrieve list of HTTP methods supported by the endpoint
HEADRetrieve only headers without body (return only metadata without response body)
Table. Method types

Deploying an API

To reflect an API under development to the actual service environment, API deployment is required.

To deploy a created API, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Resource menu on the Service Home page. This will take you to the Resource page.

  3. Click the Deploy API button on the Resource page. This will take you to the Deploy API popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      StageRequiredSelect stage to deploy API
      • New Stage: Deploy by creating a new stage
      • None Stage: Deploy without selecting a stage
      Stage NameRequiredWhen selecting New Stage, enter new stage name
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 30 characters using lowercase letters, numbers, and special characters (-)
      Deployment DescriptionOptionalEnter additional information or description about API deployment within 50 characters
      Table. API deployment information input items
  4. When information entry and selection is complete, click the Deploy button.

  5. Check the message in the notification popup window, then click the Confirm button.

Creating a Stage

A stage is a named reference to a specific point in time (snapshot) of an API deployment, distinguishing environments for each lifecycle of the API such as development (dev), test (test), production (prod), etc. Each stage has a unique URL, and separate settings can be made per environment such as caching, logging, throttling, and stage variables. Through stages, various operational scenarios such as Canary release, environment-specific settings, and traffic separation are supported.

To create a stage to deploy an API, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Stage menu on the Service Home page. This will take you to the Stage page.

  3. Click the Create Stage button on the Stage page. This will take you to the Create Stage popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      Stage NameRequiredWhen selecting New Stage, enter new stage name
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
      Stage DescriptionOptionalEnter additional information or description about the stage within 100 characters
      API Deployment VersionRequiredSelect API version to deploy
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
      Table. Stage creation information input items
  4. When information entry and selection is complete, click the Confirm button.

  5. Check the message in the notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the stage list.
Note
Up to 10 stages can be created.

Viewing Stage Details

You can view and modify the stage list and detailed information. The details page consists of Stage Details information and API Deployment Version Management, CORS, Usage Policy tabs.

To view detailed information of a stage, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Stage menu on the Service Home page. This will take you to the Stage page.
  3. Click the resource for which you want to view detailed information in the stage list.
    • The Stage Details displays status information and additional feature information, and consists of API Deployment Version Management, CORS, and Usage Policy tabs.
    • To delete a stage, select the resource to delete from the list and click the Delete button.
    • To modify a stage, select the resource to modify from the list and click the Modify button.

Stage Details

On the Stage Details page, you can view detailed information of the selected resource.

ItemDescription
Stage NameStage name
CORSCORS operation status
Stage DescriptionStage information
JWTJSON Web Token usage status
API KeyAPI Key usage status
Invoke URLURL for API invocation
Activation DateStage activation date/time
Deployment IDAPI deployment ID
Table. Stage details items

API Deployment Version Management

On the API Deployment Version Management tab, you can view API deployment history.

ItemDescription
API Deployment Version Management ListAPI deployment history
  • Can view deployment date/time, status, description, deployment ID
Change DeploymentSelect the resource to change deployment from the list and click the Change Deployment button. When you click the Confirm button in the notification popup window, the active deployment ID is immediately updated.
Table. API deployment version management tab detailed information items

CORS (Cross-Origin Resource Sharing)

Note
For details on CORS (Cross-Origin Resource Sharing), see Components > CORS.

On the CORS tab, you can view the CORS list.

ItemDescription
NameCORS name
Mapping ValueMapping value applied to CORS
Table. CORS tab detailed information items

Usage Policy

On the Usage Policy tab, you can view the usage policy connected to the stage.

ItemDescription
Usage Policy NameUsage policy name
Usage Policy IDUsage policy ID
QuotaQuota set in the usage policy
Connected API Key NameAPI Key name connected to the usage policy
Table. Usage policy tab detailed information items
Note
  • When calling an API, you must call with the Key value of the API Key connected to the stage in the ‘x-scp-apikey’ header.
  • Usage policies are connected at the stage level, but quotas are calculated per method checked for API Key usage.

Creating Authentication

JWT (JSON Web Token) is an open standard (RFC 7519) used for user authentication. JWT is a claim-based web token that stores information about the user in an encrypted token using JSON format.

To create a JWT, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Authentication menu on the Service Home page. This will take you to the Authentication List page.

  3. Click the Create JSON Web Token button on the Authentication List page. This will take you to the Create JSON Web Token popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      JWT NameRequiredEnter token name
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
      Stage to ConnectOptionalCheck Use and then select a stage
      Table. Authentication creation information input items
  4. When information entry and selection is complete, click the Confirm button.

  5. Check the message in the notification popup window, then click the Confirm button. This will take you to the Access Token notification popup window.

    • Tokens can only be viewed in the Access Token notification popup window. If necessary, download the Access Token file.
  6. Check the message in the Access Token notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the authentication list.
    • To delete a token, select the resource to delete from the list and click the Delete button.
    • To modify a token, select Modify from the context menu of the resource to be modified.

Creating Access Control

You can add access allowed IPs so that API calls are made only from specific IPs when calling an API.

Note
  • A stage is connected to one access control. When a stage is initially created, the Default access control is applied by default to block access from all IPs (All deny). By creating a new access control and connecting it to the stage, you can configure it to be called only from specific IPs.
  • Access control cannot be created in the following cases:
    • When the available service quota limit is exceeded: Check the current allocated value and additional possible value in Quota Service.
    • When there is no available API: Create an API first.
    • When the API endpoint type is Private: Access control is not supported, but JWT activation is mandatorily applied to the stage of that API.

To create an access control, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.

  2. Click the API Gateway > Access Control menu on the Service Home page. This will take you to the Access Control List page.

  3. Click the Create Access Control button on the Access Control List page. This will take you to the Create Access Control popup window.

    • Enter or select the required information.
      Item
      Required
      Description
      Access Control NameRequiredEnter access control name
      • Start with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
      Public Access Allowed IPRequiredEnter IP to allow access
      • Enter up to 100 using ‘,’
      Stage to ConnectOptionalCheck Use and then select a stage
      DescriptionOptionalEnter additional information or description about access control within 50 characters
      Table. Access control creation information input items
  4. When information entry and selection is complete, click the Confirm button.

  5. Check the message in the notification popup window, then click the Confirm button.

    • Once creation is complete, verify the created resource in the access control list.
    • To delete the access control list, select the resource to delete from the list and click the Delete button. The Default access control cannot be deleted.
    • To modify an access control, select Modify from the context menu of the resource to be modified.

Terminating an API

You can reduce operating costs by terminating services that are not in use. However, since terminating a service may immediately stop the operating service, you should proceed with termination after fully considering the impact of service interruption.

To terminate an API, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API menu on the Service Home page. This will take you to the API List page.
  3. Select the resource to terminate on the API List page and click the Terminate Service button.
  4. When termination is complete, verify that the resource has been terminated on the API List page.

Using Report

You can check API traffic, performance, and error status.

To use Report, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Report menu on the Service Home page. This will take you to the Report page.
    • Enter or select the required information.
ItemDescription
Query PeriodSelect date to query (default 1 week from current date, can query up to one month)
Stage NameStage name under API
Table. Report information input items
  1. When information entry and selection is complete, you can view Report information.
ItemDescription
Top 5 ResourcesTop 5 most called resources among resources called by the user with API status code 2XX (if identical, not shown as duplicate rank)
API Call CountNumber of calls with API status code 2XX
LatencyTime from when the user sends a request to API Gateway to when they receive a response
Integration LatencyTime from when API Gateway sends a request to the backend server to when it receives a response from the backend
4XX ErrorNumber of calls with API status code 4XX
5XX ErrorNumber of calls with API status code 5XX
Table. Report detailed information items
Note
  • When a stage is deleted, it cannot be queried in Report.
  • Report queries data from 1 hour ago from the current time.

Creating a Usage Policy

Usage policies are established to ensure efficient distribution of server resources, secure service stability, and prevent unnecessary traffic and abuse.

To create a usage policy, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Usage Policy menu on the Service Home page. This will take you to the Usage Policy page.
  3. Click the Create Usage Policy button on the Usage Policy page. This will take you to the Create Usage Policy page.
    • Enter or select the required information.
Item
Required
Description
API Name to ConnectRequiredSelect from created APIs
Usage Policy NameRequiredStart with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
QuotaRequiredEnter between 1 ~ 2,000,000,000 based on monthly/daily/hourly
DescriptionOptionalEnter description of the usage policy within 50 characters
Table. Usage policy information input items
  1. When information entry and selection is complete, click the Complete button.
  2. Check the message in the notification popup window, then click the Confirm button.
    • Once creation is complete, verify the created resource in the usage policy list.

Creating an API Key

API Keys are used to identify which user or application is calling an API. They are mainly used to limit usage through usage policies.

To create an API Key, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Usage Policy menu on the Service Home page. This will take you to the Usage Policy page.
  3. Click the usage policy in the list. This will take you to the Usage Policy Details page.
  4. Click the Create API Key button on the Usage Policy Details page. This will take you to the Add API Key popup window.
    • Enter or select the required information.
Item
Required
Description
API Key NameRequiredStart with lowercase English letters, do not end with special characters (-), and enter 3 ~ 50 characters using lowercase letters, numbers, and special characters (-)
DescriptionOptionalEnter description of the API Key within 50 characters
Table. API Key information input items
  1. When information entry and selection is complete, click the Confirm button.
  2. Check the message in the notification popup window, then click the Confirm button.
    • Once creation is complete, verify the created resource on the Usage Policy Details page.
Note
  • Up to 10 usage policies and 5 API Keys can be created.
  • Quotas are calculated per API Key.

Creating a Resource Policy

You can block unauthorized access from the source through resource-based policies and enhance the security level of the service.

To create a resource policy, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Resource Policy menu on the Service Home page. This will take you to the Resource Policy page.
  3. Click the Create Resource Policy button on the Resource Policy page. This will take you to the Create Resource Policy page.
    • Enter or select the required information in the Service Information section.
Item
Required
Description
Policy TemplateRequiredSelect policy template
  • Default Policy: Policy automatically registered when creating an API
  • Account Allow List: Policy that allows only users of specific SCP accounts (Root user or IAM Role) to call the API
  • IP Range Deny List: Policy that allows or blocks only specific IP addresses or CIDR ranges
Table. Resource policy information input items
  1. When information entry and selection is complete, click the Complete button.
  2. Check the message in the notification popup window, then click the Confirm button.
    • Once creation is complete, you can view, modify, or delete the resource policy.

1.2.1 - Resource-based Policy

Resource-based Policy Overview

API Gateway’s Resource-based Policy is a policy granted to a resource that allows you to decide whether to allow or deny (Effect) actions on specific resources to principals. Using resource-based policies, you can directly define the principals that can call the API.

Note
While general IAM policies (Identity-based) grant permissions to users, resource-based policies are applied to the API itself to allow external access.

Through resource-based policies, you can allow secure API calls by defining the following:

  • Users of specific Samsung Cloud Platform accounts
  • Specific source IP address ranges or CIDR blocks

Source policies are defined as JSON policy documents attached to an API to control whether a specified security principal (usually an IAM role or group) can call the API.

ItemDescriptionExample
PrincipalSpecify the principal that will call the API-
ActionDefine the functions to allow-
ConditionRestrict to allow only in specific situationsAllow only requests from specific SRN
Table. Entities that control API call permission
Note
  • API Gateway’s resource-based policy utilizes the rules of IAM’s resource-based policy.
  • For instructions on creating or modifying policies using JSON, see JSON Writing Guide.

Resource-based Policy Usage Scenarios

The main usage scenarios for resource-based policies are as follows:

Resource-based Policy Scenarios

The resource-based policy scenarios used when specific features of API Gateway operate are as follows:

ItemDescriptionReference Example
Default PolicyThis is the DEFAULT resource policy that is automatically created when an API is created.
  • Users can delete or modify it.
  • It can be recreated after deletion.
Default Policy Example
Account Allow ListYou can define the account(s) that can call the API.Account Allow List Example
IP Range Deny ListYou can define the IP ranges that cannot call the API.IP Range Deny List Example
Table. Resource-based policy scenarios

Additional User Usage Scenarios

While not automatically registered by API Gateway’s resource-based policy, users can add and utilize it as needed. Scenarios that users can add and utilize are as follows:

  • Cross-account access
    • When an IAM user of account A wants to execute Lambda of account B, register account A in the function policy of account B.
  • Hybrid access control
    • Instead of simply limiting accounts or IPs, you can configure it so that both specific users and specific IP bands must be satisfied simultaneously to allow access.

Managing API Gateway’s Resource-based Policy

To view and set API Gateway’s resource-based policy, follow these steps:

  1. Click the All Services > Application Service > API Gateway menu. This will take you to the API Gateway Service Home page.
  2. Click the API Gateway > Resource Policy menu on the Service Home page. This will take you to the Resource Policy page.
  3. Click the Modify button in the Policy Details item. The Modify Resource Policy popup window opens. * When you click the Delete button, the registered policy is deleted.
  4. In the Modify Resource Policy popup window, select a Policy Template and then write the policy. * For policy examples by policy template, see Resource-based Policy Examples.
  5. When writing is complete, click the Complete button.

Resource-based Policy Examples

Users can additionally define resource-based policies or modify existing policies as needed.

Note
  • For some features, a resource-based policy (or credentials) must be registered to use them in API Gateway.
  • For the resource-based policy examples described in this guide, API Gateway automatically registers the example resource-based policies when each feature is activated or connected.

Default Policy

This is a policy that is automatically registered when an API is created.

Policy Template

Color mode
{
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "DefaultStatement"
    }
  ],
  "Version": "2024-07-01"
}
{
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "DefaultStatement"
    }
  ],
  "Version": "2024-07-01"
}
Default Policy Template Example

Policy Example

Color mode
{
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "DefaultStatement"
    }
  ],
  "Version": "2024-07-01"
}
{
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "DefaultStatement"
    }
  ],
  "Version": "2024-07-01"
}
Default Policy Example

Account Allow List

This is a policy that allows only users of specific SCP accounts (Root user or IAM Role) to call the API.

Policy Template

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:method/{{ApiId}}/{{stageNameOrWildcard*}}/{{httpVerbOrWildcard*}}/{{resourcePathOrWildcard*}}"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:{{Offering}}::{{AccountID}}:::iam:user/{{UserSrn}}"
        ]
      },
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:method/{{ApiId}}/{{stageNameOrWildcard*}}/{{httpVerbOrWildcard*}}/{{resourcePathOrWildcard*}}"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:{{Offering}}::{{AccountID}}:::iam:user/{{UserSrn}}"
        ]
      },
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "Statement1"
    }
  ]
}
Account Allow List Policy Template Example

Policy Example

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/stage1/GET/resource1"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1"
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/stage1/GET/resource1"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1"
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
Account Allow List Policy Example

IP Range Deny List

This is a policy that allows or blocks only specific IP addresses or CIDR ranges.

Policy Template

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:method/{{ApiId}}/{{stageNameOrWildcard*}}/{{httpVerbOrWildcard*}}/{{resourcePathOrWildcard*}}"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "{{sourceIpOrCIDRBlock}}",
            "{{sourceIpOrCIDRBlock}}"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:method/{{ApiId}}/{{stageNameOrWildcard*}}/{{httpVerbOrWildcard*}}/{{resourcePathOrWildcard*}}"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "{{sourceIpOrCIDRBlock}}",
            "{{sourceIpOrCIDRBlock}}"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:{{Offering}}::{{AccountID}}:kr-west1::apigateway:api/{{ApiId}}"
      ],
      "Sid": "Statement1"
    }
  ]
}
IP Range Deny List Policy Template Example

Policy Example

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/stage1/GET/resource1"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "1.2.3.4/24",
            "5.6.7.8/32"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/stage1/GET/resource1"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "1.2.3.4/24",
            "5.6.7.8/32"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": "*",
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
IP Range Deny List Policy Example

Cross-account Access

This is a policy that allows UserId2 belonging to accountId2 to call API apiId1 belonging to accountId1.

Policy Example

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/*/*/*"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1",
          "srn:e::accountId2:::iam:user/userId2",
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
      "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/*/*/*"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1",
          "srn:e::accountId2:::iam:user/userId2",
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
Cross-account Access Policy Example

Hybrid Access Control

This is a policy that allows UserId2 belonging to accountId2 to call API apiId1 belonging to accountId1.

  • You can add conditions to simultaneously validate the User ID (Principal) and resource Condition (Condition). Below is an example that additionally defines inaccessible IPs.

Policy Example

Color mode
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
       "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/*/*/*"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "1.2.3.4/24",
            "5.6.7.8/32"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1",
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
{
  "Version": "",
  "Statement": [
    {
      "Action": [
        "apigateway:InvokeApigatewayRegion"
      ],
       "Condition": {
        "SrnLike": {
          "scp:RequestAttribute/body['method-srn']": [
            "srn:e::accountId1:kr-west1::apigateway:method/apiId1/*/*/*"
          ]
        },
        "NotIpAddress": {
          "scp:SourceIp": [
            "1.2.3.4/24",
            "5.6.7.8/32"
          ]
        }
      },
      "Effect": "Allow",
      "Principal": {
        "scp": [
          "srn:e::accountId1:::iam:user/userId1",
        ]
      },
      "Resource": [
        "srn:e::accountId1:kr-west1::apigateway:api/apiId1"
      ],
      "Sid": "Statement1"
    }
  ]
}
Hybrid Access Control Policy Example

1.3 - API Reference

API Reference

1.4 - CLI Reference

CLI Reference

1.5 - Release Notes

API Gateway

2026.03.19
FEATURE Add resource-based policy feature
  • You can set resource-based policies for APIs.
    • A resource-based policy is a policy that is applied to the API itself to allow external access.
    • Using resource-based policies, you can allow or deny actions on specific resources to specific principals.
2025.07.01
NEW Official release of API Gateway service
  • API Gateway service that allows easy management and monitoring of APIs has been released.
  • You can easily define resources and methods related to APIs, and conveniently monitor API usage status and performance metrics.

2 - Queue Service

2.1 - Message API reference

Overview

The Queue Service provided by Samsung Cloud Platform can send, receive, and delete messages.
In this guide, we provide an explanation of the Queue Service API and how to call it.

Queue Service Call Procedure

Queue Service API URL address must be changed according to the operating environment and region. Please check the operating environment and region information in the table below.

Operating EnvironmentRegionQueue Service URL
For Samsungkr-west1https://queueservice.service.kr-west1.s.samsungsdscloud.com
For Samsungkr-east1https://queueservice.service.kr-east1.s.samsungsdscloud.com
For Enterprisekr-west1https://queueservice.service.kr-west1.e.samsungsdscloud.com
For Enterprisekr-east1https://queueservice.service.kr-east1.e.samsungsdscloud.com

Calling API

AUTH PARAMS

Header Description
Scp-Accesskey      : Access Key issued from the Samsung Cloud Platform portal
Scp-Signature      : Signature that encrypts the called API request with the Access Secret Key mapped to the Access Key. The HMAC encryption algorithm uses HmacSHA256.
Scp-Target         : Action that requests the Queue Service. ScpQS.SendMessage, ScpQS.SendMessageBatch, ScpQS.ReceiveMessage, ScpQS.DeleteMessage, ScpQS.DeleteMessageBatch one of
Scp-Timestamp      : January 1, 1970 00:00:00 defines the elapsed time from Coordinated Universal Time (UTC) as milliseconds.
Scp-ClientType     : user-api specification

Create Signature

  • Generate the string to be signed from the request, encrypt it with HmacSHA256 algorithm using Access and Secret Key, then encode it in Base64.
  • Use this value as Scp-Signature.
  • The generated Signature is valid for 15 minutes.1. Click the All Services > Application > Queue Service menu. Navigate to the Service Home page of Queue Service.
Signature Generation Sample Code (Java)
public static String makeHmacSignature(String method,
                                       String url,
                                       String timestamp,
                                       String accessKey,
                                       String accessSecretKey,
                                       String clientType) {
  
    String body = method + url + timestamp + accessKey + clientType;
  
    String encodeBase64Str;
  
    try {
        byte[] message = body.getBytes("UTF-8");
        byte[] secretKey = accessSecretKey.getBytes("UTF-8");
  
        Mac mac = Mac.getInstance("HmacSHA256");
        SecretKeySpec secretKeySpec = new SecretKeySpec(secretKey, "HmacSHA256");
        mac.init(secretKeySpec);
        byte[] hmacSha256 = mac.doFinal(message);
        encodeBase64Str = Base64.getEncoder().encodeToString(hmacSha256);
    } catch (Exception e) {
        throw new RuntimeException("Failed to calculate hmac-sha256", e);
    }
  
    return encodeBase64Str;
}
Signature Generation Sample Code (JavaScript)

### Queue Service API Call Example
#### Curl
```commandline
curl -i -X GET
-H "Scp-Accesskey:2sd2gg=2agbdSD26svcD"
-H "Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef="
-H "Scp-Timestamp:1605290625682"
-H "Scp-ClientType:user-api"
-H "Scp-Target:ScpQS.SendMessage"
--data '{"MessageBody": "sample message",  "QueueUrl": "https://queueservice.kr-west1.e.samsungsdscloud.com/33ff0000a8a345d78cdf163673f3da11/samplequeue"}'
'https://queueservice.service.kr-west1.e.samsungsdscloud.com'

Python

import requests

url = "https://queueservice.service.kr-west1.e.samsungsdscloud.com"
payload = {
   'MessageBody': 'sample message',
   'QueueUrl': 'https://queueservice.kr-west1.e.samsungsdscloud.com/33ff0000a8a345d78cdf163673f3da11/samplequeue'
}
headers = {
  'Scp-Accesskey': '2sd2gg=2agbdSD26svcD',
  'Scp-Signature': 'fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=',
  'Scp-Timestamp': '1605290625682',
  'Scp-ClientType': 'user-api',
  'Scp-Target': 'ScpQS.SendMessage'
}

response = requests.request("GET", url, headers=headers, data=payload)

if response.status_code == 200:
    contents = response.text
    return contents
else:
    raise Exception(f"Failed to GET API: {response.status_code}, {response.text}")

Java

String apiUrl = "https://queueservice.service.kr-west1.e.samsungsdcloud.com";
String accessKey = "2sd2gg=2agbdSD26svcD"
String signature = "fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef="
String timestamp = "1605290625682"
String clientType = "user-api"
String scpTarget = "ScpQS.SendMessage"

public static String getAPI(String token, String apiUrl) throws IOException {
        CloseableHttpClient httpClient = HttpClients.createDefault();
        HttpGet getRequest = new HttpGet(apiUrl);
        getRequest.addHeader("Scp-Accesskey", accessKey);
        getRequest.addHeader("Scp-Signature", signature);
        getRequest.addHeader("Scp-Timestamp", timestamp);
        getRequest.addHeader("Scp-ClientType", clientType);
        getRequest.addHeader("Scp-Target", scpTarget);

        HttpResponse response = httpClient.execute(getRequest);
        int statusCode = response.getStatusLine().getStatusCode();

        if (statusCode == 200) {
            String responseBody = EntityUtils.toString(response.getEntity());
            httpClient.close();
            return responseBody;
        } else {
            String responseBody = EntityUtils.toString(response.getEntity());
            httpClient.close();
            throw new RuntimeException("Failed to Request: " + statusCode + ", " + responseBody);
        }
    }

Queue Service API

SendMessage

POST https://queueservice.service.kr-west1.e.samsungsdscloud.com

Description

Send message

Parameters

Field NameRequiredTypeDescription
MessageAttributesfalseMessageAttribute
MessageBodytruestring
MessageDeduplicationIdfalsestringFIFO Queue
MessageGroupIdfalsestringFIFO Queue
QueueUrltruestring
MessageAttribute
Field NameRequiredTypeDescription
BinaryValuefalsestring
DataTypefalsestring
StringValuefalsestring

Responses

HTTP CodeDescriptionSchema
200Created
400Bad Request
403Forbidden

Example HTTP request

Request Header
"Scp-Accesskey:2sd2gg=2agbdSD26svcD","
"Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=","


"Scp-Timestamp:1605290625682",
"Scp-ClientType:user-api","
Scp-Target:ScpQS.SendMessage
Request Body
{
  "QueueUrl": "https://queueservice.kr-west1.e.samsungsdscloud.com/123e54b7303749f38ca59a5c6d419a75/test",
  "MessageBody": "Hello SQS!",
  "MessageAttributes": {
    "Special": {
      "DataType": "string",
      "StingValue": "testBodyString12345678910!/wow$#@!"
    }
  }
}

Example HTTP response

200 Response
{
  "MD5OfMessageAttributes": "139818cac45117a07428826a8c533c01",
  "MD5OfMessageBody": "098f6bcd4621d373cade4e832627b4f6",
  "MessageId": "14b37b86-8117-484a-aea4-1eae3b98d5d0",
  "SequenceNumber": "11764568839"
}

SendMessageBatch

POST https://queueservice.service.kr-west1.e.samsungsdscloud.com

Description

Bulk message sending

Parameters

Field NameRequiredTypeDescription
Entriestruearray of SendMessageBatchRequestEntry
QueueUrltruestring
SendMessageBatchRequestEntry
Field NameRequiredTypeDescription
Idtruestring
MessageAttributesfalseMessageAttribute
MessageBodytruestring
MessageDeduplicationIdfalsestringFIFO Queue
MessageGroupIdfalsestringFIFO Queue

Responses

HTTP CodeDescriptionSchema
200Created
400Bad Request
403Forbidden

Example HTTP request

Request Header

“Scp-Accesskey:2sd2gg=2agbdSD26svcD”, “Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=”,"

“Scp-Timestamp:1605290625682”," “Scp-ClientType:user-api”," Scp-Target:ScpQS.SendMessageBatch


###### Request Body
```json
{
   "QueueUrl": "https://queueservice.kr-west1.dev3.samsungsdscloud.com/123e54b7303749f38ca59a5c6d419a75/test",
   "Entries": [
      {
         "Id": "1",
         "MessageBody": "test-body-1"
      },
      {
         "Id": "2",
         "MessageBody": "test-body-2"
      }
   ]
}

Example HTTP response

200 Response
{
   "Failed": [],
   "Successful": [
      {
         "Id": "2",
         "MD5OfMessageAttributes": "d41d8cd98f00b204e9800998ecf8427e",
         "MD5OfMessageBody": "82ddf04637119b9a77e9b44095f5ba11",
         "MessageId": "68aa4629-bfbc-4bb0-898b-52db94438526",
         "SequenceNumber": "31764583416"
      },
      {
         "Id": "1",
         "MD5OfMessageAttributes": "d41d8cd98f00b204e9800998ecf8427e",
         "MD5OfMessageBody": "8344ca2f91203b151e4d0aafc9248a8b",
         "MessageId": "3523740f-9e7c-429e-8514-5ec21b1d3cd8",
         "SequenceNumber": "41764583416"
      }
   ]
}

ReceiveMessage

POST https://queueservice.service.kr-west1.e.samsungsdscloud.com

Description

Message reception

Parameters

Field NameRequiredTypeDescription
MaxNumberOfMessagesfalsestring
MessageAttributeNamesfalsearray of string
MessageSystemAttributeNamesfalsearray of string
QueueUrltruestring
WaitTimeSecondsfalsestring

Responses

HTTP CodeDescriptionSchema
200Created
400Bad Request
403Forbidden

Example HTTP request

Request Header
"Scp-Accesskey:2sd2gg=2agbdSD26svcD","
"Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=",
"Scp-Timestamp:1605290625682","
"Scp-ClientType:user-api",
Scp-Target:ScpQS.ReceiveMessage
Request Body
{
   "QueueUrl": "https://queueservice.kr-west1.dev3.samsungsdscloud.com/123e54b7303749f38ca59a5c6d419a75/test",
   "MaxNumberOfMessages": "2"
}

Example HTTP response

200 Response
{
   "messages": [
      {
         "MessageId": "14b37b86-8117-484a-aea4-1eae3b98d5d0",
         "Body": "sample-body-1",
         "Attributes": {},
         "MessageAttributes": {
            "Special": {
               "DataType": "string",
               "StingValue": "testBodyString12345678910!/wow$#@!"
            }
         },
         "MD5OfBody": "098f6bcd4621d373cade4e832627b4f6",
         "MD5OfMessageAttributes": "139818cac45117a07428826a8c533c01",
         "ReceiptHandle": "400tf1nY4HbXEP7UX4OtxPVIPlq9vw1eeKDFwNMeNiEuZvMSbvdPCBOF/P96FUF9XT7TALMzP91ViCxQjnOIyBWw+fr4EhihdJ0Z2QHau1LMHbxD+GngcM2Pv6d5HM4KCmBgB2GxFA5qpUFBPPI="
      },
      {
         "MessageId": "aee85517-1437-4877-8de8-00eee69e11dc",
         "Body": "sample-body-2",
         "Attributes": {},
         "MD5OfBody": "ad0234829205b9033196ba818f7a872b",
         "MD5OfMessageAttributes": "139818cac45117a07428826a8c533c01",
         "ReceiptHandle": "400tf1nY4HbXEP7UX4OtxPVIPlq9vw1eeKDFwNMeNiEuZvMSbvdPCBPVrfhxFxZ0XD7aBbEzP91Vi3pQ13KMxBWxrP74REyhKcgd2VLauFLMHbxD+GngcM2Pv6d5HCzyqhEoB9DHI5NmOhgaOJ4="
      }
   ]
}

DeleteMessage

POST https://queueservice.service.kr-west1.e.samsungsdscloud.com

Description

Delete message

Parameters

Field NameRequiredTypeDescription
QueueUrltruestring
ReceiptHandletruestring

Responses

HTTP CodeDescriptionSchema
200Created
400Bad Request
403Forbidden

Example HTTP request

Request Header

“Scp-Accesskey:2sd2gg=2agbdSD26svcD”," “Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=”, “Scp-Timestamp:1605290625682”, “Scp-ClientType:user-api”," Scp-Target:ScpQS.DeleteMessage


###### Request Body
```json
{
   "QueueUrl": "https://queueservice.kr-west1.dev3.samsungsdscloud.com/123e54b7303749f38ca59a5c6d419a75/test",
   "ReceiptHandle": "400tf1nY4HbXEP7UX4OtxPVIPlq9vw1eeKDFwNMeNiEuZvMSbvdPCBPVrfhxFxZ0XD7aBbEzP91Vi3pQ13KMxBWxrP74REyhKcgd2VLauFLMHbxD+GngcM2Pv6d5HCzyqhEoB9DHI5NmOhgaOJ4="
}

Example HTTP response

200 Response

DeleteMessageBatch

aiignore POST https://queueservice.service.kr-west1.e.samsungsdscloud.com


#### Description
Bulk message deletion

#### Parameters
| Field Name      | Required | Type                                      | Description |
|----------|-------|-----------------------------------------|----|
| Entries  | true  | array of DeleteMessageBatchRequestEntry |    |
| QueueUrl | true  | string                                  |    |

##### DeleteMessageBatchRequestEntry
| Field Name           | Required | Type     | Description |
|---------------|-------|--------|----|
| Id            | true  | string |    |
| ReceiptHandle | true  | string |    |

#### Responses

| HTTP  Code | Description	 | Schema |
|------------|--------------|--------|
| 200        | 	Created	    |        |
| 400        | 	Bad Request |        |
| 403        | 	Forbidden	  |        |


#### Example HTTP request

###### Request Header

“Scp-Accesskey:2sd2gg=2agbdSD26svcD”," Scp-Signature:fsfsdf235f9U35sdgf35Xsf/qgsdgsdg326=sfsdr23rsef=, “Scp-Timestamp:1605290625682”, “Scp-ClientType:user-api”," Scp-Target:ScpQS.DeleteMessageBatch


###### Request Body
```json
{
   "QueueUrl": "https://queueservice.kr-west1.dev3.samsungsdscloud.com/123e54b7303749f38ca59a5c6d419a75/test",
   "Entries": [
      {
         "Id": "1",
         "ReceiptHandle": "400tf1nY4HbXEP7UX4OtxPVIPlq9vw1eeKDFwNMeNiEuZvMSbvdPCBOF/P96FUF9XT7TALMzP91ViCxQjnOIyBWw+fr4EhihdJ0Z2QHau1LMHbxD+GngcMyJvqN5F17gym/YF4JoroeBXMSvIG0="
      },
      {
         "Id": "2",
         "ReceiptHandle": "400tf1nY4HbXEP7UX4OtxPVIPlq9vw1eeKDFwNMeNiEuZvMSbvdPCBOC8PwoFhV3Uj6JV+BnP90P3n1Q1y/RnhW0rv//GE6sf8EZjwfauVLMHbxD+GngcMyJvqN5F1Hs5T3vAZxgIV20IPdscTQ="
      }
   ]
}

Example HTTP response

200 Response
{
   "Failed": [],
   "Successful": [
      {
         "Id": "1"
      },
      {
         "Id": "2"
      }
   ]
}

2.2 - How to guides

Create Queue Service

You can create and use a Queue Service from the Samsung Cloud Platform Console.
To create a Queue Service, follow these steps.

  1. Click the All Services > Application > Queue Service menu. Go to the Service Home page of Queue Service.
  2. Click the Create Queue button on the Service Home page. It navigates to the Create Queue page.
  3. After entering the information required to create the service on the Queue creation page, click the Confirm button.
Category
Required
Detailed description
TypeRequiredSelect service type
  • Basic, FIFO select
Queue nameRequiredEnter queue name
  • Start with a lowercase English letter and include lowercase letters, numbers, and special characters (-) within 3 ~ 64 characters
  • Standard type: cannot include ‘.fifo’ in the name
  • FIFO type: use the format ’name+.fifo
DescriptionSelectEnter service description within 100 characters
Message SizeRequiredEnter the message size value (KB) between 1 and 256
  • Up to 50 can be added per resource
Message retention periodRequiredEnter message retention period
  • Select a unit period and then enter the desired value
    • seconds: 60 ~ 1,209,600
    • minutes: 1 ~ 20,160
    • hours: 1 ~ 336
    • days: 1 ~ 14
EncryptionRequiredChoose whether to use encryption
  • Create new: Go to the KMS page and create a new KMS encryption
  • Do not use: Do not use encryption
  • KMS encryption: Select when using KMS
    • Data Key reuse period: After selecting the unit period, enter the desired value
      • Minutes: 5 ~ 1,440
      • Hours: 1 ~ 24
TagSelectAdd Tag
  • Up to 50 can be added per resource
  • After clicking the Add Tag button, enter or select Key, Value values
Table. Queue creation information input items
  1. When the popup notifying creation opens, click the Confirm button.

Queue is charged based on usage.

Queue Service Check detailed information

You can view detailed information and messages about the Queue Service.
To view detailed information of the Queue Service, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Go to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. It moves to the Queue List page.
  3. Click the resource to view detailed information on the Queue list page. It moves to the Queue details page.
    • Queue Details page displays status information and additional feature information, and consists of Details, Message Management, Tags, Task History tabs.
CategoryDetailed description
Queue Service statusDescribes the status of Queue Service
  • Creating: Creating
  • Available: Creation completed, server connection possible
  • Deleting: Service termination in progress
  • Error Deleting: Abnormal state during deletion
  • Inactive: Abnormal state
  • Error: Abnormal state during creation
Service terminationService termination button
Table. Queue Service status information and additional features

Detailed Information

On the Queue list page, you can view detailed information of the selected resource and, if necessary, edit the information.

CategoryDetailed description
serviceservice name
Resource TypeResource Type
SRNUnique resource ID in Samsung Cloud Platform
  • In Queue Service, it means resource SRN
Resource NameResource Name
  • In Queue Service, it means the Queue name
Resource IDUnique resource ID of the service
CreatorUser who created the service
Creation DateTimeDate and time the service was created
EditorUser who modified the service
Modification Date/TimeDate/Time when the service was modified
Volume nameVolume name
typeQueue type
Configuration SettingsQueue configuration information
  • Displays message size, retention period, and whether encryption is used
  • Click the Edit button to modify
    • For more details, see [Configure Queue Settings](#queue-configuration-settings reference)
DescriptionQueue description
  • Click the Edit button to edit
IP Access Allow ListList of IPs allowed to access the Queue service
  • Click the Add IP Address button to register a new IP
  • Click the Delete button of a registered IP to remove it
Table. Queue Details - Details Tab Items

Message Management

Queue list page allows you to view and manage the message list of the selected resource.

Reference
  • Messages are displayed up to a maximum of 10.
  • How to manage messages, see Message Management.
CategoryDetailed description
Message pollingPerform message polling from Queue to Console and refresh the message list
MoreMessage sending, deletion, removal possible
  • Message Sending: Send a new message
  • Delete: Delete the selected message from the message list
  • Remove: Delete all messages included in the Queue
Message ListMessage ID, message sent datetime, message received datetime, message size can be checked
  • Click the Message ID to view the message body and meta information
  • Delete button can be clicked to delete the message
Message Sent Date/TimeSnapshot Size
Message Received TimeSnapshot Creation Time
Message SizeSnapshot Status
  • Available: Creation complete, recoverable
  • Creating: Creating
  • Error: Abnormal state
  • Deleting: Deleting
  • Error Deleting: Abnormal state while deleting
  • Restoring: Restoring
Table. Queue Details - Message Management Tab Items

Tag

On the Queue list page, you can view the tag information of the selected resource, and you can add, modify, or delete it.

CategoryDetailed description
Tag ListTag List
  • You can view the Key, Value information of tags
  • Up to 50 tags can be added per resource
  • When entering tags, search and select from the existing list of created Keys and Values
Table. Queue Details - Tag Tab Items

Work History

Queuee 목록 page allows you to view the operation history of the selected resource.

CategoryDetailed description
Work History ListResource Change History
  • Work Date and Time, Resource Type, Resource ID, Resource Name, Work Details, Event Topic, Work Result, Verify Operator Information
Table. Queue Details - Work History Tab Items

Queue configuration setup

You can reconfigure the settings configured when creating the Queue Service.
To reset the Queue configuration, follow these steps.

  1. Click the All Services > Application > Queue Service menu. Go to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. Navigate to the Queue list page.
  3. Queue List page, click the resource to reconfigure the Queue. Queue Details page will be opened.
  4. Click the Edit button of the Configuration Settings item. The Edit Configuration Settings popup window opens.
  5. Modify Configuration Settings After modifying the configuration information in the popup window, click the Confirm button.
Category
Required
Detailed description
Message SizeRequiredEnter the message size value (KB) between 1 and 256
  • Up to 50 can be added per resource
Message retention periodRequiredEnter message retention period
  • Select a unit period, then enter the desired value
    • seconds: 60 ~ 1,209,600
    • minutes: 1 ~ 20,160
    • hours: 1 ~ 336
    • days: 1 ~ 14
EncryptionRequiredChoose whether to use encryption
  • Create new: Go to the KMS page and create a new KMS encryption
  • Do not use: Do not use encryption
  • KMS encryption: Select when using KMS
    • Data Key reuse period: After selecting the unit period, enter the desired value
      • Minutes: 5 ~ 1,440
      • Hours: 1 ~ 24
Table. Queue configuration settings edit input items

Manage IP Access Allowance

You can manage IPs that can access the Queue Service.

Add Accessible IP

To add an accessible IP, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Go to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. It navigates to the Queue List page.
  3. On the Queue list page, click the resource to add an accessible IP. It navigates to the Queue details page.
  4. Click the Add IP Address button of the IP Access Allow List item. The Add IP Address popup opens.
  5. After entering the IP to add to the IP Access Allow List, click the Confirm button.
    • Click the + button to add multiple IPs at once (up to 10).
  6. When the popup notifying the addition of IP opens, click the Confirm button.

Exclude accessible IP

To exclude IPs registered in the IP Access Allow List, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Navigate to the Service Home page of Queue Service.
  2. Service Home page, click the Queue menu. Navigate to the Queue list page.
  3. Click the resource to exclude the accessible IP on the Queue List page. You will be taken to the Queue Details page.
  4. IP Access Allow List After checking the IP to exclude from the item, click the Delete button at the top of the list.
  • IP Access Allow List you can also individually exclude by clicking the Delete button of the IP you want to remove.
  1. When the popup notifying IP deletion opens, click the Confirm button.

Message Management

You can send or manage queue messages.

Send Message

To send a Queue message, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Go to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. Move to the Queue list page.
  3. Click the resource to send a Queue message on the Queue List page. You will be taken to the Queue Details page.
  4. Queue Details page’s Message Management tab, click it.
  5. Click the More > Send Message button at the top of the message list. The Send Message popup window will open.
  6. Message Sending After entering the message information to be sent in the popup window, click the Confirm button.
Category
Required
Detailed description
Message bodyRequiredEnter the message to send
  • Up to 262,244 bytes can be entered
Meta InformationSelectSelect whether to use meta information to add to the message
  • If used, up to 10 Key, Value entries can be entered
EncryptionRequiredChoose whether to use encryption
  • Create new: Go to the KMS page and create a new KMS encryption
  • Do not use: Do not use encryption
  • KMS encryption: Select when using KMS
    • Data Key reuse period: After selecting the unit period, enter the desired value
      • Minutes: 5 ~ 1,440
      • Hours: 1 ~ 24
Table. Message Sending Input Items

Delete individual messages

You can delete Queue messages individually. To delete a message, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Go to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. Navigate to the Queue List page.
  3. On the Queue List page, click the resource to delete the Queue message. You will be taken to the Queue Details page.
  4. Click the Message Management tab on the Queue Details page.
  5. After selecting all messages to delete from the message list, click the More > Delete button at the top of the list.
    • You can also delete individually by clicking the Delete button at the far right of the message you want to delete in the message list.
  6. If a popup window notifying message deletion opens, click the Confirm button.

Remove all messages

You can delete all messages in the queue.

Caution
  • Message removal deletes messages that cannot be recovered.
  • If the same removal request is in progress, it will not be deleted. Please try removing the message again after a moment.

To delete all messages, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Navigate to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. Go to the Queue List page.
  3. Queue List page, click the resource to remove the Queue message. Navigate to the Queue Details page.
  4. Click the Message Management tab on the Queue Details page.
  5. Click the More > Remove Message button at the top of the message list.
  6. When the popup notifying message deletion opens, click the Confirm button.

Queue Service Cancel

You can reduce operating costs by canceling the unused Queue Service.
However, if you terminate the service, the currently operating service may be discontinued immediately, so you should proceed with the termination after fully considering the impact that may occur when the service is discontinued.

Caution
All messages are deleted upon termination and cannot be recovered.

To cancel the Queue Service, follow the steps below.

  1. All Services > Application > Queue Service Click the menu. Navigate to the Service Home page of Queue Service.
  2. Click the Queue menu on the Service Home page. It moves to the Queue List page.
  3. Queue List page, after selecting the resource to cancel, click the Cancel Service button.
    • After moving to the Queue Details page of the resource to be terminated, you can also terminate individually by clicking the Terminate Service button.
  4. If a popup notifying service termination opens, click the Confirm button.

PrivateLink Service Integration

Queue Service can be used by integrating with PrivateLink Service, allowing direct communication with Queue Service from the user’s VPC instead of internet communication, thereby enhancing security.

Follow the steps below to integrate the Queue Service with the PrivateLink Service.

  1. Check the PrivateLink Service ID of the Queue Service for creating a PrivateLink Endpoint.
    • The PrivateLink Service ID of Queue Service can be obtained by contacting us.
  2. Create a PrivateLink Endpoint.
Reference
  • PrivateLink Service usage approval is automatically processed when connected.
  • Check the Security Group of the PrivateLink Endpoint to verify whether the target VM IP is registered.
Caution
When connecting via PrivateLink Endpoint, IAM policies and IP access control for authentication keys cannot be used.

2.3 - Overview

Service Overview

Queue Service is a service that efficiently manages and delivers messages or tasks, supporting message transmission between systems.
This service smooths the data flow between the Producer that generates messages and the Consumer that receives messages, and provides a FIFO (First-In-First-Out) function that guarantees message order. Through this, it distributes system load caused by messages, allowing efficient message management in microservice architectures or event-driven systems.

Features

  • Efficient message processing : By processing and managing the simultaneous sending and receiving of a large number of messages, you can efficiently handle the message processing tasks of the user system.
  • Fast Service Processing : Producer and Consumer operate independently of each other, allowing for improved responsiveness and processing speed.
  • Message Order Guarantee : Ensures the order of received messages to maintain data consistency.
  • Strong security and reliability : Protects sensitive information through encryption during message transmission and storage, and provides reliable message management.

Service Diagram

Diagram
Figure. Queue Service Diagram

Provided Features

Queue Service provides the following features.

  • Queue creation: Create a Queue of type basic or FIFO that guarantees message order, depending on the message reception handling method.
    • If using FIFO type, the Queue Service sorts messages in order of receipt time.
  • Message Transmission: The Producer sends the message to be delivered to the Consumer to the Queue.
  • Message Reception: Consumer receives the Producer’s message from the Queue.
  • Message Management: Check and manage messages stored in the Queue.
  • Message Encryption: Encrypt messages within the Queue by integrating with the KMS service.
    • We support preventing message exposure by configuring message encryption.

Components

Producer

Create and send messages using Queue Service.

Consumer

Receive and process messages from the Queue Service.

Message Manager

You can check the loaded messages in the Queue Service and manage them, such as deleting them.

Region-specific provision status

Queue Service can be provided in the environment below.

RegionAvailability
Korea West 1(kr-west1)Provided
Korea East 1 (kr-east1)Provided
South Korea 1(kr-south1)Not provided
Korea South2(kr-south2)Not provided
South Korea South 3 (kr-south3)Not provided
Table. Queue Service regional availability status

Pre-service

Queue Service has no preceding service.

2.3.1 - ServiceWatch Metrics

Queue Service sends metrics to ServiceWatch. The metrics provided by default monitoring are data collected at a 1‑minute interval.

Reference
Refer to the ServiceWatch guide for how to check metrics in ServiceWatch.

Basic Indicators

The following are the default metrics for the Queue Service namespace.

Performance ItemDetailed DescriptionUnitMeaningful Statistics
Table. Queue Service basic metrics

2.4 - CLI Reference

CLI Reference

2.5 - API Reference

API Reference

2.6 - Release Note

Queue Service

2025.12.16
NEW Official Service Version Release
  • Queue Service has been officially released.
    • Through Queue Service, you can distribute system load caused by messages and efficiently manage messages in microservice architectures or event-driven systems.
    • Message transmission and reception operate independently, improving responsiveness and processing speed.