Getting Started
From zero to your first proxied request in under 2 minutes. Nolxy acts as a secure gateway between your consumers and your backend APIs.
How Nolxy Works
Requests hit Nolxy first. Nolxy authenticates, rate-limits, caches, logs, and proxies them to your upstream service.
1Create an Account
Sign up for a Nolxy account. You start on the Free plan (10K requests/month, 5 API keys, 10 routes) — no credit card required.
After registration, you will receive a User Hash — a unique public identifier used in your proxy URL. Find it on your Dashboard Overview.
2Create a Route
A Route maps a public path on Nolxy to your real backend URL. All traffic matching that path is forwarded upstream.
- Go to Dashboard → Routes
- Click Create Route
- Path:
/todos— the public endpoint consumers will call - Target URL:
https://jsonplaceholder.typicode.com— your upstream API - Methods: Select allowed HTTP methods (GET, POST, etc.)
- Click Create
Route features
Each route can independently enable response caching, circuit breaker, automatic retries, CORS, request transformations, and a backend secret header. Configure these after creation.
3Generate an API Key
Every proxy request must include a valid API key in the x-nolxy-api-key header. Keys are SHA-256 hashed — Nolxy never stores them in plaintext.
- Go to Dashboard → API Keys
- Click Generate Key
- Name it (e.g., "Development") and click Create
- Copy the key immediately — it is shown only once
You can optionally set IP restrictions, an expiration date, and allowed routes per key from the Security Rules page.
4Make Your First Request
Call your API through the Nolxy proxy:
curl http://localhost:3030/proxy/todos \ -H "x-nolxy-api-key: YOUR_API_KEY"
URL structure: {host}/proxy/{routePath}
YOUR_USER_HASH— found on your Dashboard Overview/todos— the route path you created in step 2x-nolxy-api-key— the key from step 3
5Verify in Dashboard
After making requests, verify everything is working:
Next Steps
- →Routes, Circuit Breaker, Caching, Retries, CORS— Routes, Circuit Breaker, Caching, Retries, CORS
- →API key auth, rate limiting, IP restrictions— API key auth, rate limiting, IP restrictions
- →Analytics, logs, webhooks, integrations— Analytics, logs, webhooks, integrations