Systems | Development | Analytics | API | Testing

What's Happening To Middleware In The Cloud-Native Era?

Spending two decades in the middleware field has given me deep insight into the evolution of this technology domain. I began my career as a software engineer in a platform group, building reusable components using technologies like object linking and embedding (OLE), the distributed component object model (DCOM) and common object request broker architecture (CORBA).

Managing Kuma Tokens with HashiCorp Vault

Managing tokens in Kuma can be a challenging and manual process. Both the user and dataplane token lifetimes need to be manually tracked and managed. This ultimately becomes a burden for DevOps, and long life tokens end up being used. In this session, you will learn how to: Kong Builders is a livestream series that takes our developer-focused toolsets and puts them on display in the best venue possible – building applications and connecting workloads.

Transforming Kong Logs for Ingestion into Your Observability Stack

As a Solutions Engineer here at Kong, one question that frequently comes across my desk is “how can I transform a Kong logging plugin message into a format that my insert-observability-stack-here understands, i.e. ELK, Loki, Splunk, etc.?” In this blog, I’m going to show you how to easily accomplish converting a Kong logging payload to the Elastic Common Schema. In order to accomplish this task, we’re going to be running Kong Gateway in Kubernetes and using two Kong plugins.

Dynamic Routing Based on JWT Token's Claim with Kong Konnect

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI as it makes the implementation easier. But behind the scenes they might need to tailor specific configuration/applications for them, hence routing their request based on their identity.

Brad x Ahmed: Elements for Building Cloud Native Applications

From time to time, Kong’s Brad Drysdale and Ahmed Koshok exchange emails about the latest trends in tech. In this exchange, Brad and Ahmed discuss the continued quest for more innovation faster, the role of automation in API strategy, and more. from: Brad to: Ahmed date: Oct. 29, 2022, 6:58 PM subject: Elements for Building Cloud Native Applications Greetings from Australia, Ahmed!

4 Ways to Leverage User Metrics in Moesif

Without users, products mean nothing. So why is it that so many organizations analyze API and user behavior metrics as an afterthought? My theory would be that they just don’t have the right tools in place to actually collect, analyze, and use these usage metrics. With so many products aiming to improve their user experience and customer satisfaction, tools like Moesif are exactly what is needed.

New WSO2 Research Reveals Where Organisations Are Floundering to Successfully Digitise Services

While APIs are at the heart of digital transformation, 74% of survey respondents do not have a fully rolled out API strategy. 87% of respondents value open-source platforms combined with hybrid environments that deliver flexibility and enable deployment choices. 95% of respondents are experiencing challenges with their CIAM platform.

Kong Konnect Updates: Increased Security and Streamlined API Management

We’re excited to announce new features in Kong Konnect, including the ability to take advantage of identity management APIs, streamlined certificate management, and latency metrics as part of Analytics. Read on to learn about these features and how kong helps future-proof API security.

How PIM Integrations Benefits From ERP

Every system has different functions, some of them can be integrated to bring bigger solutions to businesses, specially for those that manage a big amount of data. In case of eCommerce businesses, information has to be integrated within many systems, such as ERP, so it will be accessible with in the company’s logistic processes.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.