Systems | Development | Analytics | API | Testing

Online Meetup: Controlling your Kong Gateway with decK and CI/CD

In this session, DevRel Director Micheal Heap will show you Kong’s declarative configuration capabilities and how to use your CI system to lint and apply these configurations in a variety of environments. Test your changes in a staging environment, then apply exactly the same config to production with a click of a button.

5 Common Mistakes When Developing APIs

An API essentially paly the role of a software intermediary that allows two applications to talk to each other. Every time you use an application like Facebook, send an instant message, or check the weather on your phone, you are using an API. The API is more than middleware however — it’s grown into an innovative business concept that can transform your business and digital strategy. When using APIs though, there are a variety of mistakes that developers can make.

A Beginner's Guide to Microservices

Microservices are a style of architecture used by many organizations for software development. In the past, the IT industry used monolithic or service-oriented architecture (SOA) solutions as the standard. However, the lack of dynamic scalability of this type of architectural system is no longer adequate for the increasing complexity of today’s infrastructures. Microservices addresses this by providing a highly agile and scalable alternative.

The Life of an API Gateway Request (Part 1)

The inner workings of an API gateway request can be difficult to understand because of its scale. To provide some orientation, we will use the real world as a reference, from planet-spanning infrastructure to a person eating a chocolate bar (processing a server response in a plugin). This series will divide the abstraction space of how Kong Gateway processes requests into four different layers.

Managing APIs at Scale in a Kubernetes Environment - Part II

In the last blog, we discussed the challenges in managing APIs at scale in a Kubernetes environment. We also discussed how deploying a Kubernetes Ingress Controller or an API gateway can help you address those challenges. In this blog, we will briefly touch upon some of the similarities and differences between an API gateway and Kubernetes Ingress. We will also discuss a unique approach offered by Kong for the end-to-end lifecycle API management (APIM) in Kubernetes.

Sponsored Post

Application Logging in 2021

Have you ever written a Hello, World! application? In most of these tutorials the first step is to log words to the console. It's an easy way to understand what is going on with your application and readily available in every programming language. The console output is incredibly powerful, and it has become easier than ever to capture that output as logs. As your application grows and evolves you need to implement a structured application log approach.

Token-Based Access Control With Kong, OPA and Curity

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture comes in varying maturity levels, as outlined by the API Security Maturity Model.