Systems | Development | Analytics | API | Testing

API

Enhancing APIOps with decK for Kong Ingress Controller Users

The latest release of decK's APIOps features with the Kong Ingress Controller advances API management and automation in Kubernetes environments. This blog post delves into how this integration streamlines operations, ensuring a more feature-rich API lifecycle management.

Mastering API Gateway Auth: Proven Methods for Secure Connectivity

Securing your API gateway is critical to protect your services from unauthorized access and ensure safe data transmission. In this article, we’ll explore the essentials of API gateway auth, discuss the major authentication methods, and offer guidance for implementing and overcoming challenges in API gateway authentication—providing you with the knowledge to keep your digital assets secure.

How to Create an Application Migration Strategy

Creating an effective application migration strategy is crucial for organizations seeking to migrate their applications to a new environment, such as a cloud platform or a different on-premises infrastructure. A well-planned migration strategy ensures a smooth transition, minimizes downtime, and mitigates potential risks and challenges. Here’s what you need to do in order to create an application migration strategy.

Unpacking Distributed Applications: What Are They? And How Do They Work?

Distributed architectures have become an integral part of modern digital landscape. With the proliferation of cloud computing, big data, and highly available systems, traditional monolithic architectures have given way to more distributed, scalable, and resilient designs. In this blog, we look at what makes an application distributed and how distributed applications work to bring about high availability, scalability, and resilience.

Choreo's Managed Authentication for Single-Page Web Applications

Authentication and authorization play crucial roles in modern application development. Over the years, the way we implement these security measures has evolved, with protocols like OAuth2/OpenID Connect now being widely used. While web applications can manually implement these protocols, it requires a certain level of expertise. Moreover, when it comes to single-page applications (SPAs), additional measures are necessary to securely manage security tokens on the application side.

Decoding the Roles: API Gateway vs Load Balancer

Are you looking to streamline your network traffic but puzzled over whether an API gateway or a load balancer fits your needs? An API gateway centralizes and manages access to your APIs, while a load balancer efficiently distributes incoming traffic across multiple servers. This guide will directly compare api gateway vs load balancer, delineating their strengths to inform your network strategy.

Managing the Lifecycle of Gateways in Kubernetes Using Gateway API

Managing your Gateways on Kubernetes has historically been a very manual process, usually involving the use of Helm for operations like upgrades. At Kong we've been working on the Kong Gateway Operator (KGO) to revolutionize the experience of operating Gateways in production. Say goodbye to the cumbersome, manual processes of managing Gateways. Our operator transforms the configuration and lifecycle management experience, automating the tedious and complex operations that used to bog you down.

API Management Tools: Harnessing Efficiency and Innovation in 2024

Selecting the right API manager is critical for effective API lifecycle management. These tools, known as API managers, not only streamline the entire process from design to deployment but also bolster security and performance. This guide cuts through the noise to help you understand the essentials of API management and introduces you to the top tools excelling in the field in 2024, to equip you with the knowledge to choose the optimal solution for your business.

Getting Started with Choreo for the WSO2 Code Challenge! | Community Call 4

Welcome to the exclusive community call focused on getting started with Choreo, especially for participants of the WSO2 Code Challenge. If you're looking to participate in the challenge and are seeking tips to leverage Choreo to increase your draw entries, this call is for you!

7 Key Features of WSO2 Identity Server 7.0 Every Application and API Developer Should Know

As the open source leader in IAM, we’re excited to release WSO2 Identity Server 7.0. If you’ve been involved in the IAM space for some time, you might remember that WSO2 Identity Server 5.0 released in 2014, which was a revolutionary product at that time. It brought an innovative experience for identity domain experts to model and implement their access management requirements.