Systems | Development | Analytics | API | Testing

December 2020

Accelerating the Build-Out of Digital Platform in the Public Cloud

In this Kong Summit 2020 session, we will cover the architecture and approach we used to build out our digital platform at Goldman Sachs by leveraging Kong’s API gateway to implement a secure ingress controller for all digital channels, including private/public API and web interfaces. We will discuss how we integrated Kong’s API gateway with AWS native services to implement mTLS, observability and container runtime, as well as share our operational experience of running resilient API workloads in production.

Automating Contract-Centric Experiences to Accelerate Front End Development

This Kong Summit 2020 session focuses on the war stories, and subsequently the patterns HyperCurrent employed, from building an API chargeback/monetization product using OAS, Kotlin, Spring Boot and Kong. We will discuss how a programmatic approach can be used to deliver an elegant REST-ful API while enforcing an anti-corruption layer for domain logic without writing API contracts by hand. By using Kotlin and Spring Boot along with a controller/DTO approach, we can automatically produce an OAS contract, HTML docs, a console and a client side SDK.

Comcast's Self-Service API Gateway Development Journey

Comcast has taken a journey to develop an API gateway initially using open source software and in-house enhancements, and later transitioning to open core commercial software to improve the overall service delivery experience for developers. In this session, Comcast will discuss enhancements that the team made to adapt the community edition of Kong, and subsequently the enterprise edition, to support a self-service, multi-tenant, yet still managed, production API gateway solution, as well as open source contributions made to the Kong community along the way.

Collaborative API Design and Testing with Insomnia

Insomnia Designer is a collaborative API design tool for designing and managing OpenAPI specs. This session will cover how to design and test APIs, as well as how to extend Insomnia with custom plugins. Kong Champion Mert Simsek will dive into how as a team is leveraging Insomnia Designer to share information and data APIs across teams to improve their overall process.

Day 0 to Day 2 With Kuma, Helm and Kubernetes | FinTech Studios

During the early days of finding product-market fit, clouds were small. Often, we start with an EC2 instance here, a managed service there, then some Docker containers, microservices, and wait, Kubernetes! As clouds grow with the teams that maintain them, stable relics and legacy systems remain in production. The effort first goes towards building the future and satisfying clients — they’re paying!

Considerations for Deploying a Multi-Cloud Architecture with Kong Gateway, Kuma Service Mesh and Aviatrix

Building a multi-region or multi-cloud environment for your applications requires a lot of attention. In a typical deployment, you would have an API gateway running close to the several application runtimes. You should enhance your deployment to support different regions in a given cloud, or in an even more distributed and hybrid scenario, multiple services running across other public clouds and on-premise environments.

Decentralizing API Design at NAB | National Australia Bank

Continuing on the journey of building a new API platform, NAB’s primary focus this year has been improving API quality by building tooling for API design and API governance. This Kong Summit 2020 session will cover NAB’s new API search capability, which allows quick API discovery across the organization, and how the team implemented decentralized API governance.

Deploy With Ease and Enable API Automation With Scale

Microservices is a technology that is leading the march toward digital transformation in the world of application development. As the number of APIs increase, the need for a single entry point into the system becomes necessary. This means that a secured, robust, agile API gateway is highly important. However, what we often forget is that the API deployments must also move up with the CI/CD model, along with other components of the project.

JWT Claims With Rate Limiting in Kong

In Kong, plugins can be thought of as policy enforcers. In the case of rate limiting, Kong offers two plugins: An open source one and Enterprise. Both plugins can limit requests per consumer, route, service or globally. Configuring the same plugin is also possible on a more than level. When this occurs, an order of precedence is used to determine which configuration to run. With this capability, it is possible to apply fine-grained policy control. In this article, we cover an advanced use case.

Enter the Next Level: Migrating to Cloud Native Platform

Organizations are moving from centralized data centers to distributed cloud native platforms. Due to the complexity of such a migration, an organization would be running a hybrid multi-platform environment which spans from the old to the new world. It starts at the edge of a system, using functionality provided by an API gateway or platform.

Distributed Multi-Cloud and Multi-Cluster Service Mesh | Kong Mesh

Are you an enterprise architect who is currently facing the challenge to secure and observe service connectivity across every cloud and every cluster, including hybrid Kubernetes and VM environments? Kong Mesh, built on top of CNCF’s Kuma and Envoy, is a universal service mesh delivering simplicity and scalability to every application.

From Zero to Hero: A Roadmap for Automating the Dev Lifecycle Across Any Environment with GitOps

Organizations that embrace GitOps are able to develop and automate their end-to-end software development lifecycle by combining the power of Git, CI/CD and Kubernetes. However the path to get there can be rocky: operating in a multi-cloud environment, working with hybrid microservice and monolith APIs, helping teams discover and publish APIs to use, and moving legacy services to Kubernetes pose no shortage of organizational and technical challenges.

How Organizations Can Leverage Kubernetes as a Universal Computing Standard

With the universal adoption of Kubernetes across cloud and data center platforms, organizations now enjoy a level of consistency across heterogenous infrastructure like never before. This opens up interesting challenges and opportunities for application deployment and IT operations. In this talk, we will discuss how organizations deploy Kubernetes across cloud, data center, branch offices and the edge. We will also cover how organizations can build a universal computing platform across multiple Kubernetes clusters running on heterogenous infrastructure. As a result, they get unprecedent application portability, deployment agility, security and control.

3 Solutions for Avoiding Plain-Text Passwords in Insomnia

When testing APIs, software engineers often repeat identical values across multiple requests, but who wants to waste time typing the same values every time? Insomnia’s environment variables solve this problem by allowing you to define a value once as an environment variable and reference that value wherever it’s needed. Insomnia also enables you to override certain variables using sub-environments or folder environments.

How Papa John's Fast-Tracked External API Innovation With Kong

To keep pace with the company’s rapidly growing menu innovation strategy and expansion to digital channels, elevating the API strategy became a priority at Papa John’s. Learn how the team reduced time to market and enabled API innovation with the growing list of external channels. This session will discuss deploying Kong in a hybrid environment, making use of the Kong Developer Portal and integrating to a CI/CD pipeline to automate deployments.

How to Achieve Zero-Trust Security With Service Mesh | Kong Summit 2020

Are you an enterprise architect who is currently facing the challenge to secure and observe service connectivity across every cloud and every cluster? Kong Mesh, built on top of CNCF’s Kuma and Envoy, is a universal service mesh tailored to the enterprise architect that must provide modern and secure connectivity to the applications that the teams are building.

Infrastructure and Software Development: What Got Us Here Won't Get Us There

In this fireside chat, industry leaders with experience driving revolutions in software development and infrastructure will discuss transitions to microservices, Kubernetes, cloud native and open source across industries. The panel will also discuss how requirements have changed, and what paths these technologies and architectures could take in the future.

How to Set Up Kong Gateway

You’ve decided to install Kong Gateway. Congrats! You’re almost ready to accelerate your microservices journey with the world’s most popular open source API gateway. This article and video will guide you through the short version of our tutorial. If you prefer, here are some more detailed instructions. If you haven’t already, make sure you’ve installed Kong before getting started. It should only take a few minutes.

Learnings from CNCF's Envoy and OPA Creators Matt Klein and Tim Hinrichs

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization — controlling which people and machines can perform which actions — is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability and even where authorization gets enforced architecturally.