Systems | Development | Analytics | API | Testing

April 2023

Scaling Kubernetes Deployments of Kong

In my previous post on scaling Kong deployments with and without a database, we covered the concepts of deploying Kong with and without a database, as well as using decK, distributed, and hybrid deployments. In this article, we take a tour of some of the possible Kubernetes deployments of Kong. Kubernetes (K8s) is the container orchestration war winner. While there are still deployments using other engines, we see K8s far more.

Four Essential Best Practices for API Management in 2023

The proper management of APIs is vital for organizations seeking to optimize their digital experiences and application performance. API management solutions facilitate the efficient administration of APIs by offering several features such as access control, rate limiting, developer portals, analytics, and API versioning.

API Gateway vs Load Balancer: Which is Right for Your Application?

API gateways and load balancers are useful tools for building modern applications. While they have some functionality overlaps, they’re distinct tools with different purposes and use cases. In this article, we’ll discuss the differences between API gateways and load balancers, give examples of their implementations, and how to choose the right tool for your web application.

Custom Plugin Development with Kong Gateway

Kong plugins are the real muscle behind the Kong ecosystem, giving you the power to implement API gateway policies in a plug and play fashion. In this session, we will deep dive into the Kong plugin architecture, basics around plugin development, testing, and automated delivery. You will have the opportunity to learn about different plugin phases during an API request, unit testing, and installation of a plugin in Kong Gateway.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS

I once heard someone say, “What the cloud migration strategies lack at the moment is a methodology to Lift-and-Shift connections to the cloud.” Let’s digest that. In today’s landscape, maintaining a competitive edge and delivering a high-quality customer experience is becoming synonymous with migrating to the cloud. As of 2022, 57% of organizations are migrating more workloads to the cloud.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Crawl" stage of our Cloud Migration Journey! In this tutorial, we will show you how to de-risk and lift-and-shift your connections using Kong Mesh and #Konnect during a migration to the cloud. The "Crawl" stage is the first phase of our 3-phased approach, and it aims to deploy the monolith and Konnect runtime instance, and onboard the monolith to Konnect.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Walk" stage of the Cloud Migration Journey, where we will take you through the second phase of the migration process. In this stage, we will show you how to de-risk and lift-and-shift your connections during the migration process to the cloud using Konnect and Kong Mesh.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 3: Run

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese In this video, we'll guide you through the "Run" stage of the cloud migration journey, the final step of our crawl-walk-run tutorial. By this point, you should have already deployed the monolith and Konnect runtime instance, onboarded the monolith to Konnect, deployed the Kong Mesh control plane and the on-prem mesh zone, and reconfigured the Konnect runtime-instance so that runtime-instance monolith communication occurs over the mesh.

Imperva and Kong Join Forces to Integrate Leading API Management and Cybersecurity Solutions

Today we’re pleased to announce a new strategic partnership and resale agreement with Imperva. Imperva customers will now be able to directly license Kong Enterprise, the fastest, most feature-rich, and secure API management solution. In addition, Kong customers will be able to use the Imperva API Security plugin within Kong Enterprise. This allows developers to comprehensively secure their APIs and protect their business applications and data against unauthorized access.

Kong Konnect Boosts GraphQL Support, Secure Automation, Service Catalog, and API Analytics

At Kong, our mission is to deliver the best API lifecycle management experience for the cloud native era. Driven by our dedication to meeting the dynamic demands of modern end-to-end API management, we’ve introduced an array of new Kong Konnect features in April, enhancing functionality and elevating the user experience.

Unveiling Kong Ingress Controller in Kong Konnect: The Power of True Unified API Management

As we continue to push the boundaries of API management, we’re excited to announce the beta release of Kong Ingress Controller within Kong Konnect. Revealed at KubeCon + CloudNativeCon Europe 2023, this new integration turns Kong Konnect into the world’s first modern unified end-to-end API management platform.

Kong Mesh & Kuma 2.2 Released with Global Rate Limiting, OpenTelemetry, and More

We’re excited to announce the release of Kong Mesh and Kuma 2.2. This new minor release adds some long-awaited enterprise features, more incremental improvements to our UI and policies, and many more minor features and bug fixes. In order to take advantage of the latest and greatest in service mesh, we strongly suggest upgrading to Kong Mesh 2.2. Upgrading is easy through kumactl or Helm.

Stop Wasting Your Engineers' Time and Start Improving Your System Stability with Kuma

At first glance, that does not make sense, right? The title suggests you should invest your DevOps/Platform team’s time in introducing a new product that most likely will: Through this article, we’ll show you that even though those initial concerns are justified, the overall benefits that can be realized by adopting a service mesh can outweigh any initial effort and investments.

Exposing Services with the Kubernetes Gateway API

The Gateway API is the next generation of the Ingress API, one of the most widely used resources across Kubernetes. We will explore the rich set of features provided by this API and deep dive into a demo-oriented talk where we will learn how to expose applications outside the cluster boundaries. We will leverage the Kong Gateway Operator to deploy the controlplane (Kong Ingress Controller) and dataplane (Kong), then, with the help of the Gateway API, expose services outside the cluster boundaries and perform traffic splitting and load balancing based on different rules.

Scaling Kong Deployments with and without Databases

As the world’s most popular API Gateway, Kong Gateway is flexible and can be adapted to various environments and deployment configurations. This flexibility means some time should be taken to make good architectural decisions for the use cases in mind. For example, the best configuration for a developer’s workstation isn’t the ideal one for a high SLA deployment. Fitness for purpose is therefore the objective.

Intelligent Load Balancing and Reliability with Kong Mesh

Intelligent Load Balancing and Reliability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Mesh provides intelligent load balancing and reliability for your microservices as Ahmed Koshok demonstrates how Kong Mesh enables you to distribute traffic across multiple instances of your microservices and ensures high availability. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced load balancing and reliability features for microservices.

Microservice Observability with Kong Mesh

Microservice Observability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how Kong Mesh enables you to monitor and troubleshoot your microservices in real-time. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced observability features for microservices. With Kong Mesh, you can collect telemetry data, trace requests across multiple services, and visualize service dependencies.

API Discovery and Consumption with Kong Enterprise

API Discovery and Consumption with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Enterprise provides a consistent approach and experience for API publishing and consumption. In this video, Ahmed Koshok demonstrates how developers can easily browse, test, and deploy services through the API catalog, plus a shares a tutorial on how developers can create your own credentials and access the services you need in a self-service manner.

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.

Evolving API Management Requirements of Modern Enterprises

The ability to rapidly assemble and reassemble APIs and microservices has become a competitive differentiator across all industries — allowing organizations to pivot business models and deliver amazing customer experiences at speed and scale. Innovative organizations are pushing to become agile and transforming by adopting cloud native technologies that allow them to build more resilient software quickly that easily scales.

Automating API Creation with Kong Enterprise

Automating API Creation with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed demonstrates how to maintain a stable environment while implementing automation using Kong Enterprise. He discusses the necessary guard rails and policies required to ensure an API is properly documented and that policies are injected, plus the importance of testing an API in Insomnia.REST to verify its end points.

What's new in Kong Ingress Controller 2.9 - Kubernetes Events integration #kubernetes #ingress #kic

This tutorial will dive into the seamless integration with Kubernetes Events with KIC 2.9! We’re all familiar with browsing through logs to diagnose why things aren’t working. With this release, we’ve added the KongConfigurationApplyFailed, which means you can see all your problem resources with a single kubectl query. @ViktorGamo, a principal developer advocate at Kong, will guide you through a new feature.

What's new in Kong Ingress Controller 2.9 - GRPCRoute #gatewayapi #kubernetes #ingress #grpc

This tutorial will dive into a new addition to Gateway API - GRPCRoute - with KIC 2.9! Are you familiar with the power of Gateway API's HTTPRoute for directing traffic? In version 0.6.0 of the Gateway API, the Gateway SIG introduced the experimental GRPCRoute to support gRPC, a popular communication protocol many companies use today. gRPC, built on top of HTTP 2.0, offers a great abstraction for developers, enabling bi-directional streaming and excellent low-latency performance. With auto-generated gRPC servers and clients, you can rely on a well-defined schema for message exchange.