Systems | Development | Analytics | API | Testing

Latest Posts

Custom Authentication and Authorization Framework with Kong

Kong Enterprise provides many out-of-the-box plugins to support various access control solutions like basic authentication, key authentication, JWT, LDAP, OAuth 2.0, OpenID Connect, among others. Most of the time, you should be able to find a plugin to suit your needs to protect your private or public APIs using Kong Enterprise without the need of writing your own plugins.

How to Use Kong Gateway With K3s For IoT and Edge Computing on Kubernetes

Once upon a time, we had these giant structures where thousands of people would congregate to share ideas, pamphlets filled to the margins with buzz words and cheap, branded t-shirts. Yep, tech conferences – oh what a relic of the past that I miss. It used to be part of my job to attend these.

Kuma 0.6.0 Released With Hybrid Universal Support for Service Mesh and CNCF Donation

We are happy to announce the much-anticipated Kuma 0.6 release! This new release ships with major improvements, especially when it comes to supporting service meshes that can span across multiple clouds, multiple Kubernetes clusters and hybrid platforms (Kubernetes + VMs) in enterprise environments. Kuma has also been donated to the CNCF as a Sandbox project: the first Envoy-based service mesh to ever be donated to the foundation. Let’s unwrap these announcements.

Drive API Adoption, Usage and Retention with Moesif Plugin for Kong

Through a new partnership with Kong featuring native integration with Moesif, API providers will now have an enhanced Kong experience—enabling API teams to monitor their APIs and stay informed of issues and behaviors impacting their customers. With user behavior analytics, Kong customers can now track the entire customer journey with Moesif from initial sign up to the first API call and empower engineering and business teams with the product insights needed to experiment and take action.

GitOps for Kong: Managing Kong Declaratively with decK and GitHub Actions

Kong’s fast, lightweight and scalable API management solution helps improve developer productivity by automating the delivery of API management. One way Kong automates API management is through a continuous integration and continuous delivery (CI/CD) process by leveraging Kong’s decK (declarative configuration for Kong) and GitHub Actions. Kong’s decK provides a command line interface (CLI) to manage Kong in a declarative way.

Dear Load Balancers,

When I started my journey into Kubernetes, you were always there for me when I needed to expose a service externally. We started small with just exposing one service, and you were dependable and easy to set up. But things have changed. My application has grown, and now the cluster has 10 services that need to be exposed externally. This has made communication difficult. I wonder what will happen when we have 50 services?

Access Control Lists with Kong

Access control is an important function in our daily lives. Access control is provided in many different realms. For example, a physical door, a software program, or an API. Access control simply means that you are controlling who/what can access something. We’re going to focus this discussion around access control for an API. Businesses benefit from providing APIs to their internal (and external) developers.

Kong for Kubernetes 0.9 Released With Encrypted Plugin Configuration and More!

Kong for Kubernetes is a Kubernetes Ingress Controller and a full-fledged edge-router which can route traffic to any destination of your choice. In addition to Ingress management, it provides enhanced security and management capabilities. With Kong, you can use Kubernetes not just for running your workloads but also for securing and monitoring connectivity between your workloads – all managed via Kubernetes manifests and CI/CD processes.

How to Automate Deployment of Microservices With an API Gateway to a Multi-Cloud Environment

In today’s enterprise computing landscape, multi-cloud organizations are quickly becoming the norm rather than the exception. By leveraging an API-first strategy with a microservice-based architecture, companies can achieve significant speed to market across multiple clouds. In order to achieve this, container orchestration and a well-designed CI/CD strategy are essential components in this journey.