Systems | Development | Analytics | API | Testing

Latest Videos

The Most Prevalent Code Flaws in API Development and How Hackers Exploit Them

- The wide adoption of cloud-native and microservice-based applications to connect applications, data, and devices across the enterprise has led to an exponential growth in APIs. But as the API ecosystem grows, so does the risk of exposing sensitive data. APIs get directly to critical and sensitive data, making them a valuable target for hackers. How can you ensure your APIs are protected from malicious attacks and unauthorized access?

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes

How to Quickly Deploy Kong Gateways in Konnect Docker, Serverless, and Kubernetes In this video, Senior Director, Developer Relations, Michael Heap, walks through three efficient ways to deploy Kong Gateway with Konnect. Learn how to get started with Kong Gateway using Docker on your local machine, how to make your gateway publicly accessible using a Serverless Gateway, and how to set up a production deployment on Kubernetes (Amazon EKS).

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform

Kong Konnect Demo: Revolutionize Your API Management with a Unified Cloud-Native Platform In this video, Vice President Product Management, Ross Kukulinski showcases how Kong Konnect addresses the challenges of API security, multi-cloud deployments, and AI workload governance. Kong Konnect is one platform to manage them all in one unified control plane: API gateways, AI gateways, ingress, and service meshes.

Enhancing Resilience: Introducing Fallback Configurations in Kong Ingress Controller 3.2

As Kong Ingress Controller is used widely in the field, ensuring its reliable and resilient error handling is crucial to us. Kong Ingress Controller 3.2 introduces a Fallback Configuration feature, designed to make sure a single mistake made in your manifests doesn't halt the whole configuration update pipeline. In this User Call, we'll cover: The Need for the Feature: Understand the critical scenarios that highlighted the necessity for improved error-handling mechanisms.

Meet Kong Konnect, Your API Command Center

Build new products faster, improve security, and reduce costs with Kong Konnect. Kong Konnect is one platform to manage them all in one unified control plane: API gateways, AI gateways, ingress, and service meshes. So you can move fast without losing control. That means scaling up to meet demand — and exceeding customer expectations with superior digital experiences. Deployed as a hybrid or a fully managed service, Kong Konnect automates security, federates governance, and lets you adopt AI faster with multi-LLM support.

Bringing Kubernetes-native Sidecars to Kong Mesh

If you're keeping an eye on the service mesh ecosystem, you may have heard a lot of debate about sidecars. Up until recently, there have been some real pain points with sidecars in Kubernetes. As surprising as it sounds, there was actually no real concept of a sidecar at all. With Kubernetes v1.29, a number of those points have been solved with the release of the native sidecars feature. Kong Mesh's most recent release v2.7 adds support for this game-changing feature.

Down the AI Rabbit Hole: Leveraging AI in Your Projects Without Ending Up Lost in Wonderland

Generative AI is transforming the world around us, and is quickly becoming a part of the conversation as we greenfield new features and applications. It is very alluring to deliver AI features into our existing products, and think about new projects we might build around AI. However, you might have already found that the journey into the realm of AI often feels like tumbling down the rabbit hole into wonderland - a maze of complexity and uncertainty.

What is an AI Gateway?

In this session, Marco Palladino, CTO and co-founder of Kong, discusses the importance of AI gateways in supporting the growing demand for AI and API usage. He explains how Kong's AI Gateway simplifies the creation of AI applications by providing a unified infrastructure layer that abstracts common requirements, such as authentication, authorization, traffic control, and observability.