Systems | Development | Analytics | API | Testing

Latest Videos

Making Kong Cloud-Native with the Kong Ingress Controller

There are lots of iconic duos out there. Batman and Robin, Jelly and Ice Cream, and now, Kong and Kubernetes. Join Michael as he shows what Kong Ingress Controller can do for you. We’ll take a look at how to secure your services with the KongPlugin CRD, how to use the Kubernetes events system to help debug when things go wrong, and we’ll even take a sneak peek at the upcoming Kubernetes Gateway API and how you can start using it today.

Custom Plugin Development with Kong Gateway

Kong plugins are the real muscle behind the Kong ecosystem, giving you the power to implement API gateway policies in a plug and play fashion. In this session, we will deep dive into the Kong plugin architecture, basics around plugin development, testing, and automated delivery. You will have the opportunity to learn about different plugin phases during an API request, unit testing, and installation of a plugin in Kong Gateway.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 3: Run

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese In this video, we'll guide you through the "Run" stage of the cloud migration journey, the final step of our crawl-walk-run tutorial. By this point, you should have already deployed the monolith and Konnect runtime instance, onboarded the monolith to Konnect, deployed the Kong Mesh control plane and the on-prem mesh zone, and reconfigured the Konnect runtime-instance so that runtime-instance monolith communication occurs over the mesh.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 1: Crawl Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Crawl" stage of our Cloud Migration Journey! In this tutorial, we will show you how to de-risk and lift-and-shift your connections using Kong Mesh and #Konnect during a migration to the cloud. The "Crawl" stage is the first phase of our 3-phased approach, and it aims to deploy the monolith and Konnect runtime instance, and onboard the monolith to Konnect.

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk

Reach for the Clouds: A Crawl/Walk/Run Strategy with Kong and AWS - Part 2: Walk Brought to you by @KongInc Senior Partner Developer Danny Freese Welcome to the "Walk" stage of the Cloud Migration Journey, where we will take you through the second phase of the migration process. In this stage, we will show you how to de-risk and lift-and-shift your connections during the migration process to the cloud using Konnect and Kong Mesh.

Exposing Services with the Kubernetes Gateway API

The Gateway API is the next generation of the Ingress API, one of the most widely used resources across Kubernetes. We will explore the rich set of features provided by this API and deep dive into a demo-oriented talk where we will learn how to expose applications outside the cluster boundaries. We will leverage the Kong Gateway Operator to deploy the controlplane (Kong Ingress Controller) and dataplane (Kong), then, with the help of the Gateway API, expose services outside the cluster boundaries and perform traffic splitting and load balancing based on different rules.

Intelligent Load Balancing and Reliability with Kong Mesh

Intelligent Load Balancing and Reliability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Mesh provides intelligent load balancing and reliability for your microservices as Ahmed Koshok demonstrates how Kong Mesh enables you to distribute traffic across multiple instances of your microservices and ensures high availability. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced load balancing and reliability features for microservices.

Microservice Observability with Kong Mesh

Microservice Observability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how Kong Mesh enables you to monitor and troubleshoot your microservices in real-time. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced observability features for microservices. With Kong Mesh, you can collect telemetry data, trace requests across multiple services, and visualize service dependencies.

API Discovery and Consumption with Kong Enterprise

API Discovery and Consumption with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Enterprise provides a consistent approach and experience for API publishing and consumption. In this video, Ahmed Koshok demonstrates how developers can easily browse, test, and deploy services through the API catalog, plus a shares a tutorial on how developers can create your own credentials and access the services you need in a self-service manner.

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.