Systems | Development | Analytics | API | Testing

Latest Videos

Automating API Creation with Kong Enterprise

Automating API Creation with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed demonstrates how to maintain a stable environment while implementing automation using Kong Enterprise. He discusses the necessary guard rails and policies required to ensure an API is properly documented and that policies are injected, plus the importance of testing an API in Insomnia.REST to verify its end points.

What's new in Kong Ingress Controller 2.9 - Kubernetes Events integration #kubernetes #ingress #kic

This tutorial will dive into the seamless integration with Kubernetes Events with KIC 2.9! We’re all familiar with browsing through logs to diagnose why things aren’t working. With this release, we’ve added the KongConfigurationApplyFailed, which means you can see all your problem resources with a single kubectl query. @ViktorGamo, a principal developer advocate at Kong, will guide you through a new feature.

What's new in Kong Ingress Controller 2.9 - GRPCRoute #gatewayapi #kubernetes #ingress #grpc

This tutorial will dive into a new addition to Gateway API - GRPCRoute - with KIC 2.9! Are you familiar with the power of Gateway API's HTTPRoute for directing traffic? In version 0.6.0 of the Gateway API, the Gateway SIG introduced the experimental GRPCRoute to support gRPC, a popular communication protocol many companies use today. gRPC, built on top of HTTP 2.0, offers a great abstraction for developers, enabling bi-directional streaming and excellent low-latency performance. With auto-generated gRPC servers and clients, you can rely on a well-defined schema for message exchange.

Role Based Access Control with Kong Enterprise

Role Based Access Control with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how to empower teams for end-to-end delivery. With the increasing need for decentralization, it's essential to have a platform that enables you to manage your apps and services effectively. Kong Enterprise offers a Role-Based Access Control feature that ensures secure and reliable access to your apps and services.

What's new in Kong Ingress Controller 2.9 - Gateway Discovery #kubernetes #ingress #kic

In this tutorial, we'll dive into the seamless integration of dynamic scaling and instance discovery with KIC 2.9! Today’s release allows running the Ingress Controller and the Kong Gateway data planes separately in different pods. This feature enables KIC to scale cost-effectively as it removes the overhead of running the KIC sidecar with every single Gateway instance. Besides memory savings, users should also see a significant decrease in CPU usage.

What's New in Kong Gateway 3.2 and Kong Ingress Controller 2.9

Join us for our March User Call where we will show you all new features and updates in Kong Gateway 3.2 and Kong Ingress Controller 2.9. Tom Brightbill (Group Product Manager) will show you all new and exciting updates in Kong Gateway 3.2. In the new release, you will find new key functionality for everyone who operates Kong Enterprise in a hybrid environment, which further enhances its reliability.

Building a Cloud Agnostic API Platform - Design and Best Practices

In this episode of our Tech Talk series, Siddharth Saikumar (Cloud Security Engineering, Vanguard) and Ragunath Sudalaimuthu (Lead Software Engineer, Lowe’s) will show us design and best practices for building a cloud agnostic API platform. Digital modernization accelerated the API ecosystem in every organization. A successful API strategy is paramount to an organization’s growth trajectory.

API Secrets Management: Integrating Kong Gateway with Your Favorite Identity Manager

What is Kong Secrets Management? Kong Secrets Management is a new feature that allows you to safely store and retrieve secrets used throughout the Kong Gateway deployment, improving the fundamental security of your applications. Securing your entire Kong deployment with centralized secrets makes it easier to manage and build governance around your Kong deployments.