Systems | Development | Analytics | API | Testing

Intelligent Load Balancing and Reliability with Kong Mesh

Intelligent Load Balancing and Reliability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Mesh provides intelligent load balancing and reliability for your microservices as Ahmed Koshok demonstrates how Kong Mesh enables you to distribute traffic across multiple instances of your microservices and ensures high availability. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced load balancing and reliability features for microservices.

Microservice Observability with Kong Mesh

Microservice Observability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how Kong Mesh enables you to monitor and troubleshoot your microservices in real-time. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced observability features for microservices. With Kong Mesh, you can collect telemetry data, trace requests across multiple services, and visualize service dependencies.

Unlocking the Power of Lambdas in Ruby

Lambdas are a powerful feature of the Ruby language. They allow you to wrap logic and data into a portable package. In this post, we’ll cover how and when to use lambdas. You'll also learn about the difference between lambdas and Procs, and the performance profile of lambda functions. The code examples have been tested with 2.6 and 2.7 and should work with most modern Rubys. Use the links below to skip ahead in the tutorial.

Managing the Cost and Complexity of Hybrid Cloud Infrastructure

More enterprises are striving to become data-driven so they deliver greater value to their customers, shareholders, employees and society at large. But many are still struggling with data infrastructure. To reap the benefits, learn how companies are solving key challenges, from managing the rapid growth of data to ensuring security and compliance, in this discussion with Dan McConnell, SVP of product management, Enterprise Infrastructure.

Lenses 5.1 - A 1st class ticket to be event-driven in AWS

Hello again. We strive to improve the productivity of developers building event-driven applications on the technology choices that best fit your organization. AWS continues to be a real powerhorse for our customers. Not just for running the workloads, but in supporting them with their native services: MSK Kafka, MSK Connect and now increasingly Glue Schema Registry. This is bringing a strong alternative to Confluent and their Kafka infrastructure offerings.

Secret rotation for Kafka Connect connectors with AWS Secret Manager

With version 5.1, Lenses is now offering enterprise support for our popular open-source Secret Provider to customers. In this blog, we’ll explain how secrets for Kafka Connect connectors can be safely protected using Secret Managers and walk you through configuring the Lenses S3 Sink Connector with the Lenses Secret Provider plugin and AWS Secret Manager.

API Discovery and Consumption with Kong Enterprise

API Discovery and Consumption with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Enterprise provides a consistent approach and experience for API publishing and consumption. In this video, Ahmed Koshok demonstrates how developers can easily browse, test, and deploy services through the API catalog, plus a shares a tutorial on how developers can create your own credentials and access the services you need in a self-service manner.

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.