Systems | Development | Analytics | API | Testing

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.

Evolving API Management Requirements of Modern Enterprises

The ability to rapidly assemble and reassemble APIs and microservices has become a competitive differentiator across all industries — allowing organizations to pivot business models and deliver amazing customer experiences at speed and scale. Innovative organizations are pushing to become agile and transforming by adopting cloud native technologies that allow them to build more resilient software quickly that easily scales.

Automating API Creation with Kong Enterprise

Automating API Creation with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed demonstrates how to maintain a stable environment while implementing automation using Kong Enterprise. He discusses the necessary guard rails and policies required to ensure an API is properly documented and that policies are injected, plus the importance of testing an API in Insomnia.REST to verify its end points.

What's new in Kong Ingress Controller 2.9 - Kubernetes Events integration #kubernetes #ingress #kic

This tutorial will dive into the seamless integration with Kubernetes Events with KIC 2.9! We’re all familiar with browsing through logs to diagnose why things aren’t working. With this release, we’ve added the KongConfigurationApplyFailed, which means you can see all your problem resources with a single kubectl query. @ViktorGamo, a principal developer advocate at Kong, will guide you through a new feature.

What's new in Kong Ingress Controller 2.9 - GRPCRoute #gatewayapi #kubernetes #ingress #grpc

This tutorial will dive into a new addition to Gateway API - GRPCRoute - with KIC 2.9! Are you familiar with the power of Gateway API's HTTPRoute for directing traffic? In version 0.6.0 of the Gateway API, the Gateway SIG introduced the experimental GRPCRoute to support gRPC, a popular communication protocol many companies use today. gRPC, built on top of HTTP 2.0, offers a great abstraction for developers, enabling bi-directional streaming and excellent low-latency performance. With auto-generated gRPC servers and clients, you can rely on a well-defined schema for message exchange.

Kong Enterprise & Kong Konnect with Amazon VPC Lattice

At Kong, we’re always looking to expand the experience of running our products in the AWS cloud. As we steadily move into 2023, we want to continue this streak because we see firsthand the tremendous growth and success it provides our customers. Today, we’re excited to announce that the Kong API management platforms, Kong Enterprise and Kong Konnect, are validated integrations with Amazon VPC Lattice.

Role Based Access Control with Kong Enterprise

Role Based Access Control with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how to empower teams for end-to-end delivery. With the increasing need for decentralization, it's essential to have a platform that enables you to manage your apps and services effectively. Kong Enterprise offers a Role-Based Access Control feature that ensures secure and reliable access to your apps and services.

What's new in Kong Ingress Controller 2.9 - Gateway Discovery #kubernetes #ingress #kic

In this tutorial, we'll dive into the seamless integration of dynamic scaling and instance discovery with KIC 2.9! Today’s release allows running the Ingress Controller and the Kong Gateway data planes separately in different pods. This feature enables KIC to scale cost-effectively as it removes the overhead of running the KIC sidecar with every single Gateway instance. Besides memory savings, users should also see a significant decrease in CPU usage.