Systems | Development | Analytics | API | Testing

Kong

Kuma 0.5 Released With Advanced TLS, Fault Injection, New GUI and More

We are happy to announce the release of Kuma 0.5! We are particularly proud for this release since it introduces about 30 new features and many improvements and – as usual – every Kuma improvement is always available on both Kubernetes and Universal (VMs) modes. This version of Kuma also ships with a new logo for the project! The new logo for Kuma signifies a new era for the project, driven by more feature maturity as well as more adoption within the community.

Introducing Insomnia Designer: An Open Source Collaborative Editor for API Design

Today, we’re thrilled to announce the release of a major expansion to the Insomnia family of open source developer tools — Insomnia Designer! Providing a collaborative environment for editing GraphQL and REST APIs, Insomnia Designer allows developer teams to more easily embrace spec-first approaches to software design.

Centralized Kong Management with Active Directory/LDAP

Kong Enterprise provides customers with the fastest, most scalable and flexible API management solution in the market. One of Kong’s main advantages is the ability to quickly deploy and integrate with a customer’s ecosystem of already-deployed solutions for identity management and monitoring. As customers choose Kong to drive the decentralization of their applications, it’s critical to empower teams for end-to-end deployment while maintaining security and compliance.

Observability for Your Kubernetes Microservices Using Kuma and Prometheus

A year ago, Harry Bagdi wrote an amazingly helpful blog post on observability for microservices. And by comparing titles, it becomes obvious that my blog post draws inspiration from his work. To be honest, that statement on drawing inspiration from Harry extends well beyond this one blog post – but enough about that magnificent man and more on why I chose to revisit his blog. When he published it, our company was doing an amazing job at one thing: API gateways.

DataStax has launched a preview of Astra Cassandra-as-a-Service for Kong customers

We built Kong to handle any API at any level of scale, but running APIs at scale means storing and managing data at scale. That’s why we’ve always recommended Apache Cassandra for the biggest Kong deployments. Cassandra is powerful and proven, but it does require some skill to install and operate – which is why we’re excited to hear that Datastax is making Cassandra easy to use at any level of scale with DataStax Astra, a Database-as-a-Service built on Apache Cassandra.

Kuma Open Governance and Community Calls

We are very proud to announce some very important community updates for Kuma, with the goal of making Kuma more open and more inclusive to the broader open source ecosystem: The Kuma project now ships with open governance guidelines! This makes Kuma the only Envoy-based control plane for service mesh with an open governance policy in the CNCF landscape.

Kong Enterprise 1.5 Released!

We are pleased to announce the next release of our flagship enterprise offering, Kong Enterprise 1.5! This follow-up release adds additional stability and features on top of our last major release, Kong Enterprise 1.3, which we announced at Kong Summit 2019. Kong Enterprise 1.5 key features include Kong Immunity Consumer Alerts, OIDC improvements, and Kong Developer Portal Application Registration. There are also several smaller features and stability improvements packaged here.

Kong for Kubernetes 0.8 Released!

Kong for Kubernetes is a Kubernetes Ingress Controller based on the Kong Gateway open source project. Kong for K8s is fully Kubernetes-native and provides enhanced API management capabilities. From an architectural perspective, Kong for K8s consists of two parts: A Kubernetes controller, which manages the state of Kong for K8S ingress configuration, and the Kong Gateway, which processes and manages incoming API requests.

Protect Your Applications With Cleafy Plugin for Kong

When protecting your online services, the weakest link is represented by the endpoints – that is, by the end-user devices running web or mobile applications or by external systems leveraging open APIs. As a matter of fact, there is a growing number of targeted attacks leveraging sophisticated techniques such as malicious web injections, mobile overlay and API abuse attacks to perform identity hijacking, account takeover, transaction tampering and payment frauds.