Systems | Development | Analytics | API | Testing

API

Transforming Kong Logs for Ingestion into Your Observability Stack

As a Solutions Engineer here at Kong, one question that frequently comes across my desk is “how can I transform a Kong logging plugin message into a format that my insert-observability-stack-here understands, i.e. ELK, Loki, Splunk, etc.?” In this blog, I’m going to show you how to easily accomplish converting a Kong logging payload to the Elastic Common Schema. In order to accomplish this task, we’re going to be running Kong Gateway in Kubernetes and using two Kong plugins.

Dynamic Routing Based on JWT Token's Claim with Kong Konnect

A common use case that is frequently requested is how to dynamically route requests based on authentication attributes. An example of this technique is routing requests to relevant upstream services based on claims contained in a JWT token. Admins would like all their clients to go to the same URI as it makes the implementation easier. But behind the scenes they might need to tailor specific configuration/applications for them, hence routing their request based on their identity.

Brad x Ahmed: Elements for Building Cloud Native Applications

From time to time, Kong’s Brad Drysdale and Ahmed Koshok exchange emails about the latest trends in tech. In this exchange, Brad and Ahmed discuss the continued quest for more innovation faster, the role of automation in API strategy, and more. from: Brad to: Ahmed date: Oct. 29, 2022, 6:58 PM subject: Elements for Building Cloud Native Applications Greetings from Australia, Ahmed!

4 Ways to Leverage User Metrics in Moesif

Without users, products mean nothing. So why is it that so many organizations analyze API and user behavior metrics as an afterthought? My theory would be that they just don’t have the right tools in place to actually collect, analyze, and use these usage metrics. With so many products aiming to improve their user experience and customer satisfaction, tools like Moesif are exactly what is needed.

New WSO2 Research Reveals Where Organisations Are Floundering to Successfully Digitise Services

While APIs are at the heart of digital transformation, 74% of survey respondents do not have a fully rolled out API strategy. 87% of respondents value open-source platforms combined with hybrid environments that deliver flexibility and enable deployment choices. 95% of respondents are experiencing challenges with their CIAM platform.

Kong Konnect Updates: Increased Security and Streamlined API Management

We’re excited to announce new features in Kong Konnect, including the ability to take advantage of identity management APIs, streamlined certificate management, and latency metrics as part of Analytics. Read on to learn about these features and how kong helps future-proof API security.

How PIM Integrations Benefits From ERP

Every system has different functions, some of them can be integrated to bring bigger solutions to businesses, specially for those that manage a big amount of data. In case of eCommerce businesses, information has to be integrated within many systems, such as ERP, so it will be accessible with in the company’s logistic processes.

Not All MFA is Created Equal, Especially in CIAM

Since October is cybersecurity awareness month, it’s a great time to revisit the question of what are the best ways to secure user authentication in CIAM. In many industries (finance and healthcare, to name a few), regulations require the use of multifactor authentication (MFA) to protect access to sensitive data and transactions.

The Power of Unlocking and Unifying Data

Every day, humans produce 2.5 quintillion bytes of data. Just to put that number into perspective, there are 18 zeros in a quintillion. Unifying data can allow you to take advantage of it and benefit your business. The vast majority of organizations have collected nearly endless amounts of data. Yet, these same organizations are starving for information that can be used to make more informed decisions. Information may be stored in databases that don’t talk to each other.

Preventing PII in Test environments

Data privacy and security are a top concern for most organizations. It’s easy to see why given changes over the past few years. These types of protections can be great for us as consumers. However, they also make it extremely difficult to create realistic production simulations in pre-production. It’s hard to rapidly develop new applications if you can’t iterate against realistic data.