Systems | Development | Analytics | API | Testing

API

Managing APIs at Scale in a Kubernetes Environment - Part II

In the last blog, we discussed the challenges in managing APIs at scale in a Kubernetes environment. We also discussed how deploying a Kubernetes Ingress Controller or an API gateway can help you address those challenges. In this blog, we will briefly touch upon some of the similarities and differences between an API gateway and Kubernetes Ingress. We will also discuss a unique approach offered by Kong for the end-to-end lifecycle API management (APIM) in Kubernetes.

Sponsored Post

Application Logging in 2021

Have you ever written a Hello, World! application? In most of these tutorials the first step is to log words to the console. It's an easy way to understand what is going on with your application and readily available in every programming language. The console output is incredibly powerful, and it has become easier than ever to capture that output as logs. As your application grows and evolves you need to implement a structured application log approach.

Token-Based Access Control With Kong, OPA and Curity

As APIs and microservices evolve, the architecture used to secure these resources must also mature. Utilizing a token-based architecture to protect APIs is a robust, secure and scalable approach, and it is also much safer than API keys or basic authentication. However, token-based architecture comes in varying maturity levels, as outlined by the API Security Maturity Model.

5 Common API Management Tools and their Usage

Customers today expect feature-reach and user-friendly access to technology that makes their lives easier. They expect to use this technology to engage with companies anywhere, anytime, and with any device. Organizations must be able to not just meet, but exceed, these expectations. Failing to do so could result in lost revenue as customers move on to competitors.

Microservices Trends: The Top 4 Trends That Will Shape Microservices Development In 2022

Unlike a traditional monolithic approach, in which all components form an inseparable entity, microservices work in synergy to accomplish the same tasks while being separate. Each of these components or processes is a microservice. Granular and lightweight, this type of software development allows a similar process to be used in multiple applications. This is a key element in optimizing application development for a cloud-native model.

ZeroLB in a Decentralized World

One of the things that’s quite interesting about service mesh is that it has not been a very well-defined category for a very long time. Service mesh is not a means to an end. By looking at its adoption, we’ve been seeing a refocus on the end use case that service mesh allows us to enable. Some are around observability while others are around security and trust – being able to provide that identity to all of our services.

Services Don't Have to Be Eight-9s Reliable

In our first episode of Kongcast, I had the pleasure of speaking with Liz Fong-Jones, principal developer advocate at Honeycomb, about the concept of error budgets for service level objectives (SLOs) and how to accelerate software delivery with observability. Check out the transcript and video from our conversation below, and be sure to subscribe to get email alerts for the latest new episodes.