Systems | Development | Analytics | API | Testing

Latest Posts

Kong Konnect Data Plane Node Autoscaling with Cluster Autoscaler on Amazon EKS 1.29

After getting our Konnect Data Planes vertically and horizontally scaled, with VPA and HPA, it's time to explore the Kubernete Node Autoscaler options. In this post, we start with the Cluster Autoscaler mechanism. (Part 4 in this series is dedicated to Karpenter.)

Announcing Kong's New Open Source AI Gateway with Multi-LLM Support, No-Code AI Plugins, Advanced Prompt Engineering, and More

Today I’m excited to announce that Kong has released six new open source AI plugins in Kong Gateway 3.6 that turn every Kong Gateway deployment into an AI Gateway. These new plugins are available today and are entirely free and open source for everyone. The six new plugins are AI Proxy, AI Request/Response Transformer, AI Prompt Guard, AI Prompt Template, and AI Prompt Decorator.

Leap Forward with Kong Gateway Enterprise 3.6

We're thrilled to announce the general availability of Kong Gateway Enterprise 3.6. This version brings security, efficiency, and standards conformance to enterprise applications. Plus, Kong AI Gateway, which you can learn more about here. Let’s dive into the enhancements and explore the tangible benefits these features bring your organization.

What's new in Kong Gateway 3.6?

We're thrilled to announce the general availability of Kong Gateway 3.6. This version features a high-performance compression algorithm, efficient route matching, and improved observability. Plus, Kong AI Gateway, which you can learn more about here. Let’s dive into the enhancements and explore the tangible benefits these features bring your organization. Looking for more enterprise-grade features? Check out what's new in Kong Gateway Enterprise 3.6.

What's New in Kong Ingress Controller 3.1?

Kong Ingress Controller 3.1 provides brand-new capabilities for keeping your secrets secure. We’ve introduced new KongVault and KongLicense CRDs, and added a way to keep sensitive information in your cluster when using KIC in Konnect. Finally, there’s a quality-of-life improvement that allows you to use a Kubernetes secret to populate a single field in a KongPlugin configuration.

API Security Risks and How to Mitigate Them

Today, more organizations than ever before rely on web and mobile applications and partner integrations to help them automate and scale, making APIs essential to today’s software ecosystem. But because APIs are gateways to sensitive data, this also makes them an attractive target for hackers who are constantly evolving their strategies to access private information.

What Role Does Microsegmentation Play in Zero Trust Security?

With digital transformation shifting networks into the cloud — from remote workforces to online banking — cyberattacks are growing more prevalent and sophisticated. Legacy security models like VPNs and perimeter-based firewalls are proving inadequate in addressing modern threats because perimeters are becoming harder to define.

Kong Konnect Data Plane Elasticity on Amazon EKS 1.29: Pod Autoscaling with VPA

In this series of posts, we will look closely at how Kong Konnect Data Planes can take advantage of Autoscalers running on Amazon Elastic Kubernetes Services (EKS) 1.29 to support the throughput the demands API consumers impose on it at the lowest cost. The series comprises four parts.

Owning Infrastructure vs Owning Policies: Balancing Engineering Autonomy and Platform Control of APIs

We want our engineering teams to move fast and be agile, yet many organizations confuse ownership of the infrastructure with ownership of the policies. The latter is what engineering teams want to rapidly iterate and develop their APIs. The former is the responsibility of the platform team. In this post, we'll talk about how to empower engineers with a secure API infrastructure strategy. This is part of a series on becoming a secure API-first company.