Systems | Development | Analytics | API | Testing

Microservices

Learnings from CNCF's Envoy and OPA Creators Matt Klein and Tim Hinrichs

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization — controlling which people and machines can perform which actions — is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability and even where authorization gets enforced architecturally.

Microservice Authorization with Open Policy Agent and Kuma | Kong Summit

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization, controlling which people and machines can perform which actions, is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability, and even where authorization gets enforced architecturally.

Microservices vs API

In this article, we’ll cover the key differences between APIs and microservices as answered by our contributors consisting of senior decision-makers and CTOs from technology companies around the world. One of the most popular ways to consume data from a web service is through a web application programming interface (API). By interface, we are referring to an agreement, or schema, that anyone using this API must abide by.

Node.js Microservices: Developing Node.js Apps Based On Microservices

Node.js application developers, in the ever-evolving business landscape, enjoy tangible advantages while incorporating microservices in Node.js apps development. The microservice architecture, or microservices, is a distinct method of software systems development, which attempts to create modules that are single-function, with well-defined operations and interfaces.

Kong Demo: Protecting Microservices with Servicemesh

In this interactive demo, we will show how to encrypt and protect all services inside a service mesh using the Kuma Mutual TLS policy. We will then demonstrate how to control traffic permissions among each individual service using the TrafficPermission policy. In addition to security, Kuma provides traffic metrics using Prometheus and Grafana dashboards, as well as traffic tracing (APM) and traffic logging integrated into managed cloud logging and analytics services.

Observability For Your Microservices Using Kong, Kubernetes, and Prometheus

In this video, Kevin Chen, Developer Advocate at Kong, will explain how to set up Prometheus monitoring with Kong Gateway to get black box metrics and observability for all of your services deployed on Kubernetes. This guide can also be applied to other solutions like StatsD, Datadog, Graphite, InfluxDB etc.

Supporting Legacy Web Services With Kong

Let’s admit it – web services (SOAP) are here to stay for a few more years, and maybe for a long time in some places where there is no business incentive to rebuild them. However, with a decline in new SOAP web services and most applications moving to cloud native architectures, a common query is “how can we support legacy services while moving to microservices?”

What Are Microservices? What You Need to Know

Microservices are small, independently-running applications that perform a single function for a larger application or IT infrastructure. By loosely connecting a number of them together, developers create a pluggable architecture that facilitates the process of updating, upgrading, and scaling the application in response to changing requirements.

API Trends: From Monolithic to Microservices

A lot has happened in the world of APIs management taking us from Monolithic methods to Microservices. From the agile method to the Internet of Things, software development is full of hot trends. They promise to revolutionize the tech industry for years to come. Some of these trends are truly revolutionary, while others are simply a flash in the pan. Software developers’ tend to chase after shiny objects.