Systems | Development | Analytics | API | Testing

Kong

Getting Started with #ServiceMesh Workshop featuring #Kuma and #KongMesh

Service mesh is the future of application connectivity, offering immediate enhancements to your application traffic’s security, reliability, and observability. It abstracts network complexities, offering discovery, routing, and more functionalities. But you may ask, isn’t all of this already available in our frameworks? In this workshop, you’ll discover just how straightforward it is to get started with service mesh in a Kubernetes environment, and we’re not restricting ourselves to any specific language or framework. We aim to be inclusive, addressing developers from diverse backgrounds.

Kong Mesh Quickstart for OpenShift 4.12

Kong Mesh Quickstart for OpenShift 4.12 Brought to you by @KongInc Senior Partner Developer Danny Freese 💡Discover how to install Kong Mesh on OpenShift 4.12 in a quick and straightforward way. Whether you're a seasoned developer or just starting out, this tutorial is for you! Discover how to revolutionize your GraphQL Federation authorization with the power of Kong Konnect and Kong Mesh!

Streamline Service Mesh Observability with Kuma & OpenTelemetry

👋 Hello, Kong Builders! We are back with another insightful stream with your favorite host, Viktor Gamov. Join us in diving head-first into Service Mesh Observability and OpenTelemetry. 🌐🔎 In this livestream, we're honing in on observability, with OpenTelemetry. 📈📋 Observability plays a vital role in comprehending and managing microservices, enabling us to effectively diagnose and resolve system issues and gain real-time insights into our system's behavior.

API Platform and Data Mesh: Why Bring Them Together

Enterprises are investing in data mesh initiatives to accelerate how decisions are made and to create novel experiences based on machine learning models. Similarly, enterprises are investing in API platform initiatives to productize business domains (or bounded contexts in domain-driven design parlance) as self-service digital assets that accelerate innovation and improve business agility. Both initiatives are typically run as separate work streams.

In the Driver's Seat with Konnect - Uplevel Your API Management Strategy

Join Manjiri Tapaswi (Senior Software Engineer, Konnect at Kong) for a ride around your Konnect organization’s administrative management! Learn how to secure and govern your environment by setting up Teams and Roles, or enable SSO through an external authenticator. We’ll go over how to leverage System Accounts for hardening your automation and integrations. Tune up your security risks monitoring, compliance maintenance, and responding to potential security incidents when they occur, by setting up and tracking Audit Logs.

Guide to API Testing: Understanding the Basics

APIs come in many different shapes and sizes and have been around for a long time. Whether you are brand new to the topic or think about your day-to-day in terms of RESTful methods, you are using APIs every day. “This morning I PUT on my clothes, went to the kitchen to GET a cup of coffee, sat at my computer and felt the satisfaction of finding emails to DELETE that don’t need any action from me. My morning ended up being pretty 200 OK.”

Zero Trust Security: The What, Why and How

If you’ve been researching API security, you’ve likely seen the term “Zero Trust.” And you may already know that organizations can use Zero Trust to help protect their APIs from attacks. What you may not know is that Zero Trust is one of the best models for API security. According to Microsoft, “96 percent of security decision-makers state that Zero Trust is critical to their organization’s success.” But what is Zero Trust exactly?

Understand the Differences: API Authentication vs API Authorization

If you landed on this blog post, chances are that you care about keeping your API secure. It’s an important topic to discuss: API exploits are on the rise, and you don’t want unauthorized users accessing your data. A big part of that security is implementing API authentication and API authorization. These API access control measures are a foundational aspect of API security.