Systems | Development | Analytics | API | Testing

Kong

Kong Mesh & Kuma 2.2 Released with Global Rate Limiting, OpenTelemetry, and More

We’re excited to announce the release of Kong Mesh and Kuma 2.2. This new minor release adds some long-awaited enterprise features, more incremental improvements to our UI and policies, and many more minor features and bug fixes. In order to take advantage of the latest and greatest in service mesh, we strongly suggest upgrading to Kong Mesh 2.2. Upgrading is easy through kumactl or Helm.

Stop Wasting Your Engineers' Time and Start Improving Your System Stability with Kuma

At first glance, that does not make sense, right? The title suggests you should invest your DevOps/Platform team’s time in introducing a new product that most likely will: Through this article, we’ll show you that even though those initial concerns are justified, the overall benefits that can be realized by adopting a service mesh can outweigh any initial effort and investments.

Exposing Services with the Kubernetes Gateway API

The Gateway API is the next generation of the Ingress API, one of the most widely used resources across Kubernetes. We will explore the rich set of features provided by this API and deep dive into a demo-oriented talk where we will learn how to expose applications outside the cluster boundaries. We will leverage the Kong Gateway Operator to deploy the controlplane (Kong Ingress Controller) and dataplane (Kong), then, with the help of the Gateway API, expose services outside the cluster boundaries and perform traffic splitting and load balancing based on different rules.

Scaling Kong Deployments with and without Databases

As the world’s most popular API Gateway, Kong Gateway is flexible and can be adapted to various environments and deployment configurations. This flexibility means some time should be taken to make good architectural decisions for the use cases in mind. For example, the best configuration for a developer’s workstation isn’t the ideal one for a high SLA deployment. Fitness for purpose is therefore the objective.

Intelligent Load Balancing and Reliability with Kong Mesh

Intelligent Load Balancing and Reliability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Mesh provides intelligent load balancing and reliability for your microservices as Ahmed Koshok demonstrates how Kong Mesh enables you to distribute traffic across multiple instances of your microservices and ensures high availability. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced load balancing and reliability features for microservices.

Microservice Observability with Kong Mesh

Microservice Observability with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed Koshok demonstrates how Kong Mesh enables you to monitor and troubleshoot your microservices in real-time. Kong Mesh is a service mesh built on top of the Envoy proxy that provides advanced observability features for microservices. With Kong Mesh, you can collect telemetry data, trace requests across multiple services, and visualize service dependencies.

API Discovery and Consumption with Kong Enterprise

API Discovery and Consumption with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. Discover how Kong Enterprise provides a consistent approach and experience for API publishing and consumption. In this video, Ahmed Koshok demonstrates how developers can easily browse, test, and deploy services through the API catalog, plus a shares a tutorial on how developers can create your own credentials and access the services you need in a self-service manner.

Zero-trust security with Kong Mesh

Zero-trust security with Kong Mesh Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed explains the core concepts of zero-trust security and demonstrates how Kong Mesh enables you to implement zero-trust security for your microservices. Kong Mesh is a service mesh built on top of the Envoy proxy that provides secure communication between microservices. With Kong Mesh, you can encrypt traffic between services, implement fine-grained access controls, and enforce security policies at the network layer.

Evolving API Management Requirements of Modern Enterprises

The ability to rapidly assemble and reassemble APIs and microservices has become a competitive differentiator across all industries — allowing organizations to pivot business models and deliver amazing customer experiences at speed and scale. Innovative organizations are pushing to become agile and transforming by adopting cloud native technologies that allow them to build more resilient software quickly that easily scales.

Automating API Creation with Kong Enterprise

Automating API Creation with Kong Enterprise Brought to you by @KongInc Senior Solutions Engineer Ahmed Koshok. In this video, Ahmed demonstrates how to maintain a stable environment while implementing automation using Kong Enterprise. He discusses the necessary guard rails and policies required to ensure an API is properly documented and that policies are injected, plus the importance of testing an API in Insomnia.REST to verify its end points.