Systems | Development | Analytics | API | Testing

Kong

Fortify API Gateway Deployments with decK File Linting

API gateways serve as the final checkpoint for your APIs. As such, gateway configuration is critical to ensuring that your APIs remain secure, available, and responsive. Ensuring that all changes to these configurations are intentional and follow your organization's best practices is key to maintaining a robust API gateway deployment. decK 1.28 adds a brand new feature that allows you to natively validate your gateway configurations against custom rule sets.

Gateway to the Future: Kong Ingress Controller 3.0

The Kubernetes Gateway API is the future of Kubernetes networking, and Kong are all-in. Kong Ingress Controller (KIC) was the first ingress controller to submit a conformance profile, and we continue to lead the pack. KIC 3.0 adds official support for the Gateway API and makes it the default way to configure Kong Gateway on Kubernetes.

Quick Look: Why Federated API Management? - Kong Konnect Control Planes Demo | API Summit

Quick Look: Why Federated API Management? - Kong Konnect Control Planes Demo by Eddy Lee | API Summit Join Eddy Lee, Senior Product Manager at Kong, in this short demonstration focusing on Kong Konnect Control Planes. Eddy highlights the value of federation in API management, showcasing the newly revamped UI of Kong Konnect and how developers can now easily overview and manage control planes, enhancing efficiency and control in API connectivity.

Quick Look: Why Federated API Management? - Deployment Methods Walkthrough | API Summit

Quick Look: Why Federated API Management? - Deployment Methods Walkthrough by Gabriella Angiolillo | API Summit In this brief overview, Gabriella Angiolillo, Director of Product Management at Kong, walks through different deployment models for API infrastructure. Gabriella discusses the pros and cons of centralized and decentralized approaches, highlighting how each impacts development, security, and innovation.

Kong Mesh 2.5: Tailored Use Cases for an Elevated Experience

The latest release of Kong Mesh (version 2.5) brings many new features that push the envelope and make Kong Mesh the logical choice of a service mesh to meet your objectives. In this blog, we'll break down these new features and provide tailored use cases to illustrate how Kong Mesh 2.5 can elevate your service mesh experience. We'll focus on three main categories: flexibility, resiliency, and security.

Tightening Bearer Token Authentication with Proof-of-Possession Tokens Using Kong

In token-based architecture, tokens represent the client’s entitlement to access protected resources. Access tokens (or bearer tokens as they're commonly known) are issued by authorization servers after successful user authentication. The tokens are passed as credentials in the request to the target APIs which inform the API that the bearer of the token is authorized to access the API and perform certain actions.

Debugging and Diagnosing the Kong Gateway With Ease

We’re excited to announce the general availability of Kong Gateway 3.5 for Open Source (OSS). This release enables Javascript developers to extend the Gateway via the WebAssembly layer which is currently in Beta, delivers some enormous observability enhancements, and unlocks top-end performance. Keep reading for the latest on Kong Gateway 3.5 for OSS!

Your Secrets and Tokens are Secure with Kong Gateway Enterprise 3.5

Kong Gateway Enterprise 3.5 is packed with security features to support the use cases demanded by our enterprise customers through major improvements in Secrets Management integrations and our Open-ID Connect (OIDC) plugin. Additionally, we’ve added key security updates for a few of our AWS integrations.