Systems | Development | Analytics | API | Testing

Kong

Kong-plement Your ServiceHub With a Developer Portal

Two of the best (in my opinion) features in Konnect are the ServiceHub and Developer Portal. However, they’re also two of the most misunderstood. Aren’t they the same thing? Why would you need a ServiceHub vs. Developer Portal? Well, I’m glad you asked! The really quick version is that ServiceHub is like your warehouse, where all your products are stored. It’s a comprehensive collection of everything that you have. Your Developer Portal is more like your storefront.

Minimizing Security Risks in APIs and Microservices

Application Programming Interfaces (APIs) and microservices are the foundational pillars of digital transformation initiatives. They simplify the development process for our technology teams, enabling them to innovate faster, increase customer engagement and boost business agility. However, while this transformation of business digitally opens doors to limitless opportunities, it also opens doors to many challenges – with one of the most significant challenges being security.

Understanding the Basics of Envoy Configuration

Envoy is a key part of a number of service meshes currently on the market, including Istio and the Kuma CNCF Sandbox project. As such, it is often helpful to better understand how Envoy is configured to operate as a data plane in a service mesh. In this session, you’ll learn about the basics of Envoy configuration, like listeners, filters, clusters, and endpoints.

Kubernetes Ingress gRPC Example With a Dune Quote Service

APIs come in all different shapes and forms. In this tutorial, I’ll show you a Kubernetes Ingress gRPC example. I’ll explain how to deploy a gRPC service to Kubernetes and provide external access to the service using Kong’s Kubernetes Ingress Controller. And to hype you up a little bit about the upcoming live-action movie, Dune, based on Frank Herbert’s book, I created a Kubernetes service that delivers Dune quotes.

The Real Cost of API Downtime

Last week, the digital world experienced a power outage. A major distributed edge computing platform experienced a software bug that led to the collapse of their Domain Name System (DNS), or the Internet’s way to map domain names (i.e. united.com) to IP addresses. The consequences were costly. So what is the real cost of downtime? When a DNS system within a globally recognized edge platform fails, it causes downtime for a huge amount of international enterprises.

8 Common API Gateway Request Transformation Policies

API gateway request transformation policies are incredibly powerful. There are many situations when an API developer can take advantage of request transformations to adjust the shape and values of a request to cleanly fit their API. Let’s say you’re deprecating a certain endpoint for your API, but you still need to support the old specification for a transition period.