Systems | Development | Analytics | API | Testing

Kong

How to Set Up Kong Gateway

You’ve decided to install Kong Gateway. Congrats! You’re almost ready to accelerate your microservices journey with the world’s most popular open source API gateway. This article and video will guide you through the short version of our tutorial. If you prefer, here are some more detailed instructions. If you haven’t already, make sure you’ve installed Kong before getting started. It should only take a few minutes.

Learnings from CNCF's Envoy and OPA Creators Matt Klein and Tim Hinrichs

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization — controlling which people and machines can perform which actions — is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability and even where authorization gets enforced architecturally.

Microservice Authorization with Open Policy Agent and Kuma | Kong Summit

Applications architected as microservices are becoming more prevalent every day, but just like their monolithic ancestors, microservice applications must adhere to organization-wide constraints around compliance, security, performance, etc. Authorization, controlling which people and machines can perform which actions, is a foundational security problem that requires new solutions in a microservice world because of changes in requirements around performance, availability, and even where authorization gets enforced architecturally.

Modern Data Architecture to Support Healthcare During a Pandemic and Beyond | Kong Summit 2020

COVID-19 has hit our country hard, and the healthcare industry is still reeling from national attention on the blatant disparity of the effects of COVID-19 in specific underserved populations. Recognizing the disparity, healthcare leaders continue to struggle with interoperability and data sharing; we must free the data and move beyond the debate of public or private cloud. It’s time to prepare for the eventuality of leveraging all available cloud environments to handle the data workload and application needs to end digital disparity in healthcare.

Powering your APIs with Kong and AWS Lambda

While the concept of serverless applications has grown over the past years there are plenty of instances where the serverless model doesn’t fit all needs. For those coming from on-premises or hybrid scenarios, moving to serverless might look like needing to move everything or building very differently than you have in the past. In this session we’ll demystify the central component of the serverless movement, AWS Lambda, a serverless compute service that changes how applications are built and managed, but only in some ways.

Practical Implementation of Good Security Hygiene for Mobile Apps | Kong Summit 2020

We all know that we shouldn’t store secrets in mobile apps, but what is the practical alternative? We all know that we should use certificate pinning for our APIs, but how can it be done simply and safely? This talk will describe a real project to explore some of the challenges of implementing good security practice in a large organization and discuss a third-party solution (Approov) which addresses both of the issues above in a relatively simple way using industry standards and working neatly with Kong.

Kong Mesh 1.1 GA Released

After having announced Kuma 1.0 GA with over 70+ new features and improvements (and Kuma 1.0.1 this week), we are finally happy to announce a new major version of Kong Mesh that includes all the latest Kuma features – and more – in a fully supported enterprise package. With Kong Mesh 1.1 we can now deploy the most advanced enterprise service mesh in production across every cloud and private datacenter, on both Kubernetes and virtual machines.