Systems | Development | Analytics | API | Testing

Deployment Patterns for API Gateways Within a DMZ

A DMZ – Demilitarized Zone – is a military term, roughly summarized, as an area between two adversaries established as a buffer in order to reduce, or eliminate, the possibility of further conflict. In networking, the term usually refers to an area that acts as a buffer between two segregated networks. Here is a simplified visualization.

Kong Gateway 2.2 released!

We are happy to announce release 2.2 of our flagship open source API gateway! Those were some busy three months since the release of Kong Gateway 2.1! We have pushed a number of patch releases in the 2.1 series, we’ve had our first fully-digital Kong Summit, and of course, we’ve been very busy building new features that are now shipping in Kong Gateway 2.2!

Announcing Kong's AWS DevOps Competency

Kong Enterprise is a service connectivity platform that provides technology teams with the architectural freedom to build, operate, observe, and secure APIs and services anywhere. From Kong’s inception, we’ve been aligned with Amazon Web Services (AWS), enabling our customers to quickly and efficiently deploy Kong on their AWS accounts. As companies move from monolithic to microservice applications and beyond, Kong helps teams manage this transition.

Transform Your Requests/Responses With the Kong Reedelk Transformer Plugin

Creating an API contract and corresponding Kong service are often just the first steps in the API development process. More often than not, the upstream services that are invoked provide a different contract to the one presented to the API consumer. This is especially the case in larger organizations where enterprise applications offer their own out-of-the-box integration contracts. Likewise, you shouldn’t expose the complexity of your upstream systems to your API consumer.

Secure & Govern APIs & Services | Kong Summit 2020 Demo

As the number of services and API teams are growing, control by a central IT team is declining. Rather than enforcing governance it is better to empower the application teams to do the right thing and build in security, governance and compliance into their applications. See how you can do this with Kong by encoding governance into on-boarding, and by providing the dev teams with the ability to inject compliance through fine-grained security policies. Here, we'll demo mTLS & OIDC plugins, RBAC, and Worspaces as ways to efficiently solve security and governance challenges using Kong Enterprise.

Insomnia Designer Demo | Kong Summit 2020

Is your developer platform a roadblock to innovation? First we’ll see how Insomnia Designer helps developers produce well-designed, high-quality, and reliable APIs with speed and ease. Second, we’ll show you how the Kong Developer Portal boosts developer productivity by providing a frictionless onboarding and service discovery experience to drive API consumption.

Kong Ingress Controller Demo | Kong Summit 2020

You might want to break down a monolith or build new cloud-native application using microservices and serverless. We'll show you how Kong provides the platform not only to enable but to accelerate your journey to microservices, Innovate faster and create new digital revenues. See how to make your developers a lot more productive and provide observability to gain a detailed understanding of your services so that you can even lower your total cost of ownership and complete projects faster. Here, watch demos of Kong for Kubernetes & Kong Mesh.

Kong Embedded: A New Way of Deploying Kong Enterprise on Edge Devices

Today, we’re excited to announce a new research project we’ve been kicking around at Kong: Kong Embedded! If you’ve used the Kong Gateway before or heard us talk about it, one of the things we’re very proud of is that Kong Gateway uses a very small resource footprint. It’s a small download in size, is blazingly fast on even constrained hardware, and uses very little memory.