Systems | Development | Analytics | API | Testing

Kong and Okta Deliver Best-in-Class Identity for API Management

As organizations look to accelerate their digital transformation initiatives, a couple of key trends are prevalent. First, there is a movement from monolithic to smaller cloud native microservices. Second, there is more pressure to innovate, resulting in an explosion of APIs and connections to secure. To help organizations address these trends, Kong is joining forces with Okta to deliver the best-in-class identity for API management.

A Cloud Native + Infrastructure as Code Love Story

We love abstractions. We want to make things easier for developers, teams and end users. In doing that, sometimes we build things a little bit too complex for those who don’t already understand the pain points for which the abstraction layers were built. Kubernetes is an example of this; it solves a very real, very painful problem, but it is notoriously difficult to wrap your head around.

Mid Atlantic Meetup | May 2021 - What can APIs and Microservices tell us about organizations?

Architects are tasked with seeing that organizations meet their objectives with speed and quality, for a reasonable cost. This simple mission is anything but simple. Security, analytics, and everything in-between present themselves as forces to be acknowledged and considered. Building APIs and Microservices present new puzzles to be solved for architects. Or do they? In this session, we attempt to detect patterns that present themselves in organizations, which have their root in human elements. Yet reliably manifest in technology.

Understanding the Basics of Envoy Configuration - Denver Meshy Mesh Meetup

Envoy is a key part of a number of service meshes currently on the market, including Istio and the Kuma CNCF Sandbox project. As such, it is often helpful to better understand how Envoy is configured to operate as a data plane in a service mesh. In this session, you’ll learn about the basics of Envoy configuration, like listeners, filters, clusters, and endpoints.

The Evolution of APIs: From RPC to SOAP and XML (Part 1)

To work and live in today’s digital world, we are unquestionably dependent on interconnected applications. These applications might be massive and highly complex, but they’re also constructed from reusable building blocks, which we call an Application Programming Interface—the API. API adoption is on the rise across all industries. However, APIs aren’t new. They came about from the natural evolution of writing computer software.

Deploying a Multi-Cloud API Gateway on AWS and GCP

After you’ve built your microservices-backed application, it’s time to deploy and connect them. Luckily, there are many cloud providers to choose from, and you can even mix and match. Many organizations, like Australia Post, are taking the mix-and-match approach, embracing a multi-cloud architecture. The microservices that make up a system no longer have to stay on a single cloud.

Hiding SOAP Legacy Applications Using the Mullet Pattern

In this episode of Kongcast, I had the pleasure of speaking with Aaron Weikle, the founder and CEO at MS3, about supporting legacy-based applications as companies add the next generation of microservices. Check out the transcript and video from our conversation below, and be sure to subscribe to get email alerts for the latest new episodes.

Hiding SOAP Legacy Applications Using the Mullet Pattern With Aaron Weikle | Kongcast Episode 4

Organizations don’t move as fast as technology. That’s why in this Kongcast episode, Aaron Weikle, Founder & CEO at MS3, explains how to continue supporting your organization’s legacy-based services as they continue to add the next generation of services. If you're planning on migrating legacy applications to microservices this episode if for you!

Demo: Zero Trust Security with Service Mesh

As the number of microservices increases and deployed across private and public networks, security is critical. Leveraging a Service Mesh guarantees the security of applications and services without burdening developers to build security, freeing them to focus on business logic and allowing organizations to meet and prove their compliance and security requirements. TIMECODES #ZeroTrust #ServiceMesh #mtls #OPA #KongMesh #KongSummit