Course Outline

Introduction

  • The need for API management

Setting up Kong

  • Deciding on an installation type: bare metal, cloud, containers and Kubernetes
  • Using curl commands
  • Installing and starting a Kong cluster

Overview of Kong Features and Architecture

  • Kong's lightweight proxy
  • Kong plugins

Adding Services and Routes

  • Using the Admin API
  • Implementing host matching

Consuming Services

  • Configuring ports, hosts, and DNS

Responding to Requests

  • Reverse proxying incoming requests

Controlling Traffic

  • Managing, throttling, and restricting traffic
  • Load balancing requests: dynamic ring-balancer vs DNS-based

Analyzing Traffic

  • Visualizing, inspecting, and monitoring traffic (e.g., using Prometheus)
  • Logging data transfers (e.g., using ELK Stack)

Transforming Data

  • Transforming requests and responses in real-time

Securing API and Service Access

  • Protecting services through an authentication layer

Integrating Kong with Third-party Services

  • Calling serverless functions via APIs

Advanced Routing Mechanisms

  • Beyond simple host matching

Securing the Kong Admin API

  • Configuring firewall rules
  • Using Kong as a proxy for the Admin API

Extending Kong

  • Adding extra functionality through Kong Plugins
  • Creating Your Own Plugin

Scaling Kong

  • Increasing nodes to process trillions of API calls

Troubleshooting

Summary and Conclusion

Requirements

  • An understanding of microservices, APIs, etc.
  • Linux command line experience

Audience

  • Developers
  • Administrators
  • DevOps engineers
  14 Hours
 

Number of participants


Starts

Ends


Dates are subject to availability and take place between 09:30 and 16:30.
Open Training Courses require 5+ participants.

Testimonials (2)

Related Courses

Related Categories