The latest News and Information on API Development, Management, Monitoring, and related technologies.

Multi-Cluster & Multi-Cloud Service Mesh With CNCF's Kuma and Envoy

In this eBook, Kong Co-Founder and CTO Marco Palladino breaks down how Kuma now supports every cloud vendor, every architecture and every platform together in a multi-mesh control plane. When deployed in a multi-zone deployment, Kuma abstracts away both the synchronization of the service mesh policies across multiple zones and the service connectivity (and service discovery) across those zones.

Scaling Puppeteer & Playwright on Checkly with Terraform

Managing large numbers of checks by hand quickly becomes cumbersome. Luckily, Checkly's REST API allows us to automate most of the repetitive steps. Building on that API, the Checkly Terraform Provider takes automation one step further, enabling users to specify their active monitoring setup as code. In this article, we will be building on top of John Arundel's great intro from a few months back and showing how to manage multiple checks using groups and shared code snippets.


Deployment Patterns for API Gateways Within a DMZ

A DMZ – Demilitarized Zone – is a military term, roughly summarized, as an area between two adversaries established as a buffer in order to reduce, or eliminate, the possibility of further conflict. In networking, the term usually refers to an area that acts as a buffer between two segregated networks. Here is a simplified visualization.


Kong Gateway 2.2 released!

We are happy to announce release 2.2 of our flagship open source API gateway! Those were some busy three months since the release of Kong Gateway 2.1! We have pushed a number of patch releases in the 2.1 series, we’ve had our first fully-digital Kong Summit, and of course, we’ve been very busy building new features that are now shipping in Kong Gateway 2.2!


Using Real-User Monitoring to Understand API Performance

In our previous article we talked about Synthetic Monitoring—a technique used to automate the testing and monitoring of resources by performing simulated user interactions and API calls. Now we're going to look at a complimentary technique called real-user monitoring which takes a more passive hands-off approach.


Accelerate Your APIs by Using the HAProxy Cache

The age of rendering most of a web page’s contents on the server and then delivering it as a colossal HTML file is fading into the past. Modern web frameworks like Angular, React, and Vue push towards creating components instead—individual elements on the page that fetch their data in the background and poll for asynchronous updates—which can be reused across your site.


Announcing Kong's AWS DevOps Competency

Kong Enterprise is a service connectivity platform that provides technology teams with the architectural freedom to build, operate, observe, and secure APIs and services anywhere. From Kong’s inception, we’ve been aligned with Amazon Web Services (AWS), enabling our customers to quickly and efficiently deploy Kong on their AWS accounts. As companies move from monolithic to microservice applications and beyond, Kong helps teams manage this transition.


What is a Webhook?

A webhook provides a decoupled means for an application to provide real-time updates to other applications. A great example of webhook integration is Slack, which can automate the publication of messages to channels and users. Configured inside the Slack administration panel, a Slack webhook is identified by a unique URL, such as https://hooks.slack.com/services/12345/qwert/.

eg innovations

The Central Role of Application Performance Monitoring in Enterprise IT

After all, when an IT outage occurs, it disrupts the business. Employee productivity is impacted, customers are unable to transact, and the organization’s brand is at stake. Monitoring needs to cover all aspects of IT – from hardware, to storage, to server to the application stack. With the focus on keeping users happy, the importance of monitoring at the application layer has had more attention recently.


Synthetic Monitoring

Testing uptime, response time, and other performance metrics in applications can take a few different shapes. One common technique is an approach known as synthetic monitoring. This form of performance monitoring doesn't rely on real users interacting with a service, and instead uses automated tools to mimic interactions. Then, the results are recorded and parsed just like other solutions.