Conteúdo Programatico
Introduction
- A necessidade de gerenciamento de API
Setting up Kong
- Deciding on an installation type: bare metal, cloud, containers and Kubernetes
- Using curl commands
- Installing and starting a Kong cluster
Overview of Kong Features and Architecture
- Kong's lightweight proxy
- Kong plugins
Adding Services and Routes
- Using the Admin API
- Implementing host matching
Consuming Services
- Configuring ports, hosts, and DNS
Responding to Requests
- Reverse proxying incoming requests
Controlling Traffic
- Managing, throttling, and restricting traffic
- Load balancing requests: dynamic ring-balancer vs DNS-based
Analyzing Traffic
- Visualizing, inspecting, and monitoring traffic (e.g., using Prometheus)
- Logging data transfers (e.g., using ELK Stack)
Transforming Data
- Transforming requests and responses in real-time
Securing API and Service Access
- Protecting services through an authentication layer
Integrating Kong with Third-party Services
- Calling serverless functions via APIs
Advanced Routing Mechanisms
- Beyond simple host matching
- Securing the Kong Admin API
- Configuring firewall rules
- Using Kong as a proxy for the Admin API
Securing the Kong Admin API
- Configuring firewall rules
- Using Kong as a proxy for the Admin API
Extending Kong
- Adding extra functionality through Kong Plugins
- Creating Your Own Plugin
Scaling Kong
- Increasing nodes to process trillions of API calls
Troubleshooting
- Summary and Conclusion