Kong API Gateway Training Course

Overview

Kong is an API management solution that acts as an API gateway for microservices. It has a plug-in architecture that allows users to extend Kong’s core functionality. 

This instructor-led, live training (online or onsite) is aimed at engineers who wish to set up and monitor a Kong API gateway to manage microservices traffic.

By the end of this training, participants will be able to:

  • Install and configure a Kong cluster.
  • Manage a Kong API gateway to provide a single communication point for accessing APIs.
  • Control web services traffic at a granular level.
  • Secure APIs by authenticating access.
  • Control traffic through rate limiting and quotas.
  • Monitor, log and analyze API traffic using a third-party solution such as ELK stack.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
  • To learn more about Kong, please visit: https://github.com/Kong/kong

Requirements

  • An understanding of microservices, APIs, etc.
  • Linux command line experience

Audience

  • Developers
  • Administrators
  • DevOps engineers

Course Outline

Introduction

  • The need for API management

Setting up Kong

  • Deciding on an installation type: bare metal, cloud, containers and Kubernetes
  • Using curl commands
  • Installing and starting a Kong cluster

Overview of Kong Features and Architecture

  • Kong’s lightweight proxy
  • Kong plugins

Adding Services and Routes

  • Using the Admin API
  • Implementing host matching

Consuming Services

  • Configuring ports, hosts, and DNS

Responding to Requests

  • Reverse proxying incoming requests

Controlling Traffic

  • Managing, throttling, and restricting traffic
  • Load balancing requests: dynamic ring-balancer vs DNS-based

Analyzing Traffic

  • Visualizing, inspecting, and monitoring traffic (e.g., using Prometheus)
  • Logging data transfers (e.g., using ELK Stack)

Transforming Data

  • Transforming requests and responses in real-time

Securing API and Service Access

  • Protecting services through an authentication layer

Integrating Kong with Third-party Services

  • Calling serverless functions via APIs

Advanced Routing Mechanisms

  • Beyond simple host matching

Securing the Kong Admin API

  • Configuring firewall rules
  • Using Kong as a proxy for the Admin API

Extending Kong

  • Adding extra functionality through Kong Plugins
  • Creating Your Own Plugin

Scaling Kong

  • Increasing nodes to process trillions of API calls

Troubleshooting

Summary and Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *