Overview
Kong is an API management solution that acts as an API gateway for microservices. It has a plug-in architecture that allows users to extend Kong’s core functionality.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to set up and monitor a Kong API gateway to manage microservices traffic.
By the end of this training, participants will be able to:
- Install and configure a Kong cluster.
- Manage a Kong API gateway to provide a single communication point for accessing APIs.
- Control web services traffic at a granular level.
- Secure APIs by authenticating access.
- Control traffic through rate limiting and quotas.
- Monitor, log and analyze API traffic using a third-party solution such as ELK stack.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about Kong, please visit: https://github.com/Kong/kong
Requirements
- An understanding of microservices, APIs, etc.
- Linux command line experience
Audience
- Developers
- Administrators
- DevOps engineers
Course Outline
Introduction
- The need for API management
Setting up Kong
- Deciding on an installation type: bare metal, cloud, containers and Kubernetes
- Using curl commands
- Installing and starting a Kong cluster
Overview of Kong Features and Architecture
- Kong’s lightweight proxy
- Kong plugins
Adding Services and Routes
- Using the Admin API
- Implementing host matching
Consuming Services
- Configuring ports, hosts, and DNS
Responding to Requests
- Reverse proxying incoming requests
Controlling Traffic
- Managing, throttling, and restricting traffic
- Load balancing requests: dynamic ring-balancer vs DNS-based
Analyzing Traffic
- Visualizing, inspecting, and monitoring traffic (e.g., using Prometheus)
- Logging data transfers (e.g., using ELK Stack)
Transforming Data
- Transforming requests and responses in real-time
Securing API and Service Access
- Protecting services through an authentication layer
Integrating Kong with Third-party Services
- Calling serverless functions via APIs
Advanced Routing Mechanisms
- Beyond simple host matching
Securing the Kong Admin API
- Configuring firewall rules
- Using Kong as a proxy for the Admin API
Extending Kong
- Adding extra functionality through Kong Plugins
- Creating Your Own Plugin
Scaling Kong
- Increasing nodes to process trillions of API calls
Troubleshooting
Summary and Conclusion