Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Engineering

Engineering

Talk tech with tips and tutorials from builders at Kong and the Kong Community.

‹Prev1…161718…20Next›

Kong Gateway Tutorial: Running With a GUI in <15 Minutes

Kong Gateway Tutorial Header
EngineeringApril 8, 2021

In this Kong Gateway tutorial, you'll learn how to: Keep in mind that these instructions are a starting point. You may need to change some of the steps to harden your environment when running in production. For more detailed information, visit our Kong Gateway documentation . One of the reasons…

Manny Khadilkar

How to Create a Custom Lua Plugin for Kong Gateway

Creating Your First Custom Plugin for Kong Gateway in Lua
EngineeringMarch 18, 2021

This tutorial shows you how easy it is to build a custom Lua plugin for Kong Gateway. My Kong Lua plugin example will automatically add a custom header to any response sent out, indicating the current plugin version. Kong API Gateway is built on OpenResty , which extends the NGINX proxy server to…

Thijs Schreijer

Authorizing Microservice APIs With OPA and Kuma

Authorizing Microservices with OPA and Kuma
EngineeringMarch 16, 2021

Many companies are leveraging DevOps, microservices , automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there's an increase in the number…

Tim Hinrichs

How OAuth2 Authorization Works: Kong API Gateway 4 Step Tutorial

Kong Gateway Oauth2
EngineeringMarch 8, 2021

In this tutorial, I'm going to walk through adding OAuth2 authorization and authentication to your service with the Kong API Gateway OAuth2 plugin . First, I'll cover the fundamentals. If you're already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial . Interconnected.…

Aapo Talvensaari

Getting Started With Kuma Service Mesh

background
EngineeringMarch 3, 2021

Kuma is an open source, CNCF service mesh that supports every environment, including Kubernetes and virtual machines. In this Kuma service mesh tutorial, I will show you how easy it is to get started. [iframe loading="lazy" width="890" height="560" src=""…

Marco Palladino

Getting Started With Kong’s OpenID Connect Plugin

Getting Started With Kong’s OpenID Connect Plugin
EngineeringFebruary 25, 2021

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect , one mechanism to apply zero-trust is the OpenID Connect…

Ahmed Koshok

How JWT Authentication Works for Microservices: API Gateway Tutorial

How JWT Authentication Works for Microservices: API Gateway Tutorial
EngineeringFebruary 16, 2021

As you build and maintain more applications, your authentication strategy becomes increasingly important. It may also be top of mind for your boss since technology leaders cited "improve application security" as one of their top priorities in this year's Digital Innovation Benchmark . The Kong…

Marco Palladino

Implementing Zero-Trust Service Mesh Security

Destination: Zero-Trust
EngineeringFebruary 9, 2021

Imagine you're going through immigration at the airport. The immigration officer says, "I don't need your passport because I trust that you are who you claim to be." Wait, what? That would never happen, right? That's because trust is exploitable. Sooner or later, somebody will try to lie about who…

Marco Palladino

How to Design a Scalable Rate Limiting Algorithm with Kong API

Kong Gateway Rate Limiting Tutorial
EngineeringJanuary 15, 2021

Rate limiting protects your APIs from inadvertent or malicious overuse by limiting how often each user can call the API. Without rate limiting, each user may make a request as often as they like, leading to "spikes" of requests that starve other consumers. Once enabled, rate limiting can only…

Guanlan Dai

Building Kong Clusters in AWS with the Terraform API Gateway Module

Building Kong Clusters in AWS with the Terraform API Gateway Module
EngineeringJanuary 15, 2021

We created the Terraform API gateway module to help you follow DevOps best practices while implementing Kong using infrastructure as code (IaC). Terraform is an open source tool that allows you to implement IaC using a declarative declaration definition. This Terraform module is the reference…

Kong

3 Solutions for Avoiding Plain-Text Passwords in Insomnia

3 Solutions for Avoiding Plain-Text Passwords in Insomnia
EngineeringDecember 8, 2020

When testing APIs, software engineers often repeat identical values across multiple requests, but who wants to waste time typing the same values every time? Insomnia 's environment variables solve this problem by allowing you to define a value once as an environment variable and reference that…

Kevin Chen

How to Set Up Kong Gateway

background
EngineeringDecember 2, 2020

You've decided to install Kong Gateway. Congrats! You're almost ready to accelerate your microservices journey with the world's most popular open source API gateway . This article and video will guide you through the short version of our tutorial. If you prefer, here are some more detailed…

Kevin Chen

Implement a Canary Release with Kong for Kubernetes and Consul

Implement a Canary Release with Kong for Kubernetes and Consul
EngineeringNovember 20, 2020

From the Kong API Gateway perspective, using Consul as its Service Discovery infrastructure is one of the most well-known and common integration use cases. With this powerful combination more flexible and advanced routing policies can be implemented to address Canary Releases, A/B testings,…

Kong

Tracing With Zipkin in Kong 2.1.0

Tracing With Zipkin in Kong 2.1.0
EngineeringAugust 7, 2020

There is a great number of logging plugins for Kong , which might be enough for your needs. However, they have certain limitations: Zipkin is a tracing server, specialized in gathering timing data. Used in conjunction with Kong's Zipkin plugin , it can address the points above: For a basic setup,…

Enrique García Cota

How to Dynamically Route Requests With Kong Enterprise

How to Dynamically Route Requests With Kong Enterprise
EngineeringJuly 31, 2020

Having worked with many customers and prospects at Kong, one of the main requirements we often hear is how to handle dynamic routing based on the URL and headers. In this blog post, I will cover different use cases we come across for dynamic routing and how Kong can address them. The default…

Mos Amokhtari
‹Prev1…161718…20Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026