Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Engineering
  4. Mesh to the Rescue of API Gateways for Cross-Cloud Connectivity
Engineering
February 10, 2025
4 min read

Mesh to the Rescue of API Gateways for Cross-Cloud Connectivity

Baptiste Collard
Kong Technical Account Manager
Topics
Service MeshKong MeshMulti Cloud
Share on Social

More on this topic

eBooks

The Difference Between API Gateways and Service Mesh

eBooks

Minimizing Security Risks in API and Microservices

See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

Get a Demo

Many organizations struggle with managing API gateways across multiple cloud environments. In this blog post, we'll explore how Kong Mesh can solve these challenges and enable seamless cross-cloud connectivity.

The challenge of multi-cloud API gateways

Many large companies operate API gateways in multiple regions or cloud service providers. This may be a strategic decision or dictated by regional regulations (GDPR, Open Banking, etc.)

Additionally, the API gateway sprawl may stem from various business reasons like API visibility for different audiences (public, partners, corporate, export control, etc.), or be organizationally led. Companies frequently implement a public API gateway complemented by a Developer Portal to foster innovation based on existing APIs. Conversely, private API gateways are utilized for internal purposes, cross-domain sharing, or to keep dark IT away.

The spread of API gateways across clouds raises new connectivity challenges. Is it best to rely on a particular cloud provider networking infrastructure or to leverage telcos' private backbones? What’s the most secure? What are your encryption standards for cross-datacenter connectivity? 

Zero-trust and service mesh in the cloud native era

In the era of cloud-native technologies, you have undoubtedly heard of zero-trust networking and service mesh platforms — two buzzwords that echo the trend in cloud connectivity. While ZTN (zero-trust networking) encompasses a wide range of technologies and approaches, service mesh is a subset of zero-trust that is scoped to east-west traffic control for your applications. 

Service mesh technologies are often considered complex to use, operate, and scale because of the adoption gap and learning curve. That said, there are proven paths to success in their adoption. One common approach is to first onboard the (API) gateways in the mesh — just them, not your upstream APIs or technical services. It's an easy, riskless step with two advantages: your platform administrators start learning from this new technology, and you can complement your API gateway features with the ones of the mesh if any are missing (for instance, anything telemetry or resiliency).

There's more: having your API gateways in the mesh opens up new possibilities in terms of connectivity, at least with modern service mesh platforms like Kong Mesh, which were designed with multi-cluster in mind.

Kong Mesh is a service mesh platform built on top of OSS Kuma, facilitating cross-platform connectivity and global routing across your services. One of its building blocks, called “Zone Ingress” represents a special kind of gateway for east-west traffic. These Zone Ingresses are transparent to end-users. The point is they are automatically configured by the mesh when two services running on different platforms have to communicate with each other. Since the connection is secured over mTLS tunnels, it's fine to use public networking infrastructure like the internet (just like a standard VPN). 

Now, on the developer side, it's also important to facilitate the naming of services deployed elsewhere so that they can be easily consumed. Again, this is where Kuma shines because of its federated architecture.

All the services that are part of the mesh become routable with auto-generated mesh-side hostnames. As to how the routing is done with additional security and resiliency mechanisms, it's just Envoy magic!

Setting the scene

To demonstrate the value of having API gateways part of the mesh, here's an example with a fake company, acme.corp, that operates Kubernetes clusters on both Azure and Google Cloud.

The catalog API only runs on Google Cloud but is addressable from both API gateways running on each cluster.

The two gateways are tagged as regular workloads in the mesh:

To allow for both external and internal connectivity, the gateway running on Google Cloud is exposing a wildcard certificate that works for various sub-domains:

The way the catalog API is configured in the gateway that runs in Azure is with a virtual domain name provided by the mesh:

Since the gateway on Azure is also part of the mesh, the outbound requests can be routed to the other gateway on Google Cloud:

In order to assign a virtual domain name to the Kong Gateway from the Azure perspective, we use the HostnameGenerator CRD as shown below:

We can imagine more connectivity patterns for all kinds of workloads that are part or not part of the mesh:

In this last diagram, another client running in Azure can also consume the `catalog` API running in Azure through the Kong Gateways.

Life of a request: When the HTTPS requests leave Kong Gateway in Azure, the sidecar considers it a regular TCP stream. Then, the sidecar originates an mTLS request with the Kuma ALPN extension to the remote Zone Ingress. The Zone Ingress performs SNI-based routing (TLS passthrough) to the local Kong Gateway service in Google Cloud. The sidecar of this second gateway offloads the mTLS stream back to a TCP stream that is then forwarded to the Kong Gateway, which will offload the initial TLS HTTPS request.

This setup outlines the power of modern service mesh platforms like Kong Mesh for cross-cloud connectivity. With the help of its great primitives like MeshTLS, HostnameGenerator, and Zone Ingress, your APIs have never been so close to each other!

If this kind of architecture resonates with your actual multi-cloud architecture or if you want to know more about multi-mesh platforms or Kong Mesh as an enterprise-ready service mesh platform, let's chat! Our team would love to discuss how Kong Mesh can streamline your multi-cloud strategy and enhance your API connectivity.

Mesh your services together effortlessly with Kong

Learn MoreGet a Demo
Topics
Service MeshKong MeshMulti Cloud
Share on Social
Baptiste Collard
Kong Technical Account Manager

Recommended posts

Kong Mesh 2.12: SPIFFE/SPIRE Support and Consistent XDS Resource Names

Kong Logo
Product ReleasesSeptember 18, 2025

We're very excited to announce Kong Mesh 2.12 to the world! Kong Mesh 2.12 delivers two very important features: SPIFFE / SPIRE support, which provides enterprise-class workload identity and trust models for your mesh, as well as a consistent Kuma R

Justin Davies

Unlocking API Analytics for Product Managers

Kong Logo
EngineeringSeptember 9, 2025

Meet Emily. She’s an API product manager at ACME, Inc., an ecommerce company that runs on dozens of APIs. One morning, her team lead asks a simple question: “Who’s our top API consumer, and which of your APIs are causing the most issues right now?”

Christian Heidenreich

How to Build a Multi-LLM AI Agent with Kong AI Gateway and LangGraph

Kong Logo
EngineeringJuly 31, 2025

In the last two parts of this series, we discussed How to Strengthen a ReAct AI Agent with Kong AI Gateway and How to Build a Single-LLM AI Agent with Kong AI Gateway and LangGraph . In this third and final part, we're going to evolve the AI Agen

Claudio Acquaviva

How to Build a Single LLM AI Agent with Kong AI Gateway and LangGraph

Kong Logo
EngineeringJuly 24, 2025

In my previous post, we discussed how we can implement a basic AI Agent with Kong AI Gateway. In part two of this series, we're going to review LangGraph fundamentals, rewrite the AI Agent and explore how Kong AI Gateway can be used to protect an LLM

Claudio Acquaviva

How to Strengthen a ReAct AI Agent with Kong AI Gateway

Kong Logo
EngineeringJuly 15, 2025

This is part one of a series exploring how Kong AI Gateway can be used in an AI Agent development with LangGraph. The series comprises three parts: Basic ReAct AI Agent with Kong AI Gateway Single LLM ReAct AI Agent with Kong AI Gateway and LangGr

Claudio Acquaviva

Build Your Own Internal RAG Agent with Kong AI Gateway

Kong Logo
EngineeringJuly 9, 2025

What Is RAG, and Why Should You Use It? RAG (Retrieval-Augmented Generation) is not a new concept in AI, and unsurprisingly, when talking to companies, everyone seems to have their own interpretation of how to implement it. So, let’s start with a r

Antoine Jacquemin

AI Gateway Benchmark: Kong AI Gateway, Portkey, and LiteLLM

Kong Logo
EngineeringJuly 7, 2025

In February 2024, Kong became the first API platform to launch a dedicated AI gateway, designed to bring production-grade performance, observability, and policy enforcement to GenAI workloads. At its core, Kong’s AI Gateway provides a universal API

Claudio Acquaviva

Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

Platform
Kong KonnectKong GatewayKong AI GatewayKong InsomniaDeveloper PortalGateway ManagerCloud GatewayGet a Demo
Explore More
Open Banking API SolutionsAPI Governance SolutionsIstio API Gateway IntegrationKubernetes API ManagementAPI Gateway: Build vs BuyKong vs PostmanKong vs MuleSoftKong vs Apigee
Documentation
Kong Konnect DocsKong Gateway DocsKong Mesh DocsKong AI GatewayKong Insomnia DocsKong Plugin Hub
Open Source
Kong GatewayKumaInsomniaKong Community
Company
About KongCustomersCareersPressEventsContactPricing
  • Terms•
  • Privacy•
  • Trust and Compliance•
  • © Kong Inc. 2025