WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Engineering
  4. Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong
[Engineering](/blog/engineering)Engineering
May 13, 2024
9 min read

# Enterprise-Grade Service Mesh: A Reference Architecture with OpenShift, Istio, and Kong

Claudio Acquaviva
Principal Architect, Kong
Youtube thumbnail
**This content contains a video which can not be displayed in Agent mode**

The service mesh architecture pattern has become a de facto standard for microservices-based projects. In fact, from the mesh standpoint, not just microservices but all components of an application should be under its control, including databases, event processing services, etc.

It's critical to analyze end-to-end service mesh infrastructure from two main perspectives:

  • - **The traffic within an application**: Also called the east-west traffic, this is the main purpose of a service mesh implementation. We should be able to apply multiple policies to define how the service mesh components should talk to each other considering security as well as requirements concerning traffic control, observability, and more.
  • - **The service mesh exposure**: Typically, the mesh components and the actual communication among them are protected from external consumers. However, we have to expose at least one of its components so the mesh can be consumed. That's the role of a specific mesh component responsible for the north-south ingress traffic. This ingress traffic component is responsible not just for the mesh exposure, which is its natural purpose, but for implementing specific policies we should have in this layer, including multiple consumer authentication mechanisms (e.g., API Key, OIDC, mTLS), request throttling, mesh consumption metrics, etc.

In this blog post, we’ll present and describe a service mesh reference architecture based on Red Hat and Kong technologies and products, where the main actors, [Istio Service Mesh](https://konghq.com/blog/learning-center/what-is-istio-service-mesh)Istio Service Mesh and Kong Ingress Controller, run on a Red Hat OpenShift Container Platform (OCP) Cluster.

## Service mesh platform and reference architecture

One of the most robust platforms to implement and deploy applications and service meshes available today is [Red Hat OpenShift Container Platform (OCP)](https://www.redhat.com/en/technologies/cloud-computing/openshift/container-platform)Red Hat OpenShift Container Platform (OCP). 

Based on Kubernetes, Red Hat OCP provides a trusted, comprehensive, and consistent application platform for hybrid cloud that is capable of running single or multi-cluster service meshes. Below, we will detail the implementation of Kong technologies, Konnect, and KIC with Red Hat OpenShift for building modern applications.

Taking the perspectives described previously, on top of Red Hat OCP, the service mesh infrastructure consists of two products:

  • - [Red Hat OpenShift Service Mesh](https://developers.redhat.com/topics/service-mesh)Red Hat OpenShift Service Mesh: Based upon Istio Service Mesh, this is responsible for the actual service mesh providing all functions required such as monitoring, tracing, circuit breakers, load balancing, access control, and more.
  • - [Kong Ingress Controller (KIC)](https://docs.konghq.com/kubernetes-ingress-controller)Kong Ingress Controller (KIC): Also considered a service mesh component, this exposes the Istio Service Mesh with an extensive collection of [policies](https://docs.konghq.com/hub/)policies like authentication, request transformation, response caching, rate limiting, traffic monitoring, logging, and tracing.

We should also consider two more layers implemented by:

  • - [Keycloak](https://www.keycloak.org/)Keycloak: With a KIC Gateway integration, it plays the Identity Provider role to, as such, externalize the external consumer OIDC-based authentication and authorization processes.
  • - [Kiali](https://kiali.io/)Kiali: As the Istio Service Mesh monitoring and management console. Kiali uses Prometheus and Grafana to generate the topology graph, show metrics, calculate health, offer advanced metrics queries, and more.

The figure below illustrates the reference architecture:

## Modern microservice implementation

Typically, as the microservice project progresses, naturally we have to manage three types of connections:

  • - **Edge connectivity**: This is the traffic we receive from external consumers. This connectivity is implemented and controlled by Kong Ingress Controller (KIC).
  • - **Cross-app connectivity**: Applications will talk to each other, so it’s important to control this communication as well. Another instance of KIC is deployed to control it with specific and application-oriented policies. Note: This isn’t depicted in the diagram.
  • - **In-app connectivity**: This is where the service-to-service connectivity is implemented by the service mesh.

## Service mesh and ingress controller policies

In an enterprise-class application environment, typically, we have policies defined in both layers. Generally speaking, the ingress controller should be responsible for coarse-grained policies controlling the application consumption as the service mesh controls the fine-grained policies related to the microservices.

A good example could be the authentication and authorization processes. While the authentication processes tend to be implemented in a centralized environment, typically by the ingress controller, microservices authorization processes are inherently distributed. Typically, there are two levels of abstraction for access control policies:

  • - **Low granularity**: This is focused on generic security policies. For example, access time, service required, IP address of the request, etc. The ingress controller layer also handles this authorization level.
  • - **High granularity**: This is access control performed by microservices in relation to their specific resources. For example: operation within a service (read or write). The service mesh typically implements this authorization level.

In summary, we, as business and technical architects, should be able to define multiple policies in both layers.

## Red Hat OpenShift Container Platform

Red Hat OCP is available on-prem bare metal or virtualized, Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM Cloud, Microsoft Azure, Nutanix, Red Hat OpenStack Platform, VMware Cloud (VMC) on AWS. It’s also available as a managed service on major public cloud providers.

As an example, here's the OCP console after installing Red Hat OpenShift Service on AWS ([ROSA](https://www.redhat.com/en/technologies/cloud-computing/openshift/aws)ROSA):

You can check the official Red Hat OCP documentation to get your Cluster running [on-prem](https://access.redhat.com/documentation/en-us/openshift_container_platform/4.14)on-prem, on [AWS (ROSA)](https://access.redhat.com/documentation/en-us/red_hat_openshift_service_on_aws/4)AWS (ROSA), or on any other platform. Also, check out the blog post [A Guide to Enterprise Kubernetes with OpenShift](https://www.redhat.com/en/blog/enterprise-kubernetes-with-openshift-part-one)A Guide to Enterprise Kubernetes with OpenShift for an introduction to OpenShift including a diagram with its main components:

## Red Hat OpenShift Service Mesh

[Istio](https://istio.io/)Istio, as one of the main service mesh implementations available today, provides several features to control how microservices and other application components talk to each other:

  • - [**Traffic management**](https://istio.io/latest/docs/concepts/traffic-management/)**Traffic management**: This is the routing and rules configuration to control the flow of traffic between services.
  • - [**Security**](https://istio.io/latest/docs/concepts/security/)**Security**: This is the underlying microservice communication channel that manages authentication, authorization, and encryption of service communication.
  • - [**Observability**](https://istio.io/latest/docs/concepts/observability/)**Observability**: Istio supports the three main pillars of observability, metrics, tracing, and log processing, generating telemetry types for each one of them.

### Architecture

The Istio Service Mesh architecture defines two main layers:

  • - **Data plane**: Running as a sidecar for Kubernetes Pod, the data plane is implemented as transparent proxies, intercepting all network traffic between microservices. They also collect and report telemetry to the control plane, the second layer of the architecture.
  • - **Control plane**: The control plane is used by platform administrators to define policies and publish them to the Data Planes.

Here's a diagram describing the architecture. Please check out the [documentation](https://istio.io/latest/docs/ops/deployment/architecture/)documentation to learn more about the other Istio components.

## Kiali

[Kiali](https://kiali.io/)Kiali is the official Istio Service Mesh console. Through the integration with [Grafana](https://kiali.io/docs/configuration/p8s-jaeger-grafana/grafana/)Grafana, [Prometheus](https://kiali.io/docs/configuration/p8s-jaeger-grafana/prometheus/)Prometheus, and [Jaeger](https://kiali.io/docs/configuration/p8s-jaeger-grafana/tracing/jaeger/)Jaeger, Kiali provides capabilities to configure and monitor the service mesh. Here's a screenshot of Kiali's landing page:

## Service mesh policies

As stated before the service mesh is responsible for defining and enforcing policies to control the microservice-to-microservice communication. As an example, let's consider the [Istio Bookinfo Application](https://istio.io/latest/docs/examples/bookinfo/)Istio Bookinfo Application. It’s a basic online book catalog application where a "Product" microservice sends requests to the "Reviews" and the "Details" microservices to build a page and respond to its consumers. This diagram presents the architecture:

Istio provides Kubernetes CRDs for policy definition. The following Istio [DestinationRule](https://istio.io/latest/docs/reference/config/networking/destination-rule/)DestinationRule and [VirtualService](https://istio.io/latest/docs/reference/config/networking/virtual-service/)VirtualService declarations define a request routing policy to be applied to the three versions of the "Reviews" microservice.

apiVersion: networking.istio.io/v1alpha3
kind: DestinationRule
metadata:
  name: reviews
  namespace: default
spec:
  host: reviews
  trafficPolicy:
    tls:
      mode: ISTIO_MUTUAL
  subsets:
  - name: v1
    labels:
      version: v1
  - name: v2
    labels:
      version: v2
  - name: v3
    labels:
      version: v3

apiVersion: networking.istio.io/v1alpha3
kind: VirtualService
metadata:
  name: multiple-reviews-versions
  namespace: default
spec:
  hosts:
    - reviews
  http:
  - route:
    - destination:
        host: reviews
        subset: v1
      weight: 20
    - destination:
        host: reviews
        subset: v2
      weight: 80
    - destination:
        host: reviews
        subset: v3
      weight: 0

As we consume the application, Kiali, the service mesh monitor component, starts building and refreshing some Graphs showing the service mesh microservices in action. Note that, as specified in the VirtualService policy, only versions v1 and v2 of the "Reviews" microservice have received requests.

Check the [Istio documentation](https://istio.io/latest/docs/reference/config/)Istio documentation to learn more about the extensive list of policies you can apply and get your service mesh enforcing.

### Kong Konnect and KIC

The picture above includes a Kong layer, deployed in a different Kubernetes namespace with two Pods. This is the Kong Ingress Controller (KIC) for Kubernetes deployment, which exposes the Bookinfo application.

Kong Ingress Controller for Kubernetes is an ingress controller for the Kong Gateway. It allows you to configure and run Kong Gateway using [Ingress or Gateway API](https://konghq.com/blog/engineering/gateway-api-vs-ingress)Ingress or Gateway API resources created inside a Kubernetes cluster.

Beyond proxying the traffic coming into a Kubernetes cluster, KIC also lets you configure plugins, load balancing, health checking, and leverage all that Kong Gateway offers in a standalone installation.

## Kong Konnect

[Kong Konnect](https://docs.konghq.com/konnect/)Kong Konnect is an API lifecycle management platform that is delivered as a service. The management plane is hosted in the cloud by Kong, while the runtime environments are deployed in your AWS accounts.

By associating your KIC deployment with Kong Konnect, this read-only association allows you to view the runtime entities, such as routes and applications, from your Kubernetes resources in Kong Konnect.

Considering the Kiali diagram again, KIC's controller is sending requests to an external component. This component is Kong Konnect, which receives all operational data from KIC.

The following picture shows a KIC-based Kong Konnect control plane:

## Architecture

Let's deep dive into the KIC deployment shown in the Kiali diagram. KIC is made up of two high-level components:

  • - **Controller**: This synchronizes the configuration from Kubernetes to Kong Gateway.
  • - **Kong Gateway**: This is the core proxy that handles all the traffic.

Kong Ingress Controller configures Kong Gateway using ingress or Gateway API resources created inside a Kubernetes cluster.

The components are installed as two distinct but connected Kubernetes deployments implementing a topology called [Gateway Discovery,](https://docs.konghq.com/kubernetes-ingress-controller/latest/production/deployment-topologies/gateway-discovery/)Gateway Discovery, where the controller uses Kubernetes service discovery to discover the Kong Gateway Pods.

## Gateway API

Kong Ingress Controller fully supports the Kubernetes [Gateway API](https://gateway-api.sigs.k8s.io/)Gateway API spec to configure networking in Kubernetes. The Gateway API project is the successor to the [Ingress API](https://kubernetes.io/docs/concepts/services-networking/ingress/)Ingress API, supporting additional types of routes such as TCP, UDP, and TLS in addition to HTTP/HTTPS.

The Gateway API spec defines two main resources:

  • - **GatewayClass** represents the class of gateway — in our case, KIC's Controller
  • - **Gateway** represents the KIC's Kong Proxy instance that handles traffic of Gateway API routes.

Every gateway refers to a GatewayClass. Here's an example of a GatewayClass declaration. KIC reconciles any resources attached to a GatewayClass that has a spec.controllerName of "konghq.com/kic-gateway-controller".

### GatewayClass

apiVersion: gateway.networking.k8s.io/v1beta1
kind: GatewayClass
metadata:
 name: kong
 annotations:
   konghq.com/gatewayclass-unmanaged: 'true'
spec:
 controllerName: konghq.com/kic-gateway-controller

And here's a Gateway declaration:

### Gateway

apiVersion: gateway.networking.k8s.io/v1beta1
kind: Gateway
metadata:
  name: kong
  namespace: default
spec:
  gatewayClassName: kong
  listeners:
  - name: proxy
    port: 80
    protocol: HTTP

The Gateway refers to the GatewayClass declared previously and defines a listener to port 80 for the HTTP protocol.

### HTTPRoute

With the gateway in place, we can expose the applications using the HTTPRoute declaration. The parentRefs setting refers to the gateway declared previously:

apiVersion: gateway.networking.k8s.io/v1beta1
kind: HTTPRoute
metadata:
 name: httproute-bookinfo
 namespace: default
spec:
  parentRefs:
  - name: kong
  rules:
  - matches:
    - path:
        type: Exact
        value: /productpage
    - path:
        type: PathPrefix
        value: /static
    - path:
        type: Exact
        value: /login
    - path:
        type: Exact
        value: /logout
    - path:
        type: PathPrefix
        value: /api/v1/products
    backendRefs:
    - name: productpage
      port: 9080

And now we are ready to consume it. Notice we are hitting the KIC's Kong Gateway component through the load balancer deployed for it.

## Kong Konnect control plane

At the same time, the Kong Konnect Control Plane should show not just the Kong Objects created based on the HTTPRoute declaration but also the Analytics data KIC's gateway reported to it.

## Kong Ingress Controller policies

As discussed before, the Ingress Controller is responsible for coarse-grained policies that control Service Mesh consumption requests. One of the most powerful capabilities provided by Kong Ingress Controller is the extensive list of available plugins for implementing such policies.

The plugins, totally supported by KIC, are classified into the following functionalities:

  • - [AI](https://docs.konghq.com/hub/?category=ai)AI: A new plugin collection implementing AI-related use cases such as [Prompt Decorator](https://docs.konghq.com/hub/kong-inc/ai-prompt-decorator/)Prompt Decorator and [Guard](https://docs.konghq.com/hub/kong-inc/ai-prompt-guard/)Guard, AI Response Transformer, and more 
  • - [Authentication](https://docs.konghq.com/hub/?category=authentication)Authentication: OIDC, mTLS, API Key, LDAP, SAML, etc.
  • - [Security](https://docs.konghq.com/hub/?category=security)Security: Bot Detection, Open Policy Agent for Authorization policies, IP Restriction, etc.
  • - [Traffic Control](https://docs.konghq.com/hub/?category=traffic-control)Traffic Control: GraphQL Caching and Rate Limiting, Proxy Caching, Request Validator and Size Limiting, WebSocket support, Route by Header, etc. 
  • - [Serverless](https://docs.konghq.com/hub/?category=serverless)Serverless
  • - [Analytics & Monitoring](https://docs.konghq.com/hub/?category=analytics-monitoring)Analytics & Monitoring: OpenTelemetry, Prometheus, Zipkin, etc.
  • - [Transformations](https://docs.konghq.com/hub/?category=transformations)Transformations: Request and Response Transformer, REST to gRPC, Kafka integration, etc.
  • - [Logging](https://docs.konghq.com/hub/?category=logging)Logging

KIC can be extended with custom plugins to implement new functionalities and supports [WebAssembly](https://docs.konghq.com/gateway/latest/reference/wasm/)WebAssembly to extend the Kong Gateway Proxy.

In fact, KIC, with its rich and extensive list of ready-to-use plugins and WebAssembly support for new custom plugins provided, offers a powerful solution for advanced ingress controller use cases. Moreover, with this approach, KIC totally replaces the default ingress gateway component provided by Istio.

As an example, here is a KongPlugin declaration, available by KIC, to define a rate-limiting policy.

apiVersion: configuration.konghq.com/v1
kind: KongPlugin
metadata:
  name: ratelimiting
  namespace: default
config:
  minute: 30
  policy: local
plugin: rate-limiting
EOF

This second policy defines, with the OIDC plugin, the OAuth authorization code grant-based authentication policy. The identity provider, as depicted in our reference architecture, is Keycloak.

apiVersion: configuration.konghq.com/v1
kind: KongPlugin
metadata:
  name: oidc
  namespace: default
config:
  client_id: [kong_id]
  client_secret: [ebFwbg2YGOdeNhAaEFgwURKTSBYseFUl]
  issuer: "https://keycloak-keycloak.apps.kongcluster.ddxh.p1.openshiftapps.com/realms/kong"
  cache_ttl: 10
  redirect_uri: ["http://ad1d8a93b72ca4c2d82d67b2ee379c7c-651170eeeac68c4c.elb.us-west-1.amazonaws.com/productpage"]
plugin: openid-connect

We submit the policy adding annotations to the HTTPRoute previously created.

kubectl annotate httproute httproute-bookinfo -n default konghq.com/plugins="ratelimiting,oidc"

After applying the plugins, if you try to consume the application you'll get redirected to Keycloak to present your credentials (user/password pair).

## Conclusion

Red Hat OpenShift, Istio Service Mesh, and Kong Ingress Controller provide extensive and advanced capabilities for implementing an enterprise-class service mesh. This document is intended to provide an introductory perspective on a service mesh application deployment running on a Red Hat OpenShift Cluster.

Please refer to the Red Hat and Kong documentation portals to learn about many other topics. For example:

  • - [Red Hat OpenShift Container Platform](https://docs.openshift.com/container-platform/4.14/welcome/index.html)Red Hat OpenShift Container Platform capabilities, including security and compliance, operators, CI/CD, serverless, scalability and performance, etc.
  • - Istio Service Mesh [policies](https://istio.io/latest/docs/tasks/)policies
  • - Kong Ingress Controller capabilities include [CRDs](https://docs.konghq.com/kubernetes-ingress-controller/latest/concepts/custom-resources/)CRDs, observability, [Kong Gateway Operator](https://docs.konghq.com/gateway-operator/latest/get-started/kic/install/)Kong Gateway Operator, etc.
  • - Kong Konnect features like [Dev Portal](https://docs.konghq.com/konnect/dev-portal/)Dev Portal, [API Products](https://docs.konghq.com/konnect/api-products/)API Products, [Org Management](https://docs.konghq.com/konnect/org-management/auth/)Org Management, etc. 

Red Hat OpenShift, Istio, and Kong Ingress Controller can simplify service mesh implementation and management, improving security for all services infrastructure. You can [get started with Kong Konnect](https://konghq.com/products/kong-konnect/register)get started with Kong Konnect for free!

- [Service Mesh](/blog/tag/service-mesh)Service Mesh- [Kong Ingress Controller](/blog/tag/kong-ingress-controller)Kong Ingress Controller- [Kong Konnect](/blog/tag/kong-konnect)Kong Konnect- [Microservices](/blog/tag/microservices)Microservices

## More on this topic

_Videos_

## Styra DAS & Kong Mesh: Policy-as-Code to Control Microservice-Based Communication at Scale

_Videos_

## Microservices Monitoring and Logging with Kong Konnect

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [Service Mesh](/blog/tag/service-mesh)Service Mesh- [Kong Ingress Controller](/blog/tag/kong-ingress-controller)Kong Ingress Controller- [Kong Konnect](/blog/tag/kong-konnect)Kong Konnect- [Microservices](/blog/tag/microservices)Microservices
Claudio Acquaviva
Principal Architect, Kong

Recommended posts

# From Microservices to AI Traffic — Kong as the Unified Control Plane

[Enterprise](/blog)EnterpriseMarch 30, 2026

The Anatomy of Architectural Complexity Modern architectures now juggle three distinct traffic patterns. Each brings unique demands. Traditional approaches treat them separately. This separation creates unnecessary complexity. North-South API Traf

Kong
[](https://konghq.com/blog/enterprise/microservices-to-ai-traffic-kong-as-the-unified-control-plane)

# 10 Ways Microservices Create New Security Challenges

[Engineering](/blog)EngineeringOctober 1, 2025

Why are Microservices Security Risks? Traditional security was simple. One perimeter. Few entry points. Clear boundaries. Microservices shattered this model. Now organizations manage hundreds of independent services. The average number of API calls

Mike Bilodeau
[](https://konghq.com/blog/engineering/10-ways-microservices-create-new-security-challenges)

# Insights into Kubernetes Deployments with Kong Ingress Controller

[Engineering](/blog)EngineeringFebruary 11, 2025

This blog addresses the common challenges organizations face with fragmented API management in Kubernetes environments and presents Kong Konnect combined with the Kong Ingress Controller (KIC) as a comprehensive solution.  We'll highlight the issues

Declan Keane
[](https://konghq.com/blog/engineering/kic-operational-insights-kubernetes-deployments)

# Deploying Kong Mesh with Konnect on AWS ECS

[Engineering](/blog)EngineeringFebruary 7, 2025

Deploying Kong Mesh on ECS The focus of this blog is to provide step-by-step instructions for deploying and configuring Kong Mesh with Kong Konnect on an AWS ECS instance so that anyone will be able to get pre-production installation of Kong Mesh st

Vince Russo
[](https://konghq.com/blog/engineering/kong-mesh-with-konnect-on-aws-ecs)

# A Guide to Service Mesh Adoption and Implementation

[Engineering](/blog)EngineeringAugust 10, 2024

In the rapidly evolving world of microservices and cloud-native applications , service mesh has emerged as a critical tool for managing complex, distributed systems. As organizations increasingly adopt microservices architectures, they face new c

Kong
[](https://konghq.com/blog/engineering/implementing-a-service-mesh)

# 7 Signs You Need a Service Mesh

[Engineering](/blog)EngineeringJanuary 29, 2024

In the ever-evolving landscape of modern applications and cloud native architectures, the need for efficient, scalable, and secure communication between services is paramount. Enter the service mesh — a versatile platform designed to address various

Baptiste Collard
[](https://konghq.com/blog/engineering/7-signs-you-need-a-service-mesh)

# 5 Best Practices for Securing AI Microservices at Scale in 2026

[Engineering](/blog)EngineeringApril 2, 2026

The Stakes Keep Rising The security implications are severe. OWASP's 2025 Top 10 for LLM Applications ranks prompt injection as the number one critical vulnerability. Attackers manipulate LLM inputs to override instructions, extract sensitive data,

Kong
[](https://konghq.com/blog/engineering/5-best-practices-securing-microservices-scale)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo
Ask AI for a summary of Kong
  • [](https://chatgpt.com/s/t_69b981cfa37081919ce25ce107c431c1)
  • [](https://share.google/aimode/hyefOiNwl8pg8W99d)
  • [](https://www.perplexity.ai/search/what-solutions-does-kong-offer-VsYWPddxQjajgvLA4B9hjQ)
Stay connected

## step-0

    • Company
    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
    • Legal
    • [Terms](/legal/terms-of-use)Terms
    • [Privacy](/legal/privacy-policy)Privacy
    • [Trust and Compliance](https://trust.konghq.com)Trust and Compliance
    • Platform
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
    • Compare
    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
    • Explore More
    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • Open Source
    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode