Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Learning Center

Learning Center

Explore foundational guides unlocking key industry concepts and technologies.

‹Prev1…345Next›

API Gateway Authentication

Kong Logo
Learning CenterApril 19, 2022

What is an API Gateway? In essence, it authenticates that a particular consumer has permission to access the API, using a predefined set of credentials. There are special cases — for example, the option to allow anonymous authentication — but generally speaking, the aim of API authentication is to…

Kong

What is Cloud Native?

Kong Logo
Learning CenterMarch 10, 2022

With cloud-native technology gaining popularity by the day, it's crucial for businesses to stay up-to-date with its innovative architecture and functionalities. As opposed to traditional monolithic architectures, cloud-native infrastructure adopts a modular design made up of small but powerful…

Kong

Reasons to Use an API Gateway

Kong Logo
Learning CenterMarch 10, 2022

A microservice -based system can consist of dozens or even hundreds of individual services communicating with each other via APIs . While its possible for a client be that a web browser, application or IoT device to make requests to the relevant microservice directly, this approach has a number of…

Kong

Why Do Microservices Need an API Gateway?

Kong Logo
Learning CenterMarch 10, 2022

Microservices architecture has become extremely popular for building scalable applications from small, independent services. However, the decentralized nature of microservices brings certain drawbacks that API gateways are purpose-built to address. This article explains the role and benefits of…

Kong

Building and Securing API Gateway Architecture

Kong Logo
Learning CenterMarch 10, 2022

If the connection from clients to your API gateway isn't encrypted, all messages you send and receive are out in the open for all to read. In looking for a way in, attackers will make use of all features of an API, even the undocumented ones; security by obscurity is not a realistic defense…

Kong

What Does a Secure API Gateway Look Like?

Kong Logo
Learning CenterMarch 10, 2022

An API gateway provides routing, traffic control and security capabilities which would otherwise be the responsibility of API consumers and upstream APIs. Additionally, the Gateway becomes a rich source of operational metrics useful for analytics, usage statistics and alerting. However, by…

Kong

Microservices Monitoring and Distributed Tracing Tools

Kong Logo
Learning CenterMarch 10, 2022

Monitoring the health of your production system involves keeping track of various data points in real time in order to derive insights from them. Day to day, monitoring can provide early indications of problems, giving the team time to investigate and fix before a system fails completely. If youre…

Kong

Understanding Microservices Authentication Services

Kong Logo
Learning CenterMarch 10, 2022

Authentication is the process of determining who a user is by, for example, asking them to provide a username and password or using multi-factor authentication. Once you know who the user is, you can check their account details to determine what they are authorized to access. Creating a session for…

Kong

RESTful API Best Practices

Kong Logo
Learning CenterMarch 10, 2022

In this article, were going to walk through a brief origin of RESTful APIs and then take a good look at what to consider when building your own APIs with RESTful design. RE presentational S tate T ransfer or REST is an architectural pattern designed by Roy Fielding, in a chapter of the dissertation…

Kong

Vendor Lock-In: What Is It and How Do You Avoid It?

Kong Logo
Learning CenterMarch 10, 2022

While this idiom generally refers to the concept of avoiding the investment of all of ones energy or resources into a single venture at the risk of losing everything, in this context, the risk of locking in to a single vendor is a different cost: budget, manpower and time. When migrating an…

Kong

Configuring API Gateways for High Availability (HA) Clusters

Kong Logo
Learning CenterMarch 10, 2022

One of the many benefits of a microservices architecture over the traditional monolith approach to application design is the ability to scale the individual microservices as required for performance and availability. In production scenarios requiring high availability, uptime is always limited by…

Kong

Control Plane vs. Data Plane - What's the Difference?

Kong Logo
Learning CenterMarch 10, 2022

What do these terms mean? Do they refer to the same things in Kubernetes as they do in a service mesh? If you've encountered difficulty searching for a straight answer, look no further. Ultimately, the terms control plane and data plane are all about the separation of concern — that is, a clear…

Kong

An Introduction to Hybrid and Multi-Cloud Connectivity

Kong Logo
Learning CenterMarch 10, 2022

Hybrid and multi-cloud models have become popular for helping to prevent vendor lock-in, reducing costs, and allowing businesses to stay innovative by only using the best features of each cloud provider. Adopting a hybrid model has also been influenced by growing security concerns and tougher…

Kong

What are API Gateway Policies?

Kong Logo
Learning CenterMarch 10, 2022

An API Gateway is becoming an essential part of modern application architecture. It acts as a reverse proxy that routes API requests to appropriate backend services. Along with routing, API Gateways provide capabilities like security, monitoring, rate limiting, and more for your APIs. A major…

Kong

API Gateway Automation

Kong Logo
Learning CenterMarch 10, 2022

While advances in technology drive innovation, an organizations DevOps strategy drives product delivery. As organizations modernize, automating delivery of services will be key to maintaining momentum and speed to market. Here is a high-level overview of the state of components that make up API…

Kong
‹Prev1…345Next›

See AI Gateway in Action

Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026