WHY GARTNER’S “CONTEXT MESH” CHANGES EVERYTHING AI CONNECTIVITY: THE ROAD AHEAD DON’T MISS API + AI SUMMIT 2026 SEPT 30 – OCT 1
  • [Why Kong](/company/why-kong)Why Kong
    • Explore the unified API Platform
        • BUILD APIs
        • [
          Kong Insomnia](/products/kong-insomnia)
          Kong Insomnia
        • [
          API Design](/products/kong-insomnia/api-design)
          API Design
        • [
          API Mocking](/products/kong-insomnia/api-mocking)
          API Mocking
        • [
          API Testing and Debugging](/products/kong-insomnia/api-testing-and-debugging)
          API Testing and Debugging
        • [
          MCP Client](/products/kong-insomnia/mcp-client)
          MCP Client
        • RUN APIs
        • [
          API Gateway](/products/kong-gateway)
          API Gateway
        • [
          Context Mesh](/products/kong-konnect/features/context-mesh)
          Context Mesh
        • [
          AI Gateway](/products/kong-ai-gateway)
          AI Gateway
        • [
          Event Gateway](/products/event-gateway)
          Event Gateway
        • [
          Kubernetes Operator](/products/kong-gateway-operator)
          Kubernetes Operator
        • [
          Service Mesh](/products/kong-mesh)
          Service Mesh
        • [
          Ingress Controller](/products/kong-ingress-controller)
          Ingress Controller
        • [
          Runtime Management](/products/kong-konnect/features/runtime-management)
          Runtime Management
        • DISCOVER APIs
        • [
          Developer Portal](/products/kong-konnect/features/developer-portal)
          Developer Portal
        • [
          Service Catalog](/products/kong-konnect/features/api-service-catalog)
          Service Catalog
        • [
          MCP Registry](/products/mcp-registry)
          MCP Registry
        • GOVERN APIs
        • [
          Metering and Billing](/products/kong-konnect/features/usage-based-metering-and-billing)
          Metering and Billing
        • [
          APIOps and Automation](/products/apiops-automation)
          APIOps and Automation
        • [
          API Observability](/products/kong-konnect/features/api-observability)
          API Observability
        • [Why Kong?](/company/why-kong)Why Kong?
      • CLOUD
      • [Cloud API Gateways](/products/kong-konnect/features/dedicated-cloud-gateways)Cloud API Gateways
      • [Need a self-hosted or hybrid option?](/products/kong-enterprise)Need a self-hosted or hybrid option?
      • COMPARE
      • [Considering AI Gateway alternatives? ](/performance-comparison/ai-gateway-alternatives)Considering AI Gateway alternatives?
      • [Kong vs. Postman](/performance-comparison/kong-vs-postman)Kong vs. Postman
      • [Kong vs. MuleSoft](/performance-comparison/kong-vs-mulesoft)Kong vs. MuleSoft
      • [Kong vs. Apigee](/performance-comparison/kong-vs-apigee)Kong vs. Apigee
      • [Kong vs. IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs. IBM
      • GET STARTED
      • [Sign Up for Kong Konnect](/products/kong-konnect/register)Sign Up for Kong Konnect
      • [Documentation](https://developer.konghq.com/)Documentation
      • FOR PLATFORM TEAMS
      • [Developer Platform](/solutions/building-developer-platform)Developer Platform
      • [Kubernetes and Microservices](/solutions/build-on-kubernetes)Kubernetes and Microservices
      • [Observability](/solutions/observability)Observability
      • [Service Mesh Connectivity ](/solutions/service-mesh-connectivity)Service Mesh Connectivity
      • [Kafka Event Streaming](/solutions/kafka-stream-api-management)Kafka Event Streaming
      • FOR EXECUTIVES
      • [AI Connectivity](/ai-connectivity)AI Connectivity
      • [Open Banking](/solutions/open-banking)Open Banking
      • [Legacy Migration](/solutions/legacy-api-management-migration)Legacy Migration
      • [Platform Cost Reduction](/solutions/api-platform-consolidation)Platform Cost Reduction
      • [Kafka Cost Optimization](/solutions/reduce-kafka-cost)Kafka Cost Optimization
      • [API Monetization](/solutions/api-monetization)API Monetization
      • [AI Monetization](/solutions/ai-monetization)AI Monetization
      • [AI FinOps](/solutions/ai-cost-governance-finops)AI FinOps
      • FOR AI TEAMS
      • [AI Governance](/solutions/ai-governance)AI Governance
      • [AI Security](/solutions/ai-security)AI Security
      • [AI Cost Control](/solutions/ai-cost-optimization-management)AI Cost Control
      • [Agentic Infrastructure](/solutions/agentic-ai-workflows)Agentic Infrastructure
      • [MCP Production](/solutions/mcp-production-and-consumption)MCP Production
      • [MCP Traffic Gateway](/solutions/mcp-governance)MCP Traffic Gateway
      • FOR DEVELOPERS
      • [Mobile App API Development](/solutions/mobile-application-api-development)Mobile App API Development
      • [GenAI App Development](/solutions/power-openai-applications)GenAI App Development
      • [API Gateway for Istio](/solutions/istio-gateway)API Gateway for Istio
      • [Decentralized Load Balancing](/solutions/decentralized-load-balancing)Decentralized Load Balancing
      • BY INDUSTRY
      • [Financial Services](/solutions/financial-services-industry)Financial Services
      • [Healthcare](/solutions/healthcare)Healthcare
      • [Higher Education](/solutions/api-platform-for-education-services)Higher Education
      • [Insurance](/solutions/insurance)Insurance
      • [Manufacturing](/solutions/manufacturing)Manufacturing
      • [Retail](/solutions/retail)Retail
      • [Software & Technology](/solutions/software-and-technology)Software & Technology
      • [Transportation](/solutions/transportation-and-logistics)Transportation
      • [See all Solutions](/solutions)See all Solutions
  • [Pricing](/pricing)Pricing
      • DOCUMENTATION
      • [Kong Konnect](https://developer.konghq.com/konnect/)Kong Konnect
      • [Kong Gateway](https://developer.konghq.com/gateway/)Kong Gateway
      • [Kong Mesh](https://developer.konghq.com/mesh/)Kong Mesh
      • [Kong AI Gateway](https://developer.konghq.com/ai-gateway/)Kong AI Gateway
      • [Kong Event Gateway](https://developer.konghq.com/event-gateway/)Kong Event Gateway
      • [Kong Insomnia](https://developer.konghq.com/insomnia/)Kong Insomnia
      • [Plugin Hub](https://developer.konghq.com/plugins/)Plugin Hub
      • EXPLORE
      • [Blog](/blog)Blog
      • [Learning Center](/blog/learning-center)Learning Center
      • [eBooks](/resources/e-book)eBooks
      • [Reports](/resources/reports)Reports
      • [Demos](/resources/demos)Demos
      • [Customer Stories](/customer-stories)Customer Stories
      • [Videos](/resources/videos)Videos
      • EVENTS
      • [API + AI Summit](/events/conferences/api-ai-summit)API + AI Summit
      • [Agentic Era World Tour](/agentic-era-world-tour)Agentic Era World Tour
      • [Webinars](/events/webinars)Webinars
      • [User Calls](/events/user-calls)User Calls
      • [Workshops](/events/workshops)Workshops
      • [Meetups](/events/meetups)Meetups
      • [See All Events](/events)See All Events
      • FOR DEVELOPERS
      • [Get Started](https://developer.konghq.com/)Get Started
      • [Community](/community)Community
      • [Certification](/academy/certification)Certification
      • [Training](https://education.konghq.com)Training
      • COMPANY
      • [About Us](/company/about-us)About Us
      • [We're Hiring!](/company/careers)We're Hiring!
      • [Press Room](/company/press-room)Press Room
      • [Contact Us](/company/contact-us)Contact Us
      • [Kong Partner Program](/partners)Kong Partner Program
      • [Enterprise Support Portal](https://support.konghq.com/s/)Enterprise Support Portal
      • [Documentation](https://developer.konghq.com/?_gl=1*tphanb*_gcl_au*MTcxNTQ5NjQ0MC4xNzY5Nzg4MDY0LjIwMTI3NzEwOTEuMTc3MzMxODI2MS4xNzczMzE4MjYw*_ga*NDIwMDU4MTU3LjE3Njk3ODgwNjQ.*_ga_4JK9146J1H*czE3NzQwMjg1MjkkbzE4OSRnMCR0MTc3NDAyODUyOSRqNjAkbDAkaDA)Documentation
  • [](/search)
  • [Login](https://cloud.konghq.com/login)Login
  • [Book Demo](/contact-sales)Book Demo
  • [Get Started](/products/kong-konnect/register)Get Started
[Blog](/blog)Blog
  • [AI Gateway](/blog/tag/ai-gateway)AI Gateway
  • [AI Security](/blog/tag/ai-security)AI Security
  • [AIOps](/blog/tag/aiops)AIOps
  • [API Security](/blog/tag/api-security)API Security
  • [API Gateway](/blog/tag/api-gateway)API Gateway
|
    • [API Management](/blog/tag/api-management)API Management
    • [API Development](/blog/tag/api-development)API Development
    • [API Design](/blog/tag/api-design)API Design
    • [Automation](/blog/tag/automation)Automation
    • [Service Mesh](/blog/tag/service-mesh)Service Mesh
    • [Insomnia](/blog/tag/insomnia)Insomnia
    • [View All Blogs](/blog/page/1)View All Blogs
We're Entering the Age of AI Connectivity [Read more](/blog/news/the-age-of-ai-connectivity)Read moreProducts & Agents:
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong API Gateway](/products/kong-gateway)Kong API Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Metering & Billing](/products/usage-based-metering-and-billing)Kong Metering & Billing
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
  • [Documentation](https://developer.konghq.com)Documentation
  • [Book Demo](/contact-sales)Book Demo
  1. Home
  2. Blog
  3. Learning Center
  4. API Rate Limiting: Beginner's Guide
[Learning Center](/blog/learning-center)Learning Center
July 23, 2024
9 min read

# API Rate Limiting: Beginner's Guide

Kong

## What is API rate limiting?

API rate limiting involves using a mechanism to control the number of requests an API can handle in a certain time period. It's a key process for ensuring that APIs perform to a high level, provide a quality user experience, and protect the system from overload. 

APIs act as the foundation for communication between different software components in modern web services, so API rate limiting is crucial for ensuring smooth communication and preventing abuse of the system. API rate limiting can help maintain optimal performance, but there are a few key considerations when it comes to developing your own API rate limiting strategy. Keep reading for all you need to know about API rate limiting and how you can devise a strategy that will work for you. 

### Why API rate limiting is necessary

API rate limiting is important for a number of different reasons. The main reasons include:

  • - **Preventing abuse**: Limiting a user's number of requests can help prevent abuse like denial-of-service (DoS) attacks and various other cyber attacks. [According to Kong research](https://konghq.com/blog/enterprise/apis-are-mission-critical)According to Kong research, attacks are estimated to surge 996% by 2030. With cybercrime on the rise and posing a serious threat to users and organizations, this is a key reason to implement rale limiting.
  • - **Managing resources**: API rate limiting can help in terms of managing server resources by preventing a single user from monopolizing the system with a limit on the number of requests that can be made within a certain timeframe. 
  • - **Ensuring fair usage**: Limiting the number of requests a single user can make also ensures fair use with equal access to the API.
  • - **Cost management**: Companies can also better manage the various costs involved with bandwidth and server resources by controlling API usage. These IT costs can be expensive and impact the bottom line, so improving the management of these costs can help to improve the overall financial wellbeing of the business. 

### The role of API rate limiting in managing traffic

API rate limiting plays a vital role in managing traffic so that APIs can perform at a high level while handling high volumes of requests. It helps by regulating the flow of data, balancing the load on servers, and avoiding traffic spikes, which should prevent crashes or slowdowns.

## How API rate limiting works

So, how exactly does API rate limiting work? Essentially, rate limiting establishes rules and thresholds for API usage. When a user makes a request, the API checks to see if it falls within the allowed limits. If it does, the request is accepted. If it exceeds the allowed limits, the API rejects it and provides an error message to the user. 

### Type of rate limiting algorithms

There are a number of different algorithms that can be used for API rate limiting. It's helpful to be aware of the various types and the way in which they work to determine the best type for your needs. The main types of API rate limiting algorithms include:

#### Token bucket algorithm

As the name implies, the token bucket algorithm works similarly to a token bucket — a "bucket" is filled with request tokens, one being taken each time a new request is made by a user. Once the bucket is empty, the request is denied. Tokens are also added at a fixed rate, which allows for bursts of traffic up to the bucket's capacity.

#### Leaky bucket algorithm

The leaky bucket algorithm, meanwhile, works like a bucket with a hole at the bottom when a stream of water is poured in. Requests flow out of the bucket at a consistent rate no matter what the input rate is. Once the bucket overflows, requests are denied. This helps ensure a steady flow of traffic and smooths out any bursts.

#### Fixed window algorithm

This algorithm divides time into fixed windows (intervals), with a limit on the number of requests allowed in each window. The count will reset once the window closes and a new one begins. This can be an effective algorithm for API rate limiting, but it can also lead to bursts of traffic. 

#### Sliding window algorithm

The sliding window algorithm uses a moving window of time to count the number of requests made and continuously updates the count based on the current time. This allows for a smooth handling of requests and accurate control of traffic.

Ultimately, when picking an API rate limiting algorithm, it's important to consider your traffic patterns, system requirements, and the level of control and accuracy desired. 

## Advantages of implementing rate limiting APIs

### Enhancing security and preventing attacks

One of the key benefits of implementing rate limiting APIs is that it can help enhance security and prevent attacks. Cybercrime has been fast on the rise in recent times, with attackers using a range of sophisticated strategies, but rate limiting can help prevent attacks that aim to overwhelm the system, such as DoS attacks, brute force attempts, and API abuse.

### Improving server performance and user experience

API rate limiting can also improve server performance by regulating traffic and making sure that resources aren't exhausted. By providing reliable and consistent access to the API, rate limiting also enhances the user experience. 

Rate limiting can also be helpful in terms of maintaining fast response times during periods of high traffic. This will provide a smooth and uninterrupted experience for every user, which is helpful for improving and maintaining user satisfaction levels and trust. 

## Common challenges in rate limiting APIs

While there are clear benefits to rate limiting APIs, there are also a few common challenges:

### Balancing strictness vs. usability

It's challenging to find the right balance between strictness and usability as you do not want to frustrate users, but at the same time, you must protect the API from exhaustion and abuse. 

### Handling peak traffic times

It can also be challenging to handle traffic during peak times, which is why you must use effective rate limiting strategies to handle surges in traffic. Unexpected spikes in traffic can put a strain on the system, so it's important that it is strong enough to maintain performance without limiting users. Scalable infrastructure and planning will be key for this.

## Getting started with API rate limiting

### Requirements for setting up API rate limiting

To set up API rate limiting, you'll need an [API gateway](https://konghq.com/blog/learning-center/what-is-an-api-gateway)API gateway that provides rate limiting features and monitoring tools to track and analyze usage. You then need to set defined limits on the number of requests per user or IP address. An error-handling mechanism is then required to notify users when they have exceeded their limits. 

### Identifying your API's capacity and usage patterns

It's vital that you identify your API's capacity and usage patterns to set appropriate limits and anticipate potential problems. You can look at data to find peak usage times, average request rates, and typical user behavior. When you understand these patterns, you can create a rate limiting strategy that will maximize resource efficiency and minimize disruptions. You can also make decisions based on data, which reduces risk by helping you make informed decisions about rate limiting. 

## Step-by-step guide to implementing API rate limiting

There are four steps to implement API rate limiting: chooseing your rate limiting algorithm, defining rate limits based on user needs, implementing monitoring for rate limits, and communicating limits to API consumers.

### Step 1: Choose the right rate limiting algorithm

To implement API rate limiting effectively, the first step is selecting the appropriate rate limiting algorithm. Key options include the token bucket algorithm, leaky bucket algorithm, fixed window algorithm, and sliding window algorithm. Each algorithm operates uniquely, with factors like fixed time periods, bursts of requests, and timing considerations playing a crucial role in determining the most suitable option for your specific API traffic and user experience requirements. Making an informed decision in this initial step will greatly impact the overall performance and security of your API.

### Step 2: Define rate limits based on user needs

When implementing API rate limiting, defining rate limits based on user needs is crucial. It involves understanding the specific requirements of different user segments to ensure fair access while preventing abuse. Tailoring rate limits according to user behavior, such as distinguishing between regular users and high-volume consumers, helps maintain a balance between usability and security. By aligning rate limits with user needs, API providers can optimize the user experience and effectively manage their API traffic. This step is essential for enforcing industry standards and best practices.

### Step 3: Implement monitoring for rate limits

Implementing monitoring for rate limits involves setting up systems to track and analyze the number of requests against defined limits. Utilizing tools like Google Maps API or custom software applications, you can monitor API traffic patterns, enforcing rate limits when necessary. By monitoring in real-time, you can quickly identify and throttle requests that exceed set limits, ensuring optimal performance and preventing unnecessary traffic spikes. This step is crucial for maintaining a balance between user experience and system stability.

### Step 4: Communicate limits to API consumers

Ensure seamless communication of rate limits to API consumers. Clearly document the constraints in your API documentation. Display error messages or codes when limits are reached. Specify how long they need to wait before making subsequent requests. Educate users on the importance of adhering to limits for overall system health. Transparency builds trust with your API consumers, enhancing their experience while preventing misuse. Effective communication helps them navigate the restrictions and optimally utilize your API resources.

## Testing and monitoring your API rate limits

### Tools and techniques for effective monitoring

Various monitoring tools and techniques can be used to effectively monitor API rate limits. Analytics platforms and API management tools can track request patterns and detect issues while allowing you to adjust limits if necessary. Real-time dashboards can also provide real-time data, allowing you to make timely decisions and address issues rapidly.

### Adjusting limits based on analytics

The data received from analytics will help you decide on the best rate limiting strategy and enable you to strike the right balance of strictness and usability. Crucially, make sure that you regularly review usage patterns, as these can change over time, so you may need to adjust your rate limit to satisfy users and protect the system.

#### Conclusion

API rate limiting is essential for providing fair usage and protecting the system against abuse. It helps maintain optimal API performance, but it's important to create the right strategy for your requirements. This will involve having a strong understanding of the different rate limiting algorithms, setting appropriate limits based on data, and ongoing monitoring. This will allow you to improve the user experience, enhance security, and protect system stability. 

The information in this post should be informative and give you a strong understanding of API rate limiting. This will empower you to develop your own API rate limiting strategy that will allow you to strike the right balance of strictness and usability. By choosing the right algorithm and setting data-based limits, you can improve server performance and user experience while enhancing security. It's then a case of monitoring API data so that you can make adjustments to maximize resources and improve the user experience.

## Protect Mission-Critical APIs & Services: Efficient protection strategies revealed

[Watch Now](/events/webinars/protect-apis-services)Watch Now

## Rate limiting FAQs

#### What happens when an API rate limit is exceeded?

When an API rate limit is exceeded, an error message will be displayed to the user. This error message usually includes a notification that the limit has been reached and when the user will be able to make a request again.

#### Can API rate limits be configured per user?

It's possible to configure API rate limits per user, meaning that different limits can be set for different user segments. This is helpful for ensuring fair access to APIs with the ability to customize to the differing needs of different user groups. 

#### How do rate limits affect API performance and scalability?

API rate limiting can play a key role in API performance and scalability. It allows for controlling the flow of requests and preventing server overload, ensuring that the API is usable and responsive even during periods of heavy traffic. This will provide a positive user experience and facilitate the long-term scalability of the API.

- [Rate Limiting](/blog/tag/rate-limiting)Rate Limiting- [API Gateway](/blog/tag/api-gateway)API Gateway

## More on this topic

_Videos_

## End-to-End Tracing with OpenTelemetry and Kong

_Videos_

## Buidling Resilient API Gateway Patterns at Scale

## See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

[Get a Demo](/contact-sales)Get a Demo
**Topics**
- [Rate Limiting](/blog/tag/rate-limiting)Rate Limiting- [API Gateway](/blog/tag/api-gateway)API Gateway
Kong

Recommended posts

# Practical Strategies to Monetize AI APIs in Production

[Engineering](/blog)EngineeringMarch 27, 2026

Traditional APIs are, in a word, predictable. You know what you're getting: Compute costs that don't surprise you Traffic patterns that behave themselves Clean, well-defined request and response cycles AI APIs, especially anything that runs on LLMs

Deepanshu Pandey
[](https://konghq.com/blog/engineering/monetize-ai-apis)

# Open Banking: The Guide on APIs, Regulations, and the Future of Finance

[Learning Center](/blog)Learning CenterApril 7, 2026

In January 2024, consumers in the United Kingdom made a record-breaking 14.5 million open banking payments. This milestone shows how dramatically the financial services industry has changed. It's the result of years of regulatory work that kicked of

Kong
[](https://konghq.com/blog/learning-center/guide-on-open-banking)

# What is Apache Kafka? Guide for Beginners

[Learning Center](/blog)Learning CenterDecember 8, 2025

Apache Kafka is a distributed, fault-tolerant, high-throughput event-streaming platform. LinkedIn originally developed it to handle massive data pipelines. The Apache Software Foundation now maintains this open-source project. The Commit Log Mental

Kong
[](https://konghq.com/blog/learning-center/apache-kafka)

# Protecting Services With Kong Gateway Rate Limiting

[Engineering](/blog)EngineeringMay 18, 2021

The Kong Gateway Rate Limiting plugin is one of our most popular traffic control add-ons. You can configure the plugin with a policy for what constitutes "similar requests" (requests coming from the same IP address, for example), and you can set y

Guanlan Dai
[](https://konghq.com/blog/engineering/kong-gateway-rate-limiting)

# Connecting Kong and Solace: Building Smarter Event-Driven APIs

[Engineering](/blog)EngineeringMarch 20, 2026

Running Kong in front of your Solace Broker adds real benefits: Authentication & Access Control – protect your broker from unauthorized publishers. Validation & Transformation – enforce schemas, sanitize data, and map REST calls into event topics.

Hugo Guerrero
[](https://konghq.com/blog/engineering/smarter-event-driven-apis-kong-solace)

# Kong Simplifies Multicloud Cloud Gateways with Managed Redis Cache

[Product Releases](/blog)Product ReleasesMarch 12, 2026

Managed Redis cache is a turnkey "Shared State" add-on for Kong Dedicated Cloud Gateways. It is designed to combine the performance of an in-memory data store with the simplicity of a SaaS product. When you spin up a Dedicated Cloud Gateway in Kong

Amit Shah
[](https://konghq.com/blog/product-releases/multicloud-cloud-gateways-managed-redis-cache)

# Configuring Kong Dedicated Cloud Gateways with Managed Redis in a Multi-Cloud Environment

[Engineering](/blog)EngineeringMarch 12, 2026

Architecture Overview A multicloud DCGW architecture typically contains three main layers. 1\. Konnect Control Plane The SaaS control plane manages configuration, plugins, and policies. All gateways connect securely to this layer. 2\. Dedicated C

Hugo Guerrero
[](https://konghq.com/blog/engineering/dedicated-cloud-gateways-managed-redis-multi-cloud)

## Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

[Get a Demo](/contact-sales)Get a Demo
Ask AI for a summary of Kong
  • [](https://chatgpt.com/s/t_69b981cfa37081919ce25ce107c431c1)
  • [](https://share.google/aimode/hyefOiNwl8pg8W99d)
  • [](https://www.perplexity.ai/search/what-solutions-does-kong-offer-VsYWPddxQjajgvLA4B9hjQ)
Stay connected

## step-0

    • Company
    • [About Kong](/company/about-us)About Kong
    • [Customers](/customer-stories)Customers
    • [Careers](/company/careers)Careers
    • [Press](/company/press-room)Press
    • [Events](/events)Events
    • [Contact](/company/contact-us)Contact
    • [Pricing](/pricing)Pricing
    • Legal
    • [Terms](/legal/terms-of-use)Terms
    • [Privacy](/legal/privacy-policy)Privacy
    • [Trust and Compliance](https://trust.konghq.com)Trust and Compliance
    • Platform
    • [Kong AI Gateway](/products/kong-ai-gateway)Kong AI Gateway
    • [Kong Konnect](/products/kong-konnect)Kong Konnect
    • [Kong Gateway](/products/kong-gateway)Kong Gateway
    • [Kong Event Gateway](/products/event-gateway)Kong Event Gateway
    • [Kong Insomnia](/products/kong-insomnia)Kong Insomnia
    • [Documentation](https://developer.konghq.com)Documentation
    • [Book Demo](/contact-sales)Book Demo
    • Compare
    • [AI Gateway Alternatives](/performance-comparison/ai-gateway-alternatives)AI Gateway Alternatives
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • [Kong vs IBM](/performance-comparison/ibm-api-connect-vs-kong)Kong vs IBM
    • [Kong vs Postman](/performance-comparison/kong-vs-postman)Kong vs Postman
    • [Kong vs Mulesoft](/performance-comparison/kong-vs-mulesoft)Kong vs Mulesoft
    • Explore More
    • [Open Banking API Solutions](/solutions/open-banking)Open Banking API Solutions
    • [API Governance Solutions](/solutions/api-governance)API Governance Solutions
    • [Istio API Gateway Integration](/solutions/istio-gateway)Istio API Gateway Integration
    • [Kubernetes API Management](/solutions/build-on-kubernetes)Kubernetes API Management
    • [API Gateway: Build vs Buy](/campaign/secure-api-scalability)API Gateway: Build vs Buy
    • [Kong vs Apigee](/performance-comparison/kong-vs-apigee)Kong vs Apigee
    • Open Source
    • [Kong Gateway](https://developer.konghq.com/gateway/install/)Kong Gateway
    • [Kuma](https://kuma.io/)Kuma
    • [Insomnia](https://insomnia.rest/)Insomnia
    • [Kong Community](/community)Kong Community

Kong enables the connectivity layer for the agentic era – securely connecting, governing, and monetizing APIs and AI tokens across any model or cloud.

  • Japanese
  • Frenchcoming soon
  • Spanishcoming soon
  • Germancoming soon
© Kong Inc. 2026
Interaction mode