# Getting Started with Kong Mesh and Open Policy Agent

OPA support to secure communication between these calls [cta-banner
[](/blog/engineering/kong-service-mesh-and-opa-policy)
OPA support to secure communication between these calls [cta-banner

While organizations work to innovate with new services and offerings, silos can lead to inefficient pockets, restricting the ability to take incubation projects to market. This can limit the speed and efficiency to scale the new offering. So how does your organization offer a scalable platform to…

In this Kong Gateway tutorial, you'll learn how to: Keep in mind that these instructions are a starting point. You may need to change some of the steps to harden your environment when running in production. For more detailed information, visit our Kong Gateway documentation . One of the reasons…

Almost all aspects of businesses are transforming to digital and internet-based solutions. It’s happening from the ground up, starting with developers. You're building applications for your organizations, and you're racing to get software and services out to the market faster. The faster your…

This tutorial shows you how easy it is to build a custom Lua plugin for Kong Gateway. My Kong Lua plugin example will automatically add a custom header to any response sent out, indicating the current plugin version. Kong API Gateway is built on OpenResty , which extends the NGINX proxy server to…

Many companies are leveraging DevOps, microservices , automation, self-service, cloud and CI/CD pipelines. These megatrends are changing how companies are building and running software. One thing that often slips through the cracks is security. With microservices, there's an increase in the number…

We are truly excited to release Kong Mesh 1.2 today and introduce three new security capabilities that make it the most secure enterprise service mesh available today. Kong Mesh is built on open source Kuma which Kong created in 2019 and has since donated it to the CNCF . Kuma is a universal…

In this tutorial, I'm going to walk through adding OAuth2 authorization and authentication to your service with the Kong API Gateway OAuth2 plugin . First, I'll cover the fundamentals. If you're already familiar with how Kong Gateway and OAuth2 work, skip ahead to the tutorial . Interconnected.…

TL;DR Insomnia Designer and Insomnia Core are now Insomnia. Insomnia Designer users will have to migrate to the new Insomnia application and Designer will no longer receive updates. When we originally built Insomnia Designer, we didn’t want to make large changes to Insomnia without understanding…

Kuma is an open source, CNCF service mesh that supports every environment, including Kubernetes and virtual machines. In this Kuma service mesh tutorial, I will show you how easy it is to get started. [iframe loading="lazy" width="890" height="560" src=""…

This article was written by Jeremy Justus and Ross Sbriscia, senior software engineers from UnitedHealth Group/Optum. This blog post is part three of a three-part series on how they've scaled their API management with Kong Gateway , the world's most popular open source API gateway. (Here's part

The concept of zero-trust security is relatively simple. In essence, no entity or system should have trust by default. You should assume that any system you are talking to is not trustworthy until you establish otherwise. Within Kong Konnect , one mechanism to apply zero-trust is the OpenID Connect…

It is a truth universally acknowledged that the culture change side of any technology transformation program is the hardest and slowest part to get right. If you cannot efficiently operationalize a technology investment, that investment is wasted. This is no different in the world of APIs and…

We are happy to announce a new release of Kuma – v1.0.8 – that ships with new health checking features and several improvements! We highly suggest to upgrade to this new version. For a complete list of features and updates, take a look at the full changelog . Join us on our community channels…

This article was written by Jeremy Justus and Ross Sbriscia, senior software engineers from UnitedHealth Group/Optum. This blog post is part two of a three-part series on how we've scaled our API management with Kong Gateway , the world's most popular open source API gateway. (Here’s part one…
Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.
Secure your AI infrastructure with prompt guards, PII sanitization, and centralized governance. Control LLM costs with token-based rate limiting and semantic routing across providers.