Training Courses
All training is included FREE with your Kong summit registration, along with a $100 discount voucher for your certification exam!
4 hours | September 27, 2022, 8-12PM PT
Overview
This half-day course is designed to introduce you to the core knowledge and functionality needed to utilize the Kong Konnect SaaS product for your organization. At a high level, Konnect allows organizations to manage multiple runtimes from a single, cloud-based control plane, giving you an overview of all deployed services. You can deploy these runtimes in different target environments, data centers, geographies, or zones without needing a local clustered database for each runtime group.
By the end of this course, you should be able to meet the following objectives:
- Manage Konnect authentication/authorization for users using teams and roles.
- Understand how to provision hosted Kong Gateway control planes and support securely attaching Kong Gateway data planes from a cloud or hybrid environments.
- Make your APIs discoverable, consumable, and reusable for development teams.
- Catalog services to create a single source of truth for an organization’s service inventory.
- Create a Dev Portal for developers to locate, access, and consume API services.
- Get insights into service, route, and application usage and health monitoring data.
Course Objectives
- Kong Gateway Foundations course
- Basic Linux command line proficiency
- General networking proficiency
- Understand RESTful API concepts
- Basic understanding of cloud and data center architectures
- General understanding of your API Management needs
Prerequisites
- What is Konnect Cloud?
- Managing access to Konnect Cloud
- Managing Services using Service Hub
- Runtime management using Runtime Manager
- Monitoring of Services using Konnect Vitals
- Using Dev Portal for API catalog management
Course Outline
4 hours | September 27, 2022, 1-5PM PT
Overview
This course is targeted at operators or site reliability engineers tasked with managing a Kong Mesh deployment. To help learners understand the context in which the Kong Mesh is used, the course includes foundational concepts of microservices and APIs. The course balances lecture, hands-on exercise and quizzes to keep learners engaged and to ensure that the learning objectives are achieved.
By the end of this course, you should be able to meet the following objectives:
- Discuss the move from monolith to microservices architectures
- Understand and explain Service Mesh
- Explain connectivity in a modern application environment
- Understand and explain different deployment models for Kong Mesh
- Deploy and secure Kong Mesh
- Control traffic with Kong Mesh policies
Course Objectives
- Basic Linux command line proficiency
- General networking proficiency
- Understanding of RESTful API concepts
- Git workflow
- Understanding of microservices architectures
- Understanding of Kubernetes
Prerequisites
- The journey to microservices architectures
- Business case for using Mesh
- Introduction to Kong Mesh
- Understanding Service Mesh
- Kong Mesh Architecture Overview
- Kong Mesh History/Heritage
- Advantages of Kong Mesh vs. competition
- Deploying Kong Mesh with Zero-Trust Security
- Standalone, Multi-Zone and Multi-Mesh Architecture
- Deploying and securing a Kong Mesh (Standalone Deployment)
- Enabling Zero-Trust Security with mTLS
- Kong Mesh and mTLS
- Strict and Passive mTLS
- Certificate Rotation
- Using CLI and GUI
- Canary Deployments
- Using Kong Gateway with Kong Mesh
- Controlling Traffic with Kong Mesh Policies
- Understanding Policies
- Order of Policy enforcement
- Common Policies
- Resilience Evaluation
- Circuit Breaking
- External Services
Course Outline
8 hours (1 hour lunch) | September 27, 2022, 8-5PM PT
Overview
The Kong Gateway Operations course covers the essential knowledge required to deploy and operate a Kong Gateway implementation. It is required in order to take the Kong Gateway Associate certification exam. The course balances lecture, hands-on exercise and quizzes to keep learners engaged and to ensure that the learning objectives are achieved.
By the end of this course, you should be able to meet the following objectives:
- Understand Kong Gateway deployment modes
- Deploy and secure Kong Gateway
- Secure services
- Use Kong Vitals (Vitals) to monitor Kong Gateway's health and performance
- Understand the use cases of the advanced plugins
- Troubleshoot common problems
Course Objectives
- Kong Gateway Foundations
- Basic Linux command line proficiency
- General networking proficiency
- Understanding of RESTful API concepts
- Git workflow
Prerequisites
- Kong Gateway Installation on Docker
- Install and configure Kong Gateway and Kong Manager
- Securing Kong
- Admin API
- Authn/z
- Securing Services on Kong
- Auth
- Rate-limit
- mTLS
- OIDC Plugin
- Configure the OIDC plugin to authenticate requests using the OpenID Connect protocol
- Kong Vitals
- Understand the difference between health and traffic metrics
- Pulling metrics using Vitals API
- Using InfluxDB or Prometheus with Vitals
- Advanced Plug-in Introduction
- Rate Limiting Advanced Plugin
- Request & Response Transformer
- jq Plugin
- Exit Transformer Plugin
- Prometheus Plugin
- Troubleshooting
- Troubleshooting Methodology & Techniques
- Distinguishing between downstream and upstream networking issues
- Collecting troubleshooting information
Course Outline
8 hours (1 hour lunch) | September 27, 2022, 8-5PM PT
Overview
The Kong Gateway Operations on Kubernetes course covers the essential knowledge required to deploy and operate a Kong Gateway in a kubernetes cluster. It is required in order to take the Kong Gateway for Kubernetes Associate certification exam. The course balances lecture, hands-on exercise and quizzes to keep learners engaged and to ensure that the learning objectives are achieved. The Kong Ingress Controller for Kubernetes (KIC) is covered to demonstrate how to use Kong’s Kubernetes Custom Resource Definitions (CRDs) to configure the Gateway via kubectl.
By the end of this course, you should be able to meet the following objectives:
- Understand Kong Gateway deployment modes
- Deploy and secure Kong Gateway on a Kubernetes cluster
- Secure Application Services and Routes
- Use Kong Vitals (Vitals) to monitor Kong Gateway's health and performance
- Understand the use cases of the advanced plugins for customizing to individual application needs
- Troubleshoot common problems
Course Objectives
- Kong Gateway Foundations
- Basic Linux command line proficiency
- General networking proficiency
- Understanding of RESTful API concepts
- Git workflow
- Knowledge of helm, kubectl, yaml, docker
Prerequisites
- Kong Gateway Installation on Kubernetes
- Install and configure Kong Gateway and Kong Manager on a Kubernetes cluster
- Introduction to Kong Ingress Controller for Kubernetes (KIC)
- Securing Kong Admin Functions
- Admin API
- Authn/z
- Securing Application Services on Kong
- Auth
- Rate-limit
- mTLS
- OIDC Plugin
- Configure the OIDC plugin to authenticate requests using the OpenID Connect protocol Troubleshooting
- Troubleshooting Methodology & Techniques
- Distinguishing between downstream and upstream networking issues
- Collecting troubleshooting information
- Kong Vitals
- Understand the difference between health and traffic metrics
- Pulling metrics using Vitals API
- Using InfluxDB or Prometheus with Vitals
- Advanced Plug-in Introduction
- Rate Limiting Advanced Plugin
- Prometheus Plugin
- Request & Response Transformer