Course Outline

Introduction

  • The need for API management in government operations

Setting up Kong for Government

  • Deciding on an installation type: bare metal, cloud, containers, and Kubernetes
  • Using curl commands for initial setup
  • Installing and starting a Kong cluster to support government workflows

Overview of Kong Features and Architecture for Government

  • Kong's lightweight proxy designed for high-performance environments
  • Kong plugins to enhance functionality tailored to public sector needs

Adding Services and Routes for Government

  • Using the Admin API to manage government services and routes
  • Implementing host matching for secure and efficient routing of government requests

Consuming Services for Government

  • Configuring ports, hosts, and DNS settings to ensure seamless integration with government systems

Responding to Requests for Government

  • Reverse proxying incoming requests to improve security and performance in government networks

Controlling Traffic for Government

  • Managing, throttling, and restricting traffic to ensure compliance with public sector policies
  • Load balancing requests using dynamic ring-balancer and DNS-based methods for optimal resource utilization

Analyzing Traffic for Government

  • Visualizing, inspecting, and monitoring traffic using tools like Prometheus to enhance governance and accountability
  • Logging data transfers with solutions such as the ELK Stack to ensure transparency and auditability

Transforming Data for Government

  • Transforming requests and responses in real-time to meet specific government requirements

Securing API and Service Access for Government

  • Protecting services through an authentication layer to ensure secure access for authorized users

Integrating Kong with Third-party Services for Government

  • Calling serverless functions via APIs to support innovative government solutions

Advanced Routing Mechanisms for Government

  • Beyond simple host matching: implementing complex routing rules to meet diverse government needs

Securing the Kong Admin API for Government

  • Configuring firewall rules to enhance security for government operations
  • Using Kong as a proxy for the Admin API to provide an additional layer of protection

Extending Kong for Government

  • Adding extra functionality through Kong Plugins to support specialized government tasks
  • Creating Your Own Plugin to address unique government requirements

Scaling Kong for Government

  • Increasing nodes to process trillions of API calls to meet the demands of large-scale government projects

Troubleshooting for Government

Summary and Conclusion for Government

Requirements

  • An understanding of microservices, APIs, and other related technologies
  • Experience with the Linux command line

Audience for government

  • Developers
  • Administrators
  • DevOps engineers
 14 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories