Course Outline

Introduction

  • The necessity for effective API management in government operations

Setting up Kong for Government

  • Selecting an appropriate installation method: bare metal, cloud, containers, or Kubernetes
  • Utilizing curl commands for configuration
  • Installing and initializing a Kong cluster for government use

Overview of Kong Features and Architecture for Government

  • Kong's lightweight proxy capabilities
  • The role of Kong plugins in enhancing functionality

Adding Services and Routes for Government Applications

  • Using the Admin API to manage services and routes
  • Implementing host matching for enhanced service delivery

Consuming Services for Government Operations

  • Configuring ports, hosts, and DNS settings for optimal performance

Responding to Requests in Government Systems

  • Reverse proxying incoming requests to ensure secure and efficient service access

Controlling Traffic for Government Services

  • Managing, throttling, and restricting traffic to maintain system integrity
  • Load balancing strategies: dynamic ring-balancer versus DNS-based methods

Analyzing Traffic for Government Oversight

  • Visualizing, inspecting, and monitoring traffic using tools like Prometheus
  • Logging data transfers with solutions such as the ELK Stack

Transforming Data for Government Use

  • Real-time transformation of requests and responses to meet specific government requirements

Securing API and Service Access for Government

  • Implementing an authentication layer to protect sensitive services

Integrating Kong with Third-party Services for Government

  • Invoking serverless functions via APIs to enhance service capabilities

Advanced Routing Mechanisms for Government Applications

  • Implementing complex routing beyond simple host matching

Securing the Kong Admin API for Government Operations

  • Configuring firewall rules to enhance security
  • Using Kong as a proxy for the Admin API to add an additional layer of protection

Extending Kong for Government Needs

  • Adding extra functionality through Kong Plugins
  • Creating custom plugins to meet specific government requirements

Scaling Kong for High-Volume Government Operations

  • Increasing nodes to handle trillions of API calls efficiently

Troubleshooting for Government Users

Summary and Conclusion for Government Applications

Requirements

  • An understanding of microservices, application programming interfaces (APIs), and related technologies for government.
  • Experience with Linux command line operations

Audience

  • Software Developers
  • System Administrators
  • DevOps Engineers
 14 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories