Course Outline
Introduction
- The need for API management in government operations
Setting up Kong for Government
- Deciding on an installation type: bare metal, cloud, containers, and Kubernetes
- Using curl commands for initial setup
- Installing and starting a Kong cluster to support government workflows
Overview of Kong Features and Architecture for Government
- Kong's lightweight proxy designed for high-performance environments
- Kong plugins to enhance functionality tailored to public sector needs
Adding Services and Routes for Government
- Using the Admin API to manage government services and routes
- Implementing host matching for secure and efficient routing of government requests
Consuming Services for Government
- Configuring ports, hosts, and DNS settings to ensure seamless integration with government systems
Responding to Requests for Government
- Reverse proxying incoming requests to improve security and performance in government networks
Controlling Traffic for Government
- Managing, throttling, and restricting traffic to ensure compliance with public sector policies
- Load balancing requests using dynamic ring-balancer and DNS-based methods for optimal resource utilization
Analyzing Traffic for Government
- Visualizing, inspecting, and monitoring traffic using tools like Prometheus to enhance governance and accountability
- Logging data transfers with solutions such as the ELK Stack to ensure transparency and auditability
Transforming Data for Government
- Transforming requests and responses in real-time to meet specific government requirements
Securing API and Service Access for Government
- Protecting services through an authentication layer to ensure secure access for authorized users
Integrating Kong with Third-party Services for Government
- Calling serverless functions via APIs to support innovative government solutions
Advanced Routing Mechanisms for Government
- Beyond simple host matching: implementing complex routing rules to meet diverse government needs
Securing the Kong Admin API for Government
- Configuring firewall rules to enhance security for government operations
- Using Kong as a proxy for the Admin API to provide an additional layer of protection
Extending Kong for Government
- Adding extra functionality through Kong Plugins to support specialized government tasks
- Creating Your Own Plugin to address unique government requirements
Scaling Kong for Government
- Increasing nodes to process trillions of API calls to meet the demands of large-scale government projects
Troubleshooting for Government
Summary and Conclusion for Government
Requirements
- An understanding of microservices, APIs, and other related technologies
- Experience with the Linux command line
Audience for government
- Developers
- Administrators
- DevOps engineers
Testimonials (2)
Practical hands on
MUHAMMAD BIN ARISHAH - 3F Resources Sdn Bhd
Course - Kong API Gateway
Very precise and very helpful guidance