Course Outline
Introduction
- The necessity for effective API management in government operations
Setting up Kong for Government
- Selecting an appropriate installation method: bare metal, cloud, containers, or Kubernetes
- Utilizing curl commands for configuration
- Installing and initializing a Kong cluster for government use
Overview of Kong Features and Architecture for Government
- Kong's lightweight proxy capabilities
- The role of Kong plugins in enhancing functionality
Adding Services and Routes for Government Applications
- Using the Admin API to manage services and routes
- Implementing host matching for enhanced service delivery
Consuming Services for Government Operations
- Configuring ports, hosts, and DNS settings for optimal performance
Responding to Requests in Government Systems
- Reverse proxying incoming requests to ensure secure and efficient service access
Controlling Traffic for Government Services
- Managing, throttling, and restricting traffic to maintain system integrity
- Load balancing strategies: dynamic ring-balancer versus DNS-based methods
Analyzing Traffic for Government Oversight
- Visualizing, inspecting, and monitoring traffic using tools like Prometheus
- Logging data transfers with solutions such as the ELK Stack
Transforming Data for Government Use
- Real-time transformation of requests and responses to meet specific government requirements
Securing API and Service Access for Government
- Implementing an authentication layer to protect sensitive services
Integrating Kong with Third-party Services for Government
- Invoking serverless functions via APIs to enhance service capabilities
Advanced Routing Mechanisms for Government Applications
- Implementing complex routing beyond simple host matching
Securing the Kong Admin API for Government Operations
- Configuring firewall rules to enhance security
- Using Kong as a proxy for the Admin API to add an additional layer of protection
Extending Kong for Government Needs
- Adding extra functionality through Kong Plugins
- Creating custom plugins to meet specific government requirements
Scaling Kong for High-Volume Government Operations
- Increasing nodes to handle trillions of API calls efficiently
Troubleshooting for Government Users
Summary and Conclusion for Government Applications
Requirements
- An understanding of microservices, application programming interfaces (APIs), and related technologies for government.
- Experience with Linux command line operations
Audience
- Software Developers
- System Administrators
- DevOps Engineers
Testimonials (2)
Practical hands on
MUHAMMAD BIN ARISHAH - 3F Resources Sdn Bhd
Course - Kong API Gateway
Very precise and very helpful guidance