Kong API Gateway培训
Introduction
The need for API management
Setting up Kong
Deciding on an installation type: bare metal, cloud, containers and Kubernetes
Using curl commands
Installing and starting a Kong cluster
Overview of Kong Features and Architecture
Kong's lightweight proxy
Kong plugins
Adding Services and Routes
Using the Admin API
Implementing host matching
Consuming Services
Configuring ports, hosts, and DNS
Responding to Requests
Reverse proxying incoming requests
Controlling Traffic
Managing, throttling, and restricting traffic
Load balancing requests: dynamic ring-balancer vs DNS-based
Analyzing Traffic
Visualizing, inspecting, and monitoring traffic (e.g., using Prometheus)
Logging data transfers (e.g., using ELK Stack)
Transforming Data
Transforming requests and responses in real-time
Securing API and Service Access
Protecting services through an authentication layer
Integrating Kong with Third-party Services
Calling serverless functions via APIs
Advanced Routing Mechanisms
Beyond simple host matching
Securing the Kong Admin API
Configuring firewall rules
Using Kong as a proxy for the Admin API
Extending Kong
Adding extra functionality through Kong Plugins
Creating Your Own Plugin
Scaling Kong
Increasing nodes to process trillions of API calls
Troubleshooting
Summary and Conclusion