The blazingly fast open source microservices API gateway.
The next-generation API platform built on top of Kong.
Kong Enterprise innovation delivered at cloud speed.
End-to-end control of information exchange for hybrid and multi-cloud organizations.
Elegant visual interface for monitoring and managing Kong Enterprise.
Single source of truth for a unified developer experience.
Granular analytics to understand the health of Kong Enterprise.
Intelligent automation to streamline service development and management.
Advanced traffic anomaly detection to identify issues and threats.
Take control of your microservices traffic with the world's most popular API gateway.
Own your Kubernetes cluster by extending Kong functionality as an ingress controller.
Inject Kong as a sidecar for your services to go from mess to mesh.
Get started with Kong now.
Use the 5-minute quickstart and installation guide to deploy Kong now.
Use the quickstart and reference materials to launch Kong Enterprise today.
Learn how to implement Vitals and optimize it for your deployment.
Learn how to create and manage your Kong Dev Portal.
List your extension here!
Add Basic Authentication to your Services
Add HMAC Authentication to your Services
Kong JWT Signer
Verify and (re-)sign one or two tokens in a request
Verify and authenticate JSON Web Tokens
Add key authentication to your Services
LDAP Authentication Advanced
Secure Kong clusters, routes and services with username and password protection
Integrate Kong with a LDAP server
OAuth 2.0 Introspection
Integrate Kong with a third-party OAuth 2.0 Authorization Server
OAuth 2.0 Authentication
Add OAuth 2.0 authentication to your Services
Integrate Kong with a third-party OpenID Connect 1.0 provider
Integrate Okta's API Access Management (OAuth as a Service) with Kong API Gateway.
PASETO (Platform-Agnostic Security Tokens)
Upstream HTTP Basic Authentication
Add HTTP Basic Authentication header to upstream service request
Detect and block bots or custom clients
Allow developers to make requests from the browser
Whitelist or blacklist IPs that can make requests to your Services
Cleafy plugin for Kong
Integrate Kong API Gateway with Cleafy threat detection & protection for API-based apps
Kong Spec Expose
Expose OAS/Swagger/etc. specifications of auth protected APIs proxied by Kong
Kong Upstream JWT
Add a signed JWT into the header of proxied requests
Secure your web applications and APIs without impacting your business
Wallarm is AI-Powered Security Platform for protecting microservices and APIs
Control which consumers can access Services
Slowly roll out software changes to a subset of users
Forward Proxy Advanced
Allows Kong to connect to intermediary transparent HTTP proxies
Cache and serve commonly requested responses in Kong
Rate Limiting Advanced
Upgrades Kong Rate Limiting with more flexibility and higher performance
Rate-limit how many HTTP requests a developer can make
Request Size Limiting
Block requests with bodies greater than a specified size
Terminates all requests with a specific response
Response Rate Limiting
Rate-limiting based on a custom response header value
Route By Header
Route request based on request headers
Kong Response Size Limiting
Block responses with bodies greater than a specified size
Kong Service Virtualization
Mock virtual API request and response pairs through Kong Gateway
Invoke and manage AWS Lambda functions from Kong
Invoke and manage Azure functions from Kong
Invoke and manage OpenWhisk actions from Kong
Dynamically run Lua code from Kong during the access phase
Visualize metrics on Datadog
Expose metrics related to Kong and proxied upstream services in Prometheus exposition format
Propagate Zipkin spans and report space to a Zipkin server
API Fortress HTTP Log
Record mock responses with API Fortress.
Discover, Monitor, and Secure your APIs at object/data level.
Moesif API Insights
AI-powered analytics and monitoring for APIs
Monitor and analyze Kong in SignalFx
Correlate requests and responses using a unique ID
Request Transformer Advanced
Use powerful regular expressions, variables and templates to transform API requests
Modify the request before hitting the upstream server
Modify the upstream response before returning it to the client
Kong middleware to transform requests / responses, using pre-configured templates.
Kong middleware to completely rewrite the URL of a route.
Append request and response data to a log file on disk
Send request and response logs to an HTTP server
Send request and response logs to Loggly
Send metrics to StatsD with more flexible options
Send request and response logs to StatsD
Send request and response logs to Syslog
Send request and response logs to a TCP server
Send request and response logs to a UDP server
Kong Splunk Log
Log API transactions to Splunk using the Splunk HTTP collector
Kong on Microsoft Azure Certified
The Bitnami Kong Stack provides a one-click install solution for Kong
Kong Heroku app
Deploy Kong clusters to Heroku Common Runtime or Private Spaces
A Desired State Configuration tool for Kong.
Deploy Kong on Microsoft Azure
Microsoft Azure Container Instances
Deploy Kong on Microsoft Azure Container Instances
Kong on AWS with Terraform
Terraform module to provision Kong and Kong Enterprise clusters on Amazon Web Services