Own your Kong experience to customize your API and microservices workflows.
Deliver performance needed for microservices, service mesh, and cloud native deployments.
Unleash the full power of Kong with a robust ecosystem of plugins.
Monitor and manage all your services with a consumer-grade interface.
Organize developers and assign permissions to improve efficiency and compliance.
Empower your developers with the Kong Studio Integrated Development Environment.
Accelerate innovation across your organization with the Kong Developer Portal.
Automatically standardize documentation and create a visual map of your services.
Autonomously identify service issues with machine learning-powered anomaly detection.
The only fully native Kubernetes Ingress Controller for enhanced API management.
Instantly implement policies built for global scale with Kong Enterprise Plugins.
Monitor your Kong Enterprise health and microservice API transactions traversing Kong.
Take control of your microservices traffic with the world’s most popular API gateway.
Own your Kubernetes cluster by extending Kong functionality as an ingress controller.
Inject Kong as a sidecar for your services to go from mess to mesh.
List your extension here!
Add Basic Authentication to your Services
Add HMAC Authentication to your Services
Kong JWT Signer
Verify and (re-)sign one or two tokens in a request
Verify and authenticate JSON Web Tokens
Key Authentication - Encrypted
Add key authentication to your Services
LDAP Authentication Advanced
Secure Kong clusters, routes and services with username and password protection
Integrate Kong with a LDAP server
Mutual TLS Authentication
Secure routes and services with client certificate and mutual TLS authentication
OAuth 2.0 Introspection
Integrate Kong with a third-party OAuth 2.0 Authorization Server
OAuth 2.0 Authentication
Add OAuth 2.0 authentication to your Services
Integrate Kong with a third-party OpenID Connect 1.0 provider
Support sessions for Kong Authentication Plugins.
Add Vault authentication to your Services
Integrate Okta's API Access Management (OAuth as a Service) with Kong API Gateway.
PASETO (Platform-Agnostic Security Tokens)
Upstream HTTP Basic Authentication
Add HTTP Basic Authentication header to upstream service request
Let's Encrypt and ACMEv2 integration with Kong
Detect and block bots or custom clients
Allow developers to make requests from the browser
Whitelist or blacklist IPs that can make requests to your Services
Cleafy plugin for Kong
Integrate Kong API Gateway with Cleafy threat detection & protection for API-based apps
Kong Spec Expose
Expose OAS/Swagger/etc. specifications of auth protected APIs proxied by Kong
Kong Upstream JWT
Add a signed JWT into the header of proxied requests
Secure your web applications and APIs without impacting your business
Wallarm is AI-Powered Security Platform for protecting microservices and APIs
Control which consumers can access Services
Slowly roll out software changes to a subset of users
Forward Proxy Advanced
Allows Kong to connect to intermediary transparent HTTP proxies
GraphQL Proxy Caching Advanced
Cache and serve commonly requested responses in Kong
GraphQL Rate Limiting Advanced
Provide rate-limiting for GraphQL queries.
Proxy Caching Advanced
Rate Limiting Advanced
Upgrades Kong Rate Limiting with more flexibility and higher performance
Rate-limit how many HTTP requests a developer can make
Request Size Limiting
Block requests with bodies greater than a specified size
Terminates all requests with a specific response
Validates requests before they reach the upstream service
Response Rate Limiting
Rate-limiting based on a custom response header value
Route By Header
Route request based on request headers
Kong Response Size Limiting
Block responses with bodies greater than a specified size
Kong Service Virtualization
Mock virtual API request and response pairs through Kong Gateway
Invoke and manage AWS Lambda functions from Kong
Invoke and manage Azure functions from Kong
Invoke and manage OpenWhisk actions from Kong
Dynamically run Lua code from Kong during the access phase
Visualize metrics on Datadog
Expose metrics related to Kong and proxied upstream services in Prometheus exposition format
Propagate Zipkin spans and report space to a Zipkin server
API Fortress HTTP Log
Record mock responses with API Fortress.
Discover, Monitor, and Secure your APIs at object/data level.
Moesif API Insights
AI-powered analytics and monitoring for APIs
Monitor and analyze Kong in SignalFx
Correlate requests and responses using a unique ID
Transform a GraphQL upstream into a REST API
Customize Kong exit responses sent downstream
Transform requests into Kafka messages in a topic.
Request Transformer Advanced
Use powerful regular expressions, variables and templates to transform API requests
Modify the request before hitting the upstream server
Response Transformer Advanced
Modify the upstream response before returning it to the client
Route Transformer Advanced
Transform routing by changing the upstream server, port, or path.
Inspur Request Transformer
Kong plugin to transform diversiform requests
Inspur Response Transform
kong plugin to transform http response from json to xml
Kong middleware to transform requests / responses, using Lua script.
Kong middleware to transform requests / responses, using pre-configured templates.
Kong middleware to completely rewrite the URL of a route.
Append request and response data to a log file on disk
Send request and response logs to an HTTP server
Publish logs to a Kafka topic.
Send request and response logs to Loggly
Send metrics to StatsD with more flexible options
Send request and response logs to StatsD
Send request and response logs to Syslog
Send request and response logs to a TCP server
Send request and response logs to a UDP server
Kong Splunk Log
Log API transactions to Splunk using the Splunk HTTP collector
Kong on AWS with Terraform
Terraform module to provision Kong and Kong Enterprise clusters on Amazon Web Services.
Kong on Microsoft Azure Certified
The Bitnami Kong Stack provides a one-click install solution for Kong
Kong Heroku app
Deploy Kong clusters to Heroku Common Runtime or Private Spaces
A Desired State Configuration tool for Kong.
Backup, restore, diff and sync configuration to Kong
Deploy Kong on Microsoft Azure
Microsoft Azure Container Instances
Deploy Kong on Microsoft Azure Container Instances