Skip to content
Kong Logo | Kong Docs Logo
search
  • We're Hiring!
  • Docs
    • Kong Gateway
    • Kong Konnect
    • Kong Mesh
    • Plugin Hub
    • decK
    • Kubernetes Ingress Controller
    • Insomnia
    • Kuma

    • Docs contribution guidelines
  • Plugin Hub
  • Support
  • Community
  • Kong Academy
Early Access

github-edit-pageEdit this page

report-issueReport an issue

enterprise-switcher-iconSwitch to OSS

On this page
  • 2.1.0
    • Changes
    • Upgrading
  • 2.0.2
    • Changes
  • 2.0.1
    • Changes
  • 2.0.0
    • Changes
    • Upgrading
    • Breaking changes and deprecations
  • 1.9.3
    • Changes
  • 1.9.2
    • Changes
  • 1.9.1
    • Changes
  • 1.9.0
    • Changes
    • Upgrading
  • 1.8.5
    • Changes
  • 1.8.4
    • Changes
  • 1.8.3
    • Changes
  • 1.8.2
    • Changes
  • 1.8.1
    • Changes
  • 1.8.0
    • Changes
    • Upgrading
  • 1.7.6
    • Changes
  • 1.7.5
    • Changes
  • 1.7.4
    • Changes
  • 1.7.2
    • Changes
  • 1.7.1
  • 1.7.0
    • Changes
    • Upgrading
  • 1.6.4
    • Changes
  • 1.6.3
    • Changes
  • 1.6.1
  • 1.6.0
    • Changes
    • Upgrading
  • 1.5.1
    • Changes
    • Upgrading
  • 1.5.0
    • Changes
    • Upgrading
  • 1.4.1
    • Changes
    • Upgrading
  • 1.4.0
    • Changes
    • Upgrading
  • 1.3.4
  • 1.3.3
    • Changes
    • Upgrading
  • 1.3.2
    • Changes
    • Upgrading
  • 1.3.1
    • Changes
    • Upgrading
  • 1.3.0
    • Changes
    • Upgrading
  • 1.2.6
    • Changes
    • Upgrading
  • 1.2.5
    • Changes
    • Upgrading
  • 1.2.4
    • Changes
    • Upgrading
  • 1.2.3
    • Changes
    • Upgrading
  • 1.2.2
    • Changes
    • Upgrading
  • 1.2.1
    • Changes
    • Upgrading
  • 1.2.0
    • Changes
    • Upgrading
Kong Mesh
  • Home
  • Kong Mesh
  • Kong Mesh Changelog

Kong Mesh Changelog

2.1.0

Released on 2023/01/30

Built on top of Kuma 2.1.0

Changes

  • Added the MeshOPA policy. This policy is compliant with new targetRef standard. This policy will replace OPA Policy.
  • RBAC now supports to and from selectors in targetRef based policies
  • Added the ability to specify list of users that have admin rights by default.
  • Limited the number of OPA policies you can configure to one because of OPA limitations.

Upgrading

  • KMESH_ACCESS_RBAC_DEFAULT_ADMIN_ROLE_USERS only works on fresh installations. If you want to add an admin user to an installation that is already running, you must do it manually.

2.0.2

Released on 2023/01/13

Built on top of Kuma 2.0.2

Changes

  • Upgraded the Helm library version.
  • Upgraded the Go version to 1.18.9.
  • Fixed data caching. This bug might have caused certificates to regenerate.
  • Upgraded CoreDNS.

2.0.1

Release on 2022/12/05

Built on top of Kuma 2.0.1

Changes

  • Fixed potential logging of secrets in kuma-cp.
  • Fixed KDS instability.
  • Fixed unnecessary CDS updates.
  • Fixed a bug where the OPA Agent stops returning valid decisions after KM CP crashes.

2.0.0

Release on 2022/11/04

Built on top of Kuma 2.0.0

Changes

Amazon ECS

You can now configure the sidecar to authenticate using the IAM role of the ECS task it’s running as instead of using a data plane token. The control plane interprets the tags on the role similar to how it interprets the data plane token. This simplifies the deployment and management of Kong Mesh on ECS.

For more information, see Kong Mesh on Amazon ECS.

Upgrading

The Zone Token that was previously used for authenticating Zone Egress can now be used to authenticate the zone control plane. If you use zone control plane authentication, regenerate token for zone control plane using kumactl generate zone-token --scope=cp --zone=<zone>. For now, you can still use the old Control Plane Token and Zone Token with scope cp. However, Control Plane Token is now deprecated and will be removed in the future.

Breaking changes and deprecations

Deprecated the Control Plane Token. It will be removed in a future release. You can use the Zone Token instead to authenticate the zone control plane.

1.9.3

Released on 2023/01/13

Built on top of Kuma 1.8.3

Changes

  • Upgraded the Helm library version.
  • Upgraded the Go version to 1.18.9.
  • Fixed data caching. This bug might have caused certificates to regenerate.
  • Upgraded CoreDNS.

1.9.2

Released on 2022/12/06

Built on top of Kuma 1.8.2

Changes

  • Fixed potential logging of secrets in kuma-cp.
  • Fixed KDS instability.
  • Fixed unnecessary CDS updates.
  • Fixed a bug where the OPA Agent stops returning valid decisions after KM CP crashes.

1.9.1

Release on 2022/10/10

Built on top of Kuma 1.8.1

Changes

  • Gateway: Added support for retryOn in retry policies.
  • Added support for evicted Pods.
  • Added support for wildcard tag value match in RBAC.
  • Prevents a potential data race by creating a deep copy of tags when generating outbounds.

1.9.0

Release on 2022/08/23

Built on top of Kuma 1.8.0

Changes

  • Add “replace” function to CommonName template in CAs which support it (ACMPCA, cert-manager, Vault).
  • Fix ZoneControlPlane token generation by setting access type to RBAC in the generated default.
  • Improve RBAC logic by checking both old and new spec on updates.
  • Add configuration option for RBAC validation result logging.
  • Add cert-manager.io CA manager.

Upgrading

  • You need to add VIEW_CLUSTERS and VIEW_STATS to admin AccessRole to be able to see stats and clusters in the GUI.

1.8.5

Released on 2023/01/13

Built on top of Kuma 1.7.4

Changes

  • Upgraded the Helm library version.
  • Upgraded the Go version to 1.18.9.
  • Fixed data caching. This bug might have caused certificates to regenerate.
  • Upgraded CoreDNS.

1.8.4

Released on 2022/12/06

Built on top of Kuma 1.7.3

Changes

  • Fixed potential logging of secrets in kuma-cp.
  • Fixed KDS instability.
  • Fixed unnecessary CDS updates.
  • Fixed a bug where the OPA Agent stops returning valid decisions after KM CP crashes.

1.8.3

Release on 2022/10/10

Built on top of Kuma 1.7.2

Changes

  • Added support for evicted Pods.
  • Prevents a potential data race by creating a deep copy of tags when generating outbounds.

1.8.2

Released on 2022/08/08

Built on top of Kuma 1.7.1

Changes

  • Fix RBAC: all tags specified in when section are required in policies.
  • Fix RBAC: * value in tag specified in when section means that the tag is required, but can have any value.

1.8.1

Released on 2022/07/19

Built on top of Kuma 1.7.1

Changes

  • Check both old and new spec on Update

1.8.0

Released on 2022/06/13

Built on top of Kuma 1.7.0

Changes

New Features:

  • Support for arm64
  • Graceful shutdown of OPA
  • Role-based AWS authentication for Vault
  • Added a Vault AWS authentication option to set the server ID header

Dependency upgrades:

  • Bump github.com/aws/aws-sdk-go from 1.40.56 to 1.44.21
  • Bump github.com/hashicorp/go-retryablehttp from 0.6.6 to 0.7.1
  • Bump github.com/open-policy-agent/opa from 0.38.1 to 0.40.0
  • Bump github.com/open-policy-agent/opa-envoy-plugin from 0.38.1-envoy-3 to 0.40.0-envoy
  • Bump k8s.io/api from 0.23.6 to 0.24.1
  • Bump k8s.io/apimachinery from 0.23.6 to 0.24.1
  • Bump sigs.k8s.io/controller-runtime from 0.11.2 to 0.12.1

Upgrading

kubectl

  • The commands kumactl install metrics, kumactl install tracing, and kumactl install logging are deprecated. Please use kumactl install observability instead.

Control plane

  • The kuma-cp no longer comes with a built-in DNS server. Use the DNS server embedded in the dataplane proxy (enabled by default).

1.7.6

Released on 2023/01/13

Built on top of Kuma 1.6.4

Changes

  • Upgraded the Helm library version.
  • Upgraded the Go version to 1.18.9.
  • Fixed data caching. This bug might have caused certificates to regenerate.
  • Upgraded CoreDNS.

1.7.5

Released on 2022/12/06

Built on top of Kuma 1.6.3

Changes

  • Fixed potential logging of secrets in kuma-cp.
  • Fixed KDS instability.
  • Fixed unnecessary CDS updates.
  • Fixed a bug where the OPA Agent stops returning valid decisions after KM CP crashes.

1.7.4

Release on 2022/10/10

Built on top of Kuma 1.6.2

Changes

  • Added support for evicted Pods.
  • Prevents a potential data race by creating a deep copy of tags when generating outbounds.

1.7.2

Released on 2022/07/19

Built on top of Kuma 1.6.1

Changes

  • Check both old and new spec on Update

1.7.1

Released on 2022/06/13

Built on top of Kuma 1.6.1

  • Allow graceful shutdown of OPA

1.7.0

Released on 2022/04/12

Built on top of Kuma 1.6.0

Changes

New Features:

  • Add support for AWS Certificate Manager Private CA
  • Inspect API support for Open Policy Agent
  • Add license values to Mesh reports

Dependency upgrades:

  • Bump github.com/aws/aws-sdk-go from 1.40.56 to 1.43.29
  • Bump github.com/hashicorp/vault/api from 1.3.1 to 1.5.0
  • Bump github.com/open-policy-agent/opa from 0.37.1 to 0.38.1
  • Bump github.com/open-policy-agent/opa-envoy-plugin from 0.37.1-envoy to 0.38.1-envoy-3

Upgrading

Helm

controlPlane.resources is now on object instead of a string. Any existing value should be adapted accordingly.

Zone egress and ExternalService

When an ExternalService has the tag kuma.io/zone and ZoneEgress is enabled then the request flow will be different after upgrading Kuma to the newest version. Previously, the request to the ExternalService goes through the ZoneEgress in the current zone.

The flow in the newest version is different, and when ExternalService is defined in a different zone then the request will go through local ZoneEgress to ZoneIngress in zone where ExternalService is defined and leave the cluster through ZoneEgress in this zone.

To keep the previous behavior, remove the kuma.io/zone tag from the ExternalService definition.

Zone egress

Previously, when mTLS was configured and ZoneEgress was deployed, requests were automatically routed through ZoneEgress.

You must now explicitly set that traffic should be routed through ZoneEgress by setting routing.zoneEgress: true in the Mesh configuration. By default, this is set to false.

type: Mesh
name: default
mtls: # mTLS is required for zoneEgress
[...]
routing:
  zoneEgress: true

The new approach changes the flow of requests to external services. Previously when there was no instance of ZoneEgress traffic was routed directly to the destination, now it won’t reach the destination.

Gateway (experimental)

Previously, a MeshGatewayInstance generated a Deployment and Service whose names ended with a unique suffix. With this release, those objects will have the same name as the MeshGatewayInstance.

Inspect API

In connection with the changes around MeshGateway and MeshGatewayRoute, the output schema of the <policy-type>/<policy>/dataplanes has changed. Every policy can now affect both normal Dataplanes and Dataplanes configured as builtin gateways. The configuration for the latter type is done via MeshGateway resources.

Every item in the items array now has a kind property of either:

SidecarDataplane: a normal Dataplane with outbounds, inbounds, etc. MeshGatewayDataplane: a MeshGateway-configured Dataplane with a new structure representing the MeshGateway it serves. Some examples can be found in the Inspect API docs.

1.6.4

Released on 2023/01/13

Built on top of Kuma 1.5.4

Changes

  • Upgraded the Helm library version.
  • Upgraded the Go version to 1.18.9.
  • Fixed data caching. This bug might have caused certificates to regenerate.
  • Upgraded CoreDNS.

1.6.3

Released on 2022/12/06

Built on top of Kuma 1.5.3

Changes

  • Fixed potential logging of secrets in kuma-cp.
  • Fixed KDS instability.
  • Fixed unnecessary CDS updates.

1.6.1

Released on 2022/04/09

Built on top of Kuma 1.5.1

  • Remove the old JWT library
  • Make the Open Policy Agent timeout configurable

Dependency upgrades:

  • Bump github.com/open-policy-agent/opa from 0.37.2 to 0.38.1

1.6.0

Released on 2022/02/24

Changes

Built on top of Kuma 1.5.0

  • UBI images support.
  • ECS EC2 and Fargate first party support.
  • Update OPA agent to v0.37.2.

Upgrading

  • The kuma.metrics.dataplane.enabled and kuma.metrics.zone.enabled configurations have been removed. Kuma always generates the corresponding metrics.
  • Removed support for the old Ingress (Dataplane#networking.ingress), which was used before Kong Mesh 1.3. If you are still using it, migrate to ZoneIngress first (see Kuma Upgrade to 1.2.0 section).

Kubernetes

  • Migrate your kuma.io/sidecar-injection annotations to labels. The new version still supports annotations, but to guarantee that applications can only start with a sidecar, you must use a label instead of an annotation. Configuration parameter kuma.runtime.kubernetes.injector.sidecarContainer.adminPort and environment variable KUMA_RUNTIME_KUBERNETES_INJECTOR_SIDECAR_CONTAINER_ADMIN_PORT have been deprecated in favor of kuma.bootstrapServer.params.adminPort and KUMA_BOOTSTRAP_SERVER_PARAMS_ADMIN_PORT.

Universal

  • You can’t use 0.0.0.0 or :: in networking.address. Use loopback instead.
  • The Kuma DP flag --admin-port and environment variable KUMA_DATAPLANE_ADMIN_PORT have been deprecated. The admin port should be specified in Dataplane or ZoneIngress resources.

1.5.1

Released on 2021/12/16

Changes

Built on top of Kuma 1.4.1

  • Default role-based access control (RBAC) for zone control planes is now restricted to the admin role.
  • Performance continues to be significantly improved.
  • Authentication tokens are now more secure.

Upgrading

Before you upgrade from 1.5.0 make sure to review your RBAC configuration for zone control planes. In 1.5.1, RBAC for zone control planes is restricted by default. For information on how to secure access to resources, see the RBAC documentation.

Upgrades from 1.5.0 are otherwise seamless and no further steps are needed.

1.5.0

Released on 2021/11/22

Changes

Built on top of Kuma 1.4.0

  • Role-based Access Control (RBAC) is now available.
  • Support for Windows installation on Universal (VMs) is now available.
  • Renewable tokens in Vault are now supported.

Upgrading

Starting with this version, the default API server authentication method is user tokens. To continue using client certificates (the previous default method), you’ll need to explicitly set the authentication method to client certificates. This can be done by setting the KUMA_API_SERVER_AUTHN_TYPE variable to "clientCerts".

See the Kuma docs on Configuration - Control plane for how to set this variable.

1.4.1

Released on 2021/10/06

Changes

Built on top of Kuma 1.3.1

  • Common Name (CN) support for Vault certificate storage is now available.
  • You can now disable zones as needed.
  • The number of PostgreSQL connections is now limited to 50 by default. The default value was previously unlimited; you can still configure the limit if needed.
  • You can now select a specific zone in the Kuma Service dashboard and in the Service to Service dashboard.

Upgrading

Upgrades from 1.4.0 are seamless and no additional steps are needed.

1.4.0

Released on 2021/08/26

Changes

Built on top of Kuma 1.3.0

  • You can now configure CA rotation in Kong Mesh.
  • A service map topology view is available that provides visualization of service traffic dependencies.
  • Support for mutual TLS in permissive mode is available, to support migrating applications into the service mesh.
  • You can now customize hostnames and ports for data plane proxies with a new virtual outbound policy.
  • You can more easily specify intermediate CAs with mTLS.

Upgrading

Upgrades from 1.3.0 are seamless, but note the following:

  • Outbounds generated internally are no longer listed in dataplane.network.outbound[]. On Kubernetes, they are automatically removed. On Universal, to remove them you must recreate your Dataplane resources with kumactl apply. Or, if the proxy lifecycle is managed by Kuma, restart the services.
  • You may notice some proxies or zones indicated as Offline in the GUI when you upgrade the control plane. This can happen if upgrading all instances of the control plane takes more than five (5) minutes. It’s temporary, and occurs because of a new mechanism for better tracking proxy and zone status. A heartbeat periodically increments the generation counter for Insights. The offline status should disappear after all control plane instances are upgraded to 1.4.0.

1.3.4

Released on 2021/09/15

Built on top of Kuma 1.2.3

  • Moved to a Kuma fork of go-control-plane that fixes a Goroutine leak

1.3.3

Released on 2021/07/29

Changes

Built on top of Kuma 1.2.3

  • kumactl now always warns when the client and server versions cannot be confirmed to match.
  • The data plane proxy type is now checked for a valid value (one of ingress or dataplane).
  • Improvements to the control plane.

Upgrading

Upgrades from 1.3.0 are seamless and no additional steps are needed.

1.3.2

Released on 2021/07/16

Changes

Built on top of Kuma 1.2.2

  • Datadog is now available as a traffic tracing option.
  • Message limit for gRPC stream is increased to better support Kuma discovery service (KDS)
  • Improved leader election during unexpected failures.
  • Improved SDS and XDS on rapid DP restarts.
  • Fixed HDS on the dataplane server when bootstrapping an ingress.

Upgrading

Upgrades from 1.3.0 are seamless and no additional steps are needed.

1.3.1

Released on 2021/06/30

Changes

Built on top of Kuma 1.2.1

  • (Kuma) The data plane proxy now provides an advertised address to the control plane for communication in cases where the address is not directly reachable.
  • (Kuma) An SNI header is now added when TLS is enabled, to permit communication with external services that require it.
  • (Kong Mesh only) New parameters pki and role are available for Vault.
  • (Kong Mesh only) The CNI config name is now always prefixed with kuma-cni.
  • (Kong Mesh only) TTL is no longer validated for Vault.

Upgrading

Upgrades from 1.3.0 are seamless and no additional steps are needed.

1.3.0

Released on 2021/06/17

Changes

Built on top of Kuma 1.2.0

  • New L7 Traffic Routing policy to route and modify HTTP traffic per path, method, header, or any other combination, with support for regex. Traffic can be modified before reaching the final destination.
  • New Rate-Limit policy to protect services from aggressive traffic. This policy can protect from downtime and improve the overall reliability of your applications.
  • The “Remote” control plane is renamed to “Zone” control plane. This means the “Ingress” resource is renamed “ZoneIngress”. Thanks to community users for providing the feedback that drove this effort.
  • Traffic Permissions now work with external services.
  • Improved performance of our DNS resolution.
  • More improvements, including a fix for GCP/GKE’s erratic IPv6 support.
  • Updated to Envoy 1.18.3.

Upgrading

For a Universal deployment, see the Kuma upgrade instructions.

For Kubernetes, you should be aware of the following changes:

kumactl on Kubernetes

  • Changes in arguments/flags for kumactl install control-plane:

    • --mode now accepts the values standalone, zone, and global. zone replaces remote, which is still available in earlier versions.

    • --tls-kds-remote-client-secret flag is renamed to --tls-kds-zone-client-secret.

  • Service kong-mesh-global-remote-sync is changed to kong-mesh-global-zone-sync. After you upgrade the global control plane, you must manually remove the old service. For example:

     kubectl delete -n kong-mesh-system service/kong-mesh-global-remote-sync
    

    The IP address or hostname that provides the KDS address when you install the control planes can change. Make sure that you update the address when you upgrade the remote control planes to the latest version.

Helm

Changes in values in Kong Mesh’s Helm chart:

  • kuma.controlPlane.mode now accepts the values standalone, zone, and global. zone replaces remote, which is still available in earlier versions.
  • kuma.controlPlane.globalRemoteSyncService is renamed to kuma.controlPlane.globalZoneSyncService.
  • kuma.controlPlane.tls.kdsRemoteClient is renamed to kuma.controlPlane.tls.kdsZoneClient.

1.2.6

Released on 2021/05/13

Changes

Built on top of Kuma 1.1.6.

  • Intermediate Certificate Authorities (CAs) are now supported with Vault integration.
  • You can now specify any and all tags in a Traffic Permission policy for Vault integration.
  • You can now specify TCP and HTTP health checks at the same time in the same policy. The health check policy also now includes a reuse_connection option.
  • The --gateway flag is now available in the CLI.
  • You can now install an ingress controller with the CLI. Kong Gateway is the first supported ingress controller.
  • You can now install the Kuma demo application with the CLI.

Upgrading

Upgrades from 1.2.x are seamless and no additional steps are needed. Note specific configuration requirements for taking advantage of built-in DNS.

1.2.5

Released on 2021/05/05

Changes

Built on top of Kuma 1.1.5.

  • ⚠️ All installation scripts are updated to a new location because Bintray is shutting down. If you’ve written automation scripts that refer to the Bintray location, you need to update your scripts to point to the new location.
  • Transparent proxying is improved.
  • The GUI is improved.
  • The locality is now always set in a multi-zone deployment.

Upgrading

Upgrades from 1.2.x are seamless and no additional steps are needed. Note specific configuration requirements for taking advantage of built-in DNS.

1.2.4

Released on 2021/04/19

Changes

Built on top of Kuma 1.1.4.

Includes important bug fixes to version 1.1.3 of Kuma, plus improvements to the web UI.

Upgrading

Upgrades from 1.2.x are seamless and no additional steps are needed. Note specific configuration requirements for taking advantage of built-in DNS. See also new documentation for the external service policy.

1.2.3

Released on 2021/04/16

Changes

Built on top of Kuma 1.1.3. Notably:

  • Built-in DNS provides support for specifying external services by original hostname and port

Upgrading

Upgrades from 1.2.x are seamless and no additional steps are needed. Note specific configuration requirements for taking advantage of built-in DNS. See also new documentation for the external service policy.

1.2.2

Released on 2021/04/09

Changes

Built on top of Kuma 1.1.2 with fixes and improvements. Features include:

  • 19 new observability charts and golden metrics.
  • IPv6 support across the service mesh.
  • New threshold configuration in the Circuit Breaker policy.
  • Performance improvements, especially with external services.
  • Stability improvements to kuma-cp and DNS resolution.

Upgrading

Upgrades from 1.2.0 are seamless and no additional steps are needed.

1.2.1

Released on 2021/03/09

Changes

  • Fix to include the OPA CRD in the deployment
  • Build on top of Kuma 1.1.1 with fixes and improvements

Upgrading

Upgrades from 1.2.0 are seamless and no additional steps are needed. When using Helm to upgrade from 1.1.x to 1.2.1, the step to explicitly apply the OPA CRD is not needed anymore.

1.2.0

Released on 2021/03/09

Changes

  • Added Open Policy Agent integration
  • Improved authentication support for control planes in multi-zone deployments, with the Kuma Discovery Protocol (KDS)
  • Added FIPS support to the data plane proxy sidecar
  • Added XDSv3 for control plane to data plane proxy communication
  • Build on top of Kuma 1.1.0 with fixes and improvements

Upgrading

Kubernetes with kumactl

If you previously installed Kong Mesh with kumactl install control-plane --license-path=... | kubectl apply -f -, you must first uninstall the previous version and then install the new version. All policies are removed when you uninstall, so make sure to back up all related CRDs before you start. Then:

  1. Install Kong Mesh for Kubernetes using kumactl install control-plane ... with any additional command-line arguments you require.

  2. Delete the old Deployment, Service, Webhooks, and Validation hooks:

    kubectl delete -n kong-mesh-system deploy/kuma-control-plane
    kubectl delete -n kong-mesh-system service/kuma-control-plane
    kubectl delete mutatingwebhookconfiguration/kuma-admission-mutating-webhook-configuration
    kubectl delete validatingwebhookconfiguration/kuma-validating-webhook-configuration
    
  3. Restart all the pods in the meshes to make sure the new sidecars are deployed and connected to the newly deployed control plane.

Kubernetes with Helm

The supplied Helm Chart takes care of upgrading the control plane. Because of the way Helm handles CRDs, however, you must apply the new OPA CRD:

  1. Install the new CRD

    kubectl apply -f https://docs.konghq.com/mesh/1.2.x/patches/opa-policy.yaml
    
  2. Upgrade Kong Mesh with Helm:

    helm repo update
    helm --namespace kong-mesh-system upgrade my-kong-mesh kong-mesh/kong-mesh
    
  3. Restart all the pods in the meshes to make sure the new sidecars are deployed and connected to the newly deployed control plane.

Thank you for your feedback.
Was this page useful?
  • Kong
    THE CLOUD CONNECTIVITY COMPANY

    Kong powers reliable digital connections across APIs, hybrid and multi-cloud environments.

    • Company
    • Customers
    • Events
    • Investors
    • Careers Hiring!
    • Partners
    • Press
    • Contact
  • Products
    • Kong Konnect
    • Kong Gateway
    • Kong Mesh
    • Get Started
    • Pricing
  • Resources
    • eBooks
    • Webinars
    • Briefs
    • Blog
    • API Gateway
    • Microservices
  • Open Source
    • Install Kong Gateway
    • Kong Community
    • Kubernetes Ingress
    • Kuma
    • Insomnia
  • Solutions
    • Decentralize
    • Secure & Govern
    • Create a Dev Platform
    • API Gateway
    • Kubernetes
    • Service Mesh
Star
  • Terms•Privacy
© Kong Inc. 2023