api

7 Microservice Best Practices for Developers

September 27, 2021

Unless you’ve been developing software in a cave, you’ve probably heard people sing the praises of microservices. They’re agile, simple, and an overall improvement on the monolith and service-oriented architecture days. But of course, with all the benefits of microservices comes a new set of challenges.

Continue reading

4 Key Observability Metrics for Distributed Applications

July 26, 2021

A common architectural design pattern these days is to break up an application monolith into smaller microservices. Each microservice is then responsible for a specific aspect or feature of your app. For example, one microservice might be responsible for serving external API requests, while another might handle data fetching for your frontend.

Continue reading

5 Best Practices for Designing RESTful APIs

April 13, 2020

RESTful APIs are everywhere, powering more of the modern world than any other API architecture. REST accounts for up to 80% of API saccording to this study by ProgrammableWeb. How those APIs are built and structured can make or break a company in today’s ultra-competitive world. Poorly-designed APIs can be difficult to use, can fail when they are needed most, and are valuable targets for hackers looking for sensitive data. On the other hand, a well-designed API that utilizes best practices makes development a breeze, attracts new customers, and creates confidence among users that can boost retention rates.

Continue reading

How to Use Computer Vision to Automatically Filter Images

March 29, 2019

While image recognition is a seemingly simple task for humans to do, it’s actually a very complicated process. Computers can already “see” images in the sense that they store the data of every tiny pixel to make up the full picture. However, recognizing patterns in this data and creating a quickly searchable memory of common patterns is extremely difficult. Fortunately, Google Cloud provides a very simple API to detect the content of images using computer vision.

Continue reading

Common API Vulnerabilities and How to Secure Them

January 7, 2019

Application programming interfaces (APIs) have become a critical part of almost every business. APIs are responsible for transferring information between systems within a company or to external companies. For example, when you log in to a website like Google or Facebook, an API processes your login credentials to verify they are correct. However, given the sensitive data being transferred through APIs, it’s critical to secure them. Increasingly sophisticated attacks occur every year, requiring better security controls and monitoring.

Continue reading

Announcing the Kubernetes Ingress Controller for Kong

May 8, 2018

Today we are excited to announce the Kubernetes Ingress Controller for Kong. Container orchestration is rapidly changing to meet the needs of software infrastructure that demands more reliability, flexibility, and efficiency than ever. At the forefront of these tools is Kubernetes.

Continue reading

How to Design a Scalable Rate Limiting Algorithm

December 19, 2017

Rate limiting protects your APIs from overuse by limiting how often each user can call the API. This protects them from inadvertent or malicious overuse. Without rate limiting, each user may request as often as they like, which can lead to “spikes” of requests that starve other consumers. After rate limiting is enabled, they are limited to a fixed number of requests per second.

Continue reading

Secure and Manage AWS Lambda Endpoints with Kong

August 29, 2017

In this quickstart tutorial, we will walk you through the steps to setup Kong with AWS Lambda and build a simple “Hello World” app as a demonstration. Kong can help you secure and manage your AWS Lambda services. It includes support for popular authentication services, access control lists, rate limiting, and more. It gives you the tools publish APIs that you can safely share with your customers.

Continue reading