All Mesh Documentation

  • Kong Mesh

    Learn how Kong Mesh works and how to configure it.

  • Mesh policies

    Bundled features for your service traffic and network configuration.

  • Mesh release notes

    Release notes for supported Kong Mesh versions.

  • Enterprise features

    Explore the features included with Kong Mesh Enterprise, including mTLS backends, RBAC, FIPS support, and signed container images.

  • Kong Mesh vulnerability patching process

    Understand how Kong addresses and patches vulnerabilities in Kong Mesh binaries, third-party dependencies, and Docker images.

  • Kong Mesh version support policy

    Understand the lifecycle and version support guidelines for Kong Mesh, including supported release timelines.

  • Kong Mesh quickstart

    Run an instance of Kong Mesh in Universal mode with one command.

  • Requirements

    Learn about the requirements for running Kong Mesh, including supported platforms, sizing guidelines, and Kubernetes setup.

  • Deploy Kong Mesh on Universal

    Guide to deploying Kong Mesh in Universal mode using Docker containers. Walks through installing the Control Plane, adding demo services, enabling mTLS, and configuring gateways.

  • Deploy Kong Mesh on Kubernetes

    Step-by-step guide to deploy Kong Mesh on Kubernetes using Helm and Minikube. Includes demo app setup, GUI exploration, and enabling mTLS for zero-trust security.

  • Kong Mesh on Amazon ECS

    Learn how to deploy Kong Mesh on Amazon ECS with IAM-based authentication and Universal mode support for Fargate and EC2.

  • Get started with Red Hat OpenShift and Kong Mesh

    This guide explains how to get started on Kong Mesh with Red Hat OpenShift, including installation, sidecar setup, and running a demo app.

  • Red Hat Universal Base Images

    Use Red Hat Universal Base Images (UBI) for running Kong Mesh components, available alongside standard Alpine-based images.

  • Mesh Manager

    Manage service meshes and Control Planes in Konnect.

  • About service meshes

    Overview of service mesh concepts and how Kong Mesh simplifies secure and reliable service-to-service communication using sidecar proxies and a Control Plane.

  • Concepts

    Understand the core concepts of Kong Mesh, including the Control Plane, Data Plane proxies, inbounds and outbounds, and resources like policies.

  • Architecture

    Understand the architecture of a Kong Mesh mesh, including control and Data Plane components, Kubernetes and Universal modes, and how services integrate into the mesh.

  • How ingress works

    Overview of how ingress (north/south) traffic flows through delegated and built-in gateways in Kong Mesh, with visuals and key differences.

  • Kong Mesh user interface (GUI)

    Visual overview of your meshes, Data Planes, and policies using the Kong Mesh web-based GUI.

  • Kong Mesh license

    Understand how licensing works in Kong Mesh, including limits, behaviors, and how to apply a license in both Kubernetes and Universal modes.

  • Deploy Kong Mesh in production with Helm

    Deploy a production-grade Kong Mesh installation on Kubernetes using Helm charts for single zone, multi-zone, or federated environments.

  • Policies

    Learn how policies in Kong Mesh configure Data Plane proxies by defining rules for traffic behavior, proxy targeting, and merging strategies. This reference covers `targetRef`, directional policies, producer/consumer scopes, and shadow mode simulation.

  • Mesh Health Check

    This policy will look for errors in the live traffic being exchanged between our data plane proxies. It will mark a data

  • Mesh Timeout

    Connection timeout specifies the amount of time DP will wait for a TCP connection to be established.

  • MeshAccessLog

    With the MeshAccessLog policy you can easily set up access logs on every data plane proxy in a mesh.

  • MeshCircuitBreaker

    This policy will look for errors in the live traffic being exchanged between our data plane proxies. It will mark a data

  • MeshFaultInjection

    With the MeshFaultInjection policy you can easily test your microservices against resiliency.

  • MeshGlobalRateLimit Policy

    This policy adds global rate limit support for Kong Mesh.

  • MeshHttpRoute

    The `MeshHTTPRoute` policy allows altering and redirecting HTTP requests depending on where the request is coming from and where it's going to.

  • MeshLoadBalancingStrategy

    This policy enables Kong Mesh to configure the load balancing strategy for traffic between services in the mesh.

  • MeshMetric

    Kong Mesh facilitates consistent traffic metrics across all data plane proxies in your mesh.

  • MeshOPA

    Kong Mesh integrates the Open Policy Agent (OPA) to provide access control for your Services.

  • meshpassthrough

    This policy enables Kong Mesh to configure traffic to external destinations that is allowed to pass outside the mesh.

  • MeshProxyPatch

    The `MeshProxyPatch` provides configuration options for low-level Envoy resources that Kong Mesh policies do not directly expose.

  • MeshRateLimit

    This policy enables per-instance service request limiting. Policy supports rate limiting of HTTP/HTTP2 requests and TCP connections.

  • MeshRetry

    This policy enables Kong Mesh to know how to behave if there are failed requests which could be retried.

  • MeshTCPRoute

    The MeshTCPRoute policy allows you to alter and redirect TCP requests depending on where the request is coming from and where it’s going to.

  • MeshTLS

    This policy enables Kong Mesh to configure TLS mode, ciphers and version. Backends and default mode values are taken from the Mesh object.

  • MeshTrace

    This policy enables publishing traces to a third party tracing solution.

  • MeshTrafficPermission

    The `MeshTrafficPermission` policy provides access control within Mesh.

  • ACM Private CA Policy

    Configure Kong Mesh to use Amazon Certificate Manager as a Certificate Authority for mTLS, including setup steps and authentication options.

  • Kubernetes cert-manager CA policy

    Use Kubernetes cert-manager as an mTLS backend for issuing Data Plane certificates in Kong Mesh

  • HashiCorp Vault CA

    Configure Kong Mesh to use HashiCorp Vault as a Certificate Authority for mTLS, including setup steps and authentication options.

  • Add a builtin gateway

    Deploy a built-in gateway in to expose internal mesh services to external traffic. This guide walks through setting up MeshGatewayInstance and MeshGateway resources, defining routes with MeshHTTPRoute, configuring permissions, and securing the gateway with TLS.

  • Configure a built-in gateway

    Overview and deployment guide for configuring a built-in gateway with Kong Mesh using MeshGateway, MeshGatewayInstance, and Dataplane resources in both Kubernetes and Universal environments.

  • Configuring built-in listeners

    Reference for configuring built-in listeners using MeshGateway, including listener setup, TLS termination, hostnames, and cross-mesh support.

  • Configuring built-in routes

    Reference for configuring HTTP and TCP routing through builtin gateways using MeshHTTPRoute and MeshTCPRoute, including hostname matching and weighted backends.

  • Delegated gateways

    Guide to configuring delegated gateways in Kong Mesh, allowing external API gateways to handle ingress while Kong Mesh manages egress to the mesh.

  • Use Kong as a delegated Gateway

    Set up Kong Gateway as a delegated gateway for to expose internal services to external traffic. This guide covers installing the Kong Ingress Controller, enabling sidecar injection, creating routes, configuring permissions with MeshTrafficPermission, and verifying traffic access.

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!