-
Kong Mesh
Learn how Kong Mesh works and how to configure it.
-
Mesh policies
Bundled features for your service traffic and network configuration.
-
Mesh release notes
Release notes for supported Kong Mesh versions.
-
Enterprise features
Explore the features included with Kong Mesh Enterprise, including mTLS backends, RBAC, FIPS support, and signed container images.
-
Kong Mesh vulnerability patching process
Understand how Kong addresses and patches vulnerabilities in Kong Mesh binaries, third-party dependencies, and Docker images.
-
Kong Mesh version support policy
Understand the lifecycle and version support guidelines for Kong Mesh, including supported release timelines.
All Mesh Documentation
Overview
Install & Configure
-
Kong Mesh quickstart
Run an instance of Kong Mesh in Universal mode with one command.
-
Requirements
Learn about the requirements for running Kong Mesh, including supported platforms, sizing guidelines, and Kubernetes setup.
-
Deploy Kong Mesh on Universal
Guide to deploying Kong Mesh in Universal mode using Docker containers. Walks through installing the Control Plane, adding demo services, enabling mTLS, and configuring gateways.
-
Deploy Kong Mesh on Kubernetes
Step-by-step guide to deploy Kong Mesh on Kubernetes using Helm and Minikube. Includes demo app setup, GUI exploration, and enabling mTLS for zero-trust security.
-
Kong Mesh on Amazon ECS
Learn how to deploy Kong Mesh on Amazon ECS with IAM-based authentication and Universal mode support for Fargate and EC2.
-
Get started with Red Hat OpenShift and Kong Mesh
This guide explains how to get started on Kong Mesh with Red Hat OpenShift, including installation, sidecar setup, and running a demo app.
-
Red Hat Universal Base Images
Use Red Hat Universal Base Images (UBI) for running Kong Mesh components, available alongside standard Alpine-based images.
-
Mesh Manager
Manage service meshes and Control Planes in Konnect.
How Mesh Works
-
About service meshes
Overview of service mesh concepts and how Kong Mesh simplifies secure and reliable service-to-service communication using sidecar proxies and a Control Plane.
-
Concepts
Understand the core concepts of Kong Mesh, including the Control Plane, Data Plane proxies, inbounds and outbounds, and resources like policies.
-
Architecture
Understand the architecture of a Kong Mesh mesh, including control and Data Plane components, Kubernetes and Universal modes, and how services integrate into the mesh.
-
How ingress works
Overview of how ingress (north/south) traffic flows through delegated and built-in gateways in Kong Mesh, with visuals and key differences.
-
Kong Mesh user interface (GUI)
Visual overview of your meshes, Data Planes, and policies using the Kong Mesh web-based GUI.
Production Deployments
-
Kong Mesh license
Understand how licensing works in Kong Mesh, including limits, behaviors, and how to apply a license in both Kubernetes and Universal modes.
-
Deploy Kong Mesh in production with Helm
Deploy a production-grade Kong Mesh installation on Kubernetes using Helm charts for single zone, multi-zone, or federated environments.
Upgrade
-
Upgrade Kong Mesh
Reference guide for upgrading Kong Mesh across versions. Covers compatibility rules, upgrade order, and considerations for single-zone and multizone deployments.
-
Version specific upgrade notes
Version specific upgrade notes
-
Migration to the new policies
Migrate from old to new policies in Kong Mesh to improve flexibility and transparency.
Policies
-
Policies
Learn how policies in Kong Mesh configure Data Plane proxies by defining rules for traffic behavior, proxy targeting, and merging strategies. This reference covers `targetRef`, directional policies, producer/consumer scopes, and shadow mode simulation.
-
Mesh Health Check
This policy will look for errors in the live traffic being exchanged between our data plane proxies. It will mark a data
-
Mesh Timeout
Connection timeout specifies the amount of time DP will wait for a TCP connection to be established.
-
MeshAccessLog
With the MeshAccessLog policy you can easily set up access logs on every data plane proxy in a mesh.
-
MeshCircuitBreaker
This policy will look for errors in the live traffic being exchanged between our data plane proxies. It will mark a data
-
MeshFaultInjection
With the MeshFaultInjection policy you can easily test your microservices against resiliency.
-
MeshGlobalRateLimit Policy
This policy adds global rate limit support for Kong Mesh.
-
MeshHttpRoute
The `MeshHTTPRoute` policy allows altering and redirecting HTTP requests depending on where the request is coming from and where it's going to.
-
MeshLoadBalancingStrategy
This policy enables Kong Mesh to configure the load balancing strategy for traffic between services in the mesh.
-
MeshMetric
Kong Mesh facilitates consistent traffic metrics across all data plane proxies in your mesh.
-
MeshOPA
Kong Mesh integrates the Open Policy Agent (OPA) to provide access control for your Services.
-
meshpassthrough
This policy enables Kong Mesh to configure traffic to external destinations that is allowed to pass outside the mesh.
-
MeshProxyPatch
The `MeshProxyPatch` provides configuration options for low-level Envoy resources that Kong Mesh policies do not directly expose.
-
MeshRateLimit
This policy enables per-instance service request limiting. Policy supports rate limiting of HTTP/HTTP2 requests and TCP connections.
-
MeshRetry
This policy enables Kong Mesh to know how to behave if there are failed requests which could be retried.
-
MeshTCPRoute
The MeshTCPRoute policy allows you to alter and redirect TCP requests depending on where the request is coming from and where it’s going to.
-
MeshTLS
This policy enables Kong Mesh to configure TLS mode, ciphers and version. Backends and default mode values are taken from the Mesh object.
-
MeshTrace
This policy enables publishing traces to a third party tracing solution.
-
MeshTrafficPermission
The `MeshTrafficPermission` policy provides access control within Mesh.
-
ACM Private CA Policy
Configure Kong Mesh to use Amazon Certificate Manager as a Certificate Authority for mTLS, including setup steps and authentication options.
-
Kubernetes cert-manager CA policy
Use Kubernetes cert-manager as an mTLS backend for issuing Data Plane certificates in Kong Mesh
-
HashiCorp Vault CA
Configure Kong Mesh to use HashiCorp Vault as a Certificate Authority for mTLS, including setup steps and authentication options.
Built-in Gateways
-
Add a builtin gateway
Deploy a built-in gateway in to expose internal mesh services to external traffic. This guide walks through setting up MeshGatewayInstance and MeshGateway resources, defining routes with MeshHTTPRoute, configuring permissions, and securing the gateway with TLS.
-
Configure a built-in gateway
Overview and deployment guide for configuring a built-in gateway with Kong Mesh using MeshGateway, MeshGatewayInstance, and Dataplane resources in both Kubernetes and Universal environments.
-
Configuring built-in listeners
Reference for configuring built-in listeners using MeshGateway, including listener setup, TLS termination, hostnames, and cross-mesh support.
-
Configuring built-in routes
Reference for configuring HTTP and TCP routing through builtin gateways using MeshHTTPRoute and MeshTCPRoute, including hostname matching and weighted backends.
Deletegated Gateways
-
Delegated gateways
Guide to configuring delegated gateways in Kong Mesh, allowing external API gateways to handle ingress while Kong Mesh manages egress to the mesh.
-
Use Kong as a delegated Gateway
Set up Kong Gateway as a delegated gateway for to expose internal services to external traffic. This guide covers installing the Kong Ingress Controller, enabling sidecar injection, creating routes, configuring permissions with MeshTrafficPermission, and verifying traffic access.
Authentication and Authorization
-
Multi-zone authentication
Use Control Plane scoped tokens to authenticate zone Control Planes in a multi-zone Kong Mesh deployment.
-
Role-based access control
Use AccessRole and AccessRoleBinding resources in Kong Mesh to implement fine-grained, role-based access to policies and actions.
-
Authentication with the API server
Authenticate to the Kong Mesh API server using user tokens. Learn about admin tokens, signing keys, token revocation, and configuration.
-
Authentication with the Data Plane proxy
Reference guide to authentication methods for Data Plane proxies in Kong Mesh, including Kubernetes service accounts, dataplane tokens, revocation, and offline token issuance.
-
Configure zone proxy authentication
How to configure zone proxy authentication methods in multi-zone mode.
References
-
CLI
Reference for the CLI tools included in Kong Mesh, including usage examples and commands for kumactl, kuma-cp, and kuma-dp.
-
Kong Mesh audit logs
Track all user and system actions in Kong Mesh using the AccessAudit resource and configurable backends
-
Verify build provenance for Kong Mesh binaries
Verify the build provenance of signed Kong Mesh binary artifacts.
-
Verify build provenance for signed Kong Mesh images
Learn how to verify build provenance for signed Kong Mesh Docker container images using Cosign or slsa-verifier.
-
Verify signatures for signed Kong Mesh images
Learn how to verify signed Kong Mesh Docker images using Cosign and GitHub OIDC identity for increased trust.
-
Software Bill of Materials
View and download software bill of materials (SBOMs) for Kong Mesh binaries and Docker images, including license, dependency, and security information.
-
kuma-cp configuration reference
Configuration Reference
-
Kong Mesh data collection
Enable or disable data collection in Kong Mesh. Understand what telemetry is collected and how to configure reporting.