►
From YouTube: Kong Ingress Controller Demo | Kong Summit 2020
Description
You might want to break down a monolith or build new cloud-native application using microservices and serverless. We'll show you how Kong provides the platform not only to enable but to accelerate your journey to microservices, Innovate faster and create new digital revenues. See how to make your developers a lot more productive and provide observability to gain a detailed understanding of your services so that you can even lower your total cost of ownership and complete projects faster. Here, watch demos of Kong for Kubernetes & Kong Mesh.
A
A
Typically,
when
you
want
to
get
to
the
outside
into
kubernetes
you're
going
to
need
an
ingress
object
and
how
that
ingress
object
behaves
is
primarily
dictated
on
the
ingress
controller
that
is
behind
it.
So
we've
built
a
kong
ingots
controller
that
leverages
the
kong
gateway
under
the
hood
and
gives
us
all
the
power
of
kong,
including
all
the
plug-ins
and
all
the
other
goodies
that
I'm
going
to
be
showing
you
so
to
get
started.
A
We
have
a
basic
kind
of
microblog
solution
that
we're
going
to
be
using
as
this
demonstration,
and
this
is
going
to
be
kind
of
a
two-part
series.
So
the
first
part
I
want
to
kind
of
go
over
is
what
they
call
this
north
to
south.
I
like
to
look
at
this
as
kind
of
like
the
building,
and
this
is
the
doorway
to
the
building
that
we're
going
to
be
kind
of
addressing,
and
this
is
typically
what
they
we
use,
the
ingress
controller
for
so
things
like
authorization
rate
limiting.
A
You
know
who
can
get
in
how
many
people
can
get
in
that's
kind
of
what
we're
going
to
be
talking
about
in
this
session.
To
do
this,
you'll
see
that
we
have
a
large
number
of
these.
You
know
pods
already
deployed,
so
we
have
our
apollo,
which
is
our
graphql
layer.
We
have
our
blog
service,
which
is
our
microblog
service
itself.
We
have
a
natural
language
processing
service,
that's
going
to
do
sentiment,
analysis
and
we'll
show
you
kind
of
the
mood
or
the
sentiment
of
the
different
text
that
the
user
puts
in.
A
So
this
is
all
running.
It's
all
great,
but
it's
all
within
our
kubernetes
cluster,
so
in
order
to
get
in
we're,
gonna
need
an
ingress
and
just
to
kind
of
drive
the
point
home.
If
I
come
over
here,
I
have
this
mutation.
This
is
some
graphql
that
we
could
send
to
our
endpoint.
That
says,
I'm
happy
and
I
know
it
so
we're
gonna
write
a
little
micro
blog
of
that.
Well,
we're
gonna
get
a
400
bad
request
because
we
don't
have
any
ingress,
so
let's
go
fix
that.
A
So
what
I'm
gonna
do
is
we're.
Gonna
go
and
deploy
an
ingress,
and
the
first
thing
I
want
you
to
notice
is:
there's
nothing
kong
specific
about
this
ingress.
We
have
a
little
bit
of
let's
encrypt,
but
other
than
that.
It's
a
pretty
much
standard
ingress,
the
kind
of
thing
that
you
would
get
out
of
the
normal
kubernetes
documentation.
A
So
with
that
said,
I'm
just
going
to
go
apply
this
particular
ingress
and
you
can
see
I'm
just
doing
a
cube
cuddle
apply.
So
I'm
very
much
using
the
kubernetes
way
to
do
this.
So
now
that
we've
done
that,
I
can
come
back
here
and
you
know
first
thing:
I'm
going
to
do
is
see
the
database,
that's
just
a
little
step,
but
now
we
can
come
back
to
our
blog
and
we
can
come
here
and
lo
and
behold,
it's
working.
We
get
this
happy,
I
know
it
and
we
got
a
pretty
positive
sentiment.
A
Analysis
0.4,
it's
on
a
scale
of
1
to
negative
1..
So
that's
actually
pretty
good.
The
thing
I
want
you
to
notice,
though,
if
I
go
to
the
header
is
it
is
in
fact
going
through
kong.
So,
just
by
having
the
kong
ingress
controller
installed,
we've
made
the
default
behavior
of
any
ingress.
We
create
in
our
kubernetes
environment
to
go
through
kong.
Well,
what
does
that
mean?
Well,
it
means
we
get
access
to
a
lot
of
really
powerful
plugins.
A
Let's
just
say
that
you
know
I
wanted
to
lock
this
down
see
right
now.
You
know
this
is
public
facing
anyone
can
get
in.
So
let's
just
say
I
wanted
to
limit
my
users.
You
know
I
can
use
things
like
key
authentication,
even
better
might
be
to
use
like
open
id
connect.
You
know,
so
I
can
use
it
against
an
identity
provider
and
use
bearer
tokens
and
stuff
like
that
to
good
effect,
so
no
big
deal.
I
can
do
that.
A
It's
just
a
plug-in
and
the
way
we're
going
to
use
our
plugins
is
we
just
describe
them
in
a
very
kubernetes
type
of
way.
We
have
a
manifest
object,
called
a
kong
plugin.
It
has
a
name
open
id
connect
in
this
case
and
we
give
it
some
configuration.
This
is
a
pretty
minimal
configuration
it'll
do
for
our
demo,
we're
just
using
some
basic
client
credentials.
A
A
So
the
thing
I'm
going
to
do
here
is:
I'm
just
going
to
apply
this
plugin.
You
could
see
I'm
just
going
to
apply
our
oidc
yml
and
what
this
is
doing
is
it's
just
basically
creating
this
plugin
into
our
kubernetes
inventory.
If
you
will
so,
if
I
do
a
a
cube
cuddle,
you
know
get
and
that'll
just
say:
kong
plugins
you'll
see
like
just
like
any
other
kubernetes
object.
We
can
reference
it.
We
can
look
it
up.
We
can
see
things
we
could
describe
it.
So
that's
great!
A
A
In
this
case,
I'm
just
going
to
apply
it
to
our
service,
and
this
is
our
apollo
service
that
we
deployed
earlier
I've
just
added
this
one
annotation,
which
is
plugins
kong,
hq
dot
com,
and
then
I
just
named
the
plugin,
and
we
can
have
any
number
of
plugins
just
be
a
comma
separated
list
here.
If
we
will
so
with
that
said,
we're
just
going
to
deploy
redeploy
our
service
that
we
have
with
this
annotation
and
that
basically
should
lock
down
our
service.
A
It's
pretty
much
that
simple
and
if
I
come
here
we
you
know
we
saw
this
working
before
and
now
what
happens?
Is
we
get
this
unauthorized
so
we're?
Basically,
this
is
now
locked
down.
We
need
our
oidc,
so
I
it's
all
right.
I
have
a
basic
our
basic
authentication
here
so
now
I
can
run
it
and
we're
back
in
business
and
just
to
show
you
and
drive
this
point
home
and
what
really
happened
here
under
the
hood.
I
kind
of
created
an
echo
service
right.
A
That's
going
to
basically
do
a
similar
thing,
just
to
show
you
that
it
echoes
back
the
request
and
we
have
a
bearer
token.
That
is
here
and
if
I
go
and
just
basically
grab
this
bearer
token
and
I
can
copy
it,
I
can
basically
put
it
into
our.
I
don't
know
like
a
jot
token
decoder
here
and
you
can
see
that
it's
something
we
can
introspect.
We
could
forward
this
on
to
our
services
and
and
use
that,
so
I
hope
this
was
helpful
again.
A
We
basically
showed
you
more
or
less
how
the
ingress
works
and
how
we
can
use
plug-ins
to
good
effect
and
the
next
video
I'm
going
to
show
you
is
we're
going
to
look
at
more
of
this
east
to
west
traffic
going
on
and
we're
going
to
be
using
kong
mesh
to
do
that.
So
definitely
looking
forward
and
talk
to
you
soon.