From the security point of view, this tool allows us to secure the APIs via TLS and also OAuth. It is very effective in handling Requests and Responses - Users can easily modify responses and adjust them as per needs of the cases without changing any...
It is very awkward to manage your proxies in code. Each endpoint requires essentially its own git repository, which is not ideal. Logging and reporting could be better as well.
Kong is wonderful if you enjoy Lua with Openresty and look to have an sll-in-one solution for API implementation and management. Lua is not as popular as it should be, but Openresty has proven performance and a strong community. For developers using either...
here comes the thing which are not talk about much about kong- 1. kong is yet to understand the requirements of the clients let alone the thought of implementing it, because it takes too much time (months)to solve a simple bug . 2. Delay in deliviring...
From the security point of view, this tool allows us to secure the APIs via TLS and also OAuth. It is very effective in handling Requests and Responses - Users can easily modify responses and adjust them as per needs of the cases without changing any...
Kong is wonderful if you enjoy Lua with Openresty and look to have an sll-in-one solution for API implementation and management. Lua is not as popular as it should be, but Openresty has proven performance and a strong community. For developers using either...
It is very awkward to manage your proxies in code. Each endpoint requires essentially its own git repository, which is not ideal. Logging and reporting could be better as well.
here comes the thing which are not talk about much about kong- 1. kong is yet to understand the requirements of the clients let alone the thought of implementing it, because it takes too much time (months)to solve a simple bug . 2. Delay in deliviring...