☠️
smadi0x86 Playground
  • 💀Welcome to smadi0x86 Playground
    • 🍷Resources
    • 🚬Projects
    • 🎓Certifications
    • 📌Pinned
    • ❓Questions
    • 📞Contact
  • 🏞️Cloud Native
    • Docker
      • Quick Reference
      • Introduction
      • Containers
      • Images
      • Storage & Volumes
      • Security
      • Cheatsheet
    • Git
    • Serverless Framework
    • YAML
  • 🔨Software Engineering
    • System Design
    • Environment Variables
    • JSON Web Tokens
  • 👾Architecture
    • C Language
      • Introduction
      • Calling Conventions
      • GCC Compilation
      • Libraries & Linking
      • I/O
      • Files
      • Pointers
      • Dynamic Memory Allocation
      • Data Types
      • Strings Manipulation
      • Bit Manipulation
      • Pre-processors
      • Macros
      • Type Qualifiers
    • C/C++ Build Systems
      • Fundamentals for Linking
      • Symbolic Linking
      • Cross-Platform Compilation
      • CMake for Building and Linking
      • Shared Libraries
      • Dynamic Linking and Dependency Management
    • Operating Systems
      • OS & Architecture
      • Processes
      • CPU Scheduling
      • Memory Management
  • 🛩️Cyber Warfare
    • Flight Physics
    • Communication
      • PWM & PPM
      • MAVLink
  • 🏴‍☠️Offensive Security
    • Active Directory
      • Introduction
    • Web Attacks
      • Server Side
        • OS Command Injection
        • Information Disclosure
        • Directory Traversal
        • Business Logic
        • Authentication
        • File Upload
        • SSRF
      • Client Side
        • CSRF
        • XSS
    • Recon
      • Active
        • Host discovery
        • Nmap
        • Mass Scan
      • Passive
        • Metadata
      • Web Applications
        • Discovery
        • Subdomains & Directories
        • SSL Certs
        • CMS
        • WAF Detection
      • Firewall Evasion
  • Binary Exploitation
    • Stack Smashing
      • x86
      • x86_64
    • pwntools
      • Processes and Communication
      • Logging and Context
      • Cyclic
      • Packing
      • ELF
      • ROP
  • 😈Advanced Persistent Threat
    • C2
      • Sliver
    • Malware
      • Windows Internals
        • PEB
      • Academy
        • Basics
      • Sektor7
        • Essentials
  • 💌Certifications
    • AWS Certified Cloud Practitioner (CLF-C01)
      • Cloud Foundations
      • Domain 1: Cloud Concepts
      • Domain 2: Security and Compliance
      • Domain 3: Technology
      • Domain 4: Billing and Pricing
    • AWS Certified Solutions Architect - Associate (SAA-C03)
      • Foundation
    • Certified Kubernetes Administrator (CKA)
      • Core Concepts
      • Scheduling
      • Logging & Monitoring
      • Application Lifecycle Management
      • Cluster Maintenance
      • Security
      • Storage
      • Networking
      • Design Kubernetes Cluster
      • Kubernetes The Kubeadm Way
      • Troubleshooting
      • JSONPATH
      • Lightning Lab
      • Mock Exams
      • Killer Shell
    • Certified Kubernetes Security (CKS)
      • Foundation
      • Cluster Setup
      • Cluster Hardening
      • Supply Chain Security
      • Runtime Security
      • System Hardening
      • Killer Shell
    • (KGAC-101) Kong Gateway Foundations
      • Introduction to APIs and API Management
      • Introduction to Kong Gateway
      • Getting Started with Kong Enterprise
      • Getting Started with Kong Konnect
      • Introduction to Kong Plugins
  • 📜Blog Posts
    • Modern Solutions For Preventing Ransomware Attacks
Powered by GitBook
On this page
  • What is Kong Enterprise?
  • Benefits of Kong Enterprise
  • What is Kong Manager?
  • What is Kong Admin API?
  • What is Kong Manager OSS
  1. Certifications
  2. (KGAC-101) Kong Gateway Foundations

Getting Started with Kong Enterprise

PreviousIntroduction to Kong GatewayNextGetting Started with Kong Konnect

Last updated 1 year ago

What is Kong Enterprise?

Kong Gateway Enterpise is the scalable, secure, and self-managed API management solution

Benefits of Kong Enterprise

What is Kong Manager?

Kong Manager is the graphical user interface (GUI) for Kong Gateway. It uses the Kong Admin API under the hood to administer and control Kong Gateway.

Here are some of the things you can do with Kong Manager:

  • Manage all workspaces in one place

  • Create new routes and services

  • Activate or deactivate plugins

  • Group your teams, services, plugins, consumer management, and everything else exactly how you want them

  • Manage users and roles for Kong Gateway

  • Centrally store and easily access key sets and keys.

Access Kong Manager on port 8002 at the path you specified in KONG_ADMIN_GUI_PATH, or the default URL http://localhost:8002/workspaces.

What is Kong Admin API?

Kong Gateway comes with an internal RESTful Admin API for administration purposes. Requests to the Admin API can be sent to any node in the cluster, and Kong will keep the configuration consistent across all nodes.

  • 8001 is the default port on which the Admin API listens.

  • 8444 is the default port for HTTPS traffic to the Admin API.

What is Kong Manager OSS

Kong Manager Open Source (OSS) is the graphical user interface (GUI) for Kong Gateway (OSS). It uses the Kong Admin API under the hood to administer and control Kong Gateway (OSS). To access Kong Manager OSS, go to the following URL after installing Kong Gateway (OSS): http://localhost:8002

Here are some of the things you can do with Kong Manager OSS:

  • Create new routes and services

  • Activate or deactivate plugins

  • Group your services, plugins, consumer management, and everything else exactly how you want them

  • Manage certificates

  • Centrally store and easily access key sets and keys.

Note: If you are running Kong in , increased traffic could lead to potential performance issues for the Kong proxy. Server-side sorting and filtering large quantities of entities can also cause increased CPU usage in both Kong Gateway and its database.

This API is designed for internal use and provides full control over Kong, so care should be taken when setting up Kong environments to avoid undue public exposure of this API. See for more information about security methods.

Note: If you are using the Enterprise image of Kong Gateway, you can use the .

traditional mode
Securing the Admin API
Kong Manager Enterprise
💌
Page cover image
Enable Kong Manager - Kong Gateway | Kong DocsKong Docs
Logo