Kong Mesh guides

Learn how to use Mesh to solve common challenges

Security and Enforcing policies

One of the key tenants of a Service Mesh is the ability to encrypt and control service to service communication. With Kong Mesh, your application developers can concentrate on core business logic, whilst Mesh deals with security.

Service to Service encryption (mTLS)

Learn how to configure service to service encryption, generate certificates, configure external Certificate Authorities

Common enforcment policies

Guide to deploying Kong Mesh in Universal mode using Docker containers. Walks through installing the Control Plane, adding demo services, enabling mTLS, and configuring gateways.

Role based access

Configure what rights and access your developers and platform teams have whilst using Kong Mesh

Something wrong?

Help us make these docs great!

Kong Developer docs are open source. If you find these useful and want to make them better, contribute today!