Jing YaninApache APISIXProtecting Your APIs in the Wild: A Deep Dive into WAF and API Gateway IntegrationIn today’s digital age, APIs have become an integral part of our daily lives. They allow us to access and exchange data between different…Jan 30Jan 30
Jing YanHow Does APISIX Bridge the Gap Between DMZ and the Internal Networks?DMZ, or Demilitarized Zone, serves as a secure network zone strategically positioned between the internal and external networks (commonly…Jan 28Jan 28
Jing YaninApache APISIXHow Does API7 Enterprise Proxy Applications in Kubernetes Clusters?In the dynamic era of cloud-native technologies, Kubernetes has emerged as the go-to solution for many enterprises seeking to build…Jan 24Jan 24
Jing YaninApache APISIXMethods for Retrieving the Client Source IPIn certain situations, our services require using the client IP for specific business or security reasons. However, the usual scenario…Jan 18Jan 18
Jing YaninApache APISIXRBAC: Enabling Precise Permission Control for Enterprise APIsIn the era of digitization, the IT architecture of enterprises is growing in complexity. APIs (Application Programming Interfaces), acting…Jan 17Jan 17
Jing YaninApache APISIXService Discovery: Key to Unleashing Microservices ArchitectureAs the trend of microservices architecture gains momentum, an increasing number of enterprises are embracing the shift towards this modern…Jan 16Jan 16
Jing YaninApache APISIXWhy Should We Conduct API Asset Management? What Are the Benefits?As the digital era unfolds, the proliferation and intricacy of internal Application Programming Interfaces (APIs) in enterprises continue…Jan 15Jan 15