Skip to content
🐻 The Universal Service Mesh
Go Makefile Other
Branch: master
Clone or download
yskopets Merge pull request #340 from Kong/feature/configurable-ads-connection…

kuma-cp: make connection timeout to ADS server configurable
Latest commit c1e7f0a Oct 11, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information.
.circleci ci: make `clang-format` an optional tool Oct 11, 2019
.github docs(github) add GitHub Issue and PR templates Sep 9, 2019
api chore: upgrade version of `go-control-plane` Oct 10, 2019
app kuma-cp: make connection timeout to ADS server configurable Oct 12, 2019
dev/examples fix(kuma-cp) rename embded to builtin in sample yamls Sep 17, 2019
docs/cmd/kumactl kuma-cp: add k8s Admission Web Hook to apply defaults to Mesh resources Sep 27, 2019
examples feat(*) rename trafficlogging to trafficlog Sep 20, 2019
install/postgres feat(kumactl) postgres review fix Sep 20, 2019
pkg kuma-cp: make connection timeout to ADS server configurable Oct 12, 2019
tools Merge pull request #339 from Kong/release/022 Oct 12, 2019
.gitignore chore(gitignore) ignoring .DS_Store Sep 10, 2019
.gitmodules chore: refactoring repository Sep 8, 2019 kuma-cp: make connection timeout to ADS server configurable Oct 12, 2019 docs: adding community code of conduct Sep 9, 2019 docs: add scope to guide Sep 9, 2019 chore: update version of Golang Sep 11, 2019
Dockerfile.kuma-cp chore: update version of Golang Sep 11, 2019
Dockerfile.kuma-dp chore: update version of Golang Sep 11, 2019
Dockerfile.kuma-injector chore: update version of Golang Sep 11, 2019
Dockerfile.kuma-tcp-echo chore: update version of Golang Sep 11, 2019
Dockerfile.kumactl chore: update version of Golang Sep 11, 2019
LICENSE docs(*) replace placeholder in license file Oct 9, 2019
Makefile ci: make `clang-format` an optional tool Oct 11, 2019
NOTICE license: use proper LICENSE and NOTICE files Oct 9, 2019 Update Sep 10, 2019
go.mod chore: upgrade version of `go-control-plane` Oct 10, 2019
go.sum chore: upgrade version of `go-control-plane` Oct 10, 2019

CircleCI License Twitter

Kuma is a universal open source control-plane for Service Mesh and Microservices that can run and be operated natively across both Kubernetes and VM environments, in order to be easily adopted by every team in the organization.

Built on top of Envoy, Kuma can instrument any L4/L7 traffic to secure, observe, route and enhance connectivity between any service or database. It can be used natively in Kubernetes via CRDs or via a RESTful API across other environments, and it doesn't require a change to your application's code in order to be used.

Built by Envoy contributors at Kong 🦍.

Need help? Installing and using Kuma should be as easy as possible. Contact and chat with the community in real-time if you get stuck or need clarifications. We are here to help.

Installation | Documentation | Slack Chat | Community | Blog | Kong


Why Kuma?

If you are building any software architecture, you will inevitably introduce services that will communicate with each other using requests on a network. Every time services interconnect via a network request the end-user experience at risk. As we all know the connectivity between different services can be slow and unpredictable. It can be insecure, hard to trace, and pose many other problems (e.g. routing, versioning, canary deployments).

Kuma's main goal is to reduce the code that has to be written and maintained to build reliable architectures. Therefore, Kuma embraces the sidecar proxy model by leveraging Envoy as its sidecar data-plane technology and by providing a Universal Control Plane that can run on both modern Kubernetes architectures and existing VM-based architectures in order to deliver business value across every team in the organization.


  • Universal Control Plane: Easy to use, distributed, runs anywhere.
  • Lightweight Data Plane: To process any traffic, powered by Envoy.
  • Automatic: No code changes required in K8s, flexible on VMs.
  • Multi-Tenancy: To setup multiple isolated Service Meshes in one cluster and one Control Plane.
  • Network Security: Automatic mTLS encryption.
  • Traffic Segmentation: With flexible ACL rules.
  • Traffic Tracing: Automatic with Zipkin and Jaeger integrations.
  • Traffic Metrics: Automatic with Prometheus/Splunk/ELK integrations.
  • Proxy Configuration Templating: For advanced users, to configure low-level Envoy configuration.
  • Tagging Selectors: To apply sophisticated regional, cloud-specific and team-oriented policies.
  • Platform-Agnostic: Support for K8s, VMs, and bare metal.
  • Powerful APIM Ingress: Via Kong Gateway integration.


Kuma is a platform-agnostic product that comes in many shapes. You can explore the available installation options at the official website.

You can use Kuma for modern greenfield applications built on containers as well as existing applications running on more traditional infrastructure. Kuma can be fully configured via CRDs (Custom Resource Definitions) on Kubernetes and via a RESTful HTTP API in other environments that can be easily integrated with CI/CD workflows.

Kuma also provides an easy to use kumactl CLI client for every environment.


Kuma is under active development and production-ready.

See Developer Guide for further details.

Enterprise Demo

If you are implementing Kuma in a mission-critical environment, visit Request Demo and get in touch with Kong.


Copyright 2019 Kong Inc.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
See the License for the specific language governing permissions and
limitations under the License.
You can’t perform that action at this time.