Dive in deeper!
Alright - you know what Kyma is, you got it started, now you want to know what else is possible. Dive in deeper and explore the functionalities that Kyma provides for various use cases!
API Exposure
- Create workload
- Custom domain
- Expose a workload
- Expose multiple workloads
- Expose workloads in multiple Namespaces
- Secure workload with OAuth 2
- Get a JSON Web Token (JWT)
- Secure a workload with JWT
- Secure a workload with Istio
- Secure a workload with a certificate
Application Connectivity
- Create a new Application
- Register a service
- Register a secured API
- Call a registered external service from Kyma
- Disable TLS certificate verification
- Establish a secure connection with Compass
- Maintain a secure connection with Compass
- Revoke a client certificate (RA)
- Configure Runtime Agent with Compass
- Reconnect Runtime Agent with Compass
Eventing
- Create Subscription subscribing to multiple event types
- Event name cleanup in Subscriptions
- Changing Events Max-In-Flight in Subscriptions
- Publish legacy events using Kyma Eventing
Observability
Security
- Set up or update a custom domain TLS certificate in Kyma
- Prepare self-signed root CA and client certificates
- Set up a custom identity provider
Serverless
- Create an inline Function
- Create a Git Function
- Expose a Function with an API Rule
- Manage Functions with Kyma CLI
- Debug a Function
- Synchronize Git resources with the cluster using a GitOps operator
- Set an external Docker registry
- Switch to an external Docker registry at runtime
- Log into a private package registry using credentials from a Secret
- Set asynchronous communication between Functions
- Customize Function traces
- Override runtime image
- Inject environment variables
- Use external scalers
- Access to Secrets mounted as Volume