Project "Kyma" extends the Kubernetes platform with modules that allow you to expose your Services and Functions outside the cluster. You can use the API Gateway module to make your Kubernetes Services accessible from outside of the Kyma cluster.
Istio and API Gateway are default Kyma modules, which means that they are added to your Kyma runtime once you provision it. If you want to create Functions and expose them using API Gateway, you must also add the Serverless module. To trigger exposed Services with events, add the Eventing module. To monitor exposed workloads, add the Telemetry module and use the observability features it provides.
Features of the API Gateway Module

The API Gateway is based on the open-source project Istio, which is installed by the Istio module. The next unit provides more information about Istio.
The API Gateway module installs a custom-configured Istio Ingress Gateway called kyma-gateway in the kyma-system namespace. The kyma-gateway is the central point of contact for all external traffic that enters the Kyma cluster. It uses the Envoy Proxy as an application-based service proxy to handle the traffic and forward it to the correct Service.
The module also uses Istio features for authorizing incoming HTTP requests. It provides an APIRule custom resource that you can use to securely expose your workloads. With an APIRule, you can:
- Group multiple workloads and expose them under a single host.
- Use a short host name to simplify the migration of resources to a new cluster.
- Configure the noAuth access strategy, which offers a simple configuration to allow access to specific HTTP methods.
- Secure your workloads by configuring jwt or extAuth access strategies. The jwt access strategy enables you to use Istio's JWT configuration to protect your exposed Services and interact with them using JSON Web Tokens. The extAuth access strategy allows you to implement custom authentication and authorization logic.

