A new service goes live. Everyone cheers. Then the questions start: who can hit it, who approved that route, and why the metrics disappeared at midnight? Compass and Kuma exist to prevent exactly that moment of chaos. Together they give teams visibility, security, and control across microservices without slowing anything down.
Compass, Atlassian’s developer portal, centralizes knowledge and ownership. Kuma, an open-source service mesh by Kong, handles the traffic between those services. When you connect them, you get a living map of your infrastructure that understands both who owns each service and how it communicates. Compass Kuma, as the integration is often called, helps engineering teams translate identity and network policy into one shared language.
The workflow behind Compass Kuma
In Compass, every service is tagged with ownership data, dependencies, and environment links. Kuma reads those definitions to apply routing, retries, and security policies. Instead of static YAML and tribal knowledge, routing rules follow the metadata in Compass. A new service inherits the correct mTLS, rate limits, and observability hooks automatically.
Under the hood, Kuma brokers identity between data planes using Envoy sidecars. If you connect Compass and Kuma through OIDC or your existing directory (Okta or AWS IAM work well), permissions follow people and services alike. That means you can grant a team access to its staging traffic without touching a single firewall rule.
Best practices for configuration
Start small: integrate one environment and verify Compass metadata updates trigger the right Kuma policies. Keep service owners consistent between Compass components and Kuma tags. Rotate tokens through your identity provider, not file mounts. And always audit sidecar logs—especially when testing fallback routes or canaries.