All posts

What Compass Kuma Actually Does and When to Use It

A new service goes live. Everyone cheers. Then the questions start: who can hit it, who approved that route, and why the metrics disappeared at midnight? Compass and Kuma exist to prevent exactly that moment of chaos. Together they give teams visibility, security, and control across microservices without slowing anything down. Compass, Atlassian’s developer portal, centralizes knowledge and ownership. Kuma, an open-source service mesh by Kong, handles the traffic between those services. When yo

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

A new service goes live. Everyone cheers. Then the questions start: who can hit it, who approved that route, and why the metrics disappeared at midnight? Compass and Kuma exist to prevent exactly that moment of chaos. Together they give teams visibility, security, and control across microservices without slowing anything down.

Compass, Atlassian’s developer portal, centralizes knowledge and ownership. Kuma, an open-source service mesh by Kong, handles the traffic between those services. When you connect them, you get a living map of your infrastructure that understands both who owns each service and how it communicates. Compass Kuma, as the integration is often called, helps engineering teams translate identity and network policy into one shared language.

The workflow behind Compass Kuma

In Compass, every service is tagged with ownership data, dependencies, and environment links. Kuma reads those definitions to apply routing, retries, and security policies. Instead of static YAML and tribal knowledge, routing rules follow the metadata in Compass. A new service inherits the correct mTLS, rate limits, and observability hooks automatically.

Under the hood, Kuma brokers identity between data planes using Envoy sidecars. If you connect Compass and Kuma through OIDC or your existing directory (Okta or AWS IAM work well), permissions follow people and services alike. That means you can grant a team access to its staging traffic without touching a single firewall rule.

Best practices for configuration

Start small: integrate one environment and verify Compass metadata updates trigger the right Kuma policies. Keep service owners consistent between Compass components and Kuma tags. Rotate tokens through your identity provider, not file mounts. And always audit sidecar logs—especially when testing fallback routes or canaries.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Why teams choose Compass Kuma

  • Automatic policy propagation across all environments
  • Strong service identity with built-in mTLS
  • Real-time dependency mapping for debugging and audits
  • Faster onboarding through pre-populated service templates
  • Central visibility that satisfies SOC 2 documentation in minutes

When done right, Compass Kuma removes invisible friction. Engineers spend less time waiting for approvals or parsing network maps and more time coding. Developer velocity improves because policy lives where the code lives, not in a separate spreadsheet guarded by ops.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. They translate the identity and routing intelligence from Compass Kuma into real-time enforcement, so developers get instant access when they should and nowhere else when they shouldn't.

How do I integrate Compass Kuma with my CI/CD pipeline?

Use Compass events to trigger Kuma policy refreshes after each deployment. The mesh watches for service annotations and updates routing and permissions without manual intervention. CI/CD stays fast, and security rules evolve in sync with code.

AI-driven copilots fit neatly here too. With Compass metadata and Kuma telemetry, they can propose safe routing changes, predict latency spikes, or flag missing ownership data before humans even notice. It is automation with context, not guesswork.

Compass Kuma proves that good infrastructure should feel invisible. It keeps your meshes intelligent, your identities consistent, and your teams focused on shipping, not firefighting.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts