You deploy a new microservice, but the security team flinches. Another data graph to protect, more access policies to sync, more YAML to babysit. This is where Kuma Neo4j becomes interesting. It connects the worlds of service mesh policy and graph data so your distributed systems can understand both traffic and trust.
Kuma, built by Kong and powered by Envoy, manages service-to-service connectivity across environments: Kubernetes, VMs, even hybrid setups. Neo4j, on the other hand, models complex relationships. Think of it as a whiteboard for data that actually runs queries. Combining them lets you visualize and enforce network interactions as graph relationships instead of opaque routes.
With Kuma Neo4j integration, every service, route, and policy can be ingested and queried as a node or edge. Security engineers can ask questions like, “Which services call our payment processor?” or “Who still talks to that deprecated API?” The graph gives instant answers that logs never will.
Here’s the idea: Kuma generates topology and policy data. Neo4j ingests it via streaming or scheduled export. Once inside Neo4j, Cypher queries can trace dependencies or detect unusual link patterns. The result is a living map of your infrastructure that doubles as a governance layer. Pretty neat for both compliance and debugging.
Quick answer: Kuma Neo4j creates a connected view of your service mesh by translating network rules and metrics into graph data stored in Neo4j, enabling teams to query relationships and risks directly instead of chasing through YAML or dashboards.
To get real value, manage the flow of identity too. Map Kuma policies to your existing OIDC or AWS IAM system. Keep RBAC groups consistent, and rotate any bootstrap tokens used by the collector. Audit queries in Neo4j can confirm enforcement: the graph either shows a valid edge or it doesn’t. No guesswork.