Interview kitsBlog

Your dream job? Lets Git IT.
Interactive technical interview preparation platform designed for modern developers.

XGitHub

Platform

  • Categories

Resources

  • Blog
  • About the app
  • FAQ
  • Feedback

Legal

  • Privacy Policy
  • Terms of Service

© 2026 LetsGit.IT. All rights reserved.

LetsGit.IT/Categories/Microservices
Microserviceseasy

What is an API Gateway used for?

Tags
#api-gateway#routing#security
Back to categoryPractice quiz

Answer

It’s a single entry point in front of services: routing, auth, rate limiting, TLS termination, and request aggregation. It simplifies clients, but can become a bottleneck if overused.

Advanced answer

Deep dive

Expanding on the short answer — what usually matters in practice:

  • Context (tags): api-gateway, routing, security
  • Scaling: what scales horizontally vs vertically, where bottlenecks appear.
  • Reliability: retries/circuit breakers/idempotency, observability (logs/metrics/traces).
  • Evolution: keep changes cheap (boundaries, contracts, tests).
  • Explain the "why", not just the "what" (intuition + consequences).
  • Trade-offs: what you gain/lose (time, memory, complexity, risk).
  • Edge cases: empty inputs, large inputs, invalid inputs, concurrency.

Examples

A tiny example (an explanation template):

// Example: discuss trade-offs for "what-is-an-api-gateway-used-for?"
function explain() {
  // Start from the core idea:
  // It’s a single entry point in front of services: routing, auth, rate limiting, TLS terminat
}

Common pitfalls

  • Too generic: no concrete trade-offs or examples.
  • Mixing average-case and worst-case (e.g., complexity).
  • Ignoring constraints: memory, concurrency, network/disk costs.

Interview follow-ups

  • When would you choose an alternative and why?
  • What production issues show up and how do you diagnose them?
  • How would you test edge cases?

Related questions

Microservices
mTLS between services: what does it protect and what does it NOT protect?
#microservices#security#mtls
Security
How should passwords be stored securely?
#passwords#hashing#security
Security
Authentication vs authorization — what’s the difference, with examples?
#authn#authz
#security
Security
What is threat modeling, and how do you run a lightweight threat model for a feature?
#threat-modeling#risk#security
DevOps
What are best practices for secure and small Docker images?
#docker#containers#security
DevOps
Configuration vs secrets — how should you manage them in DevOps?
#secrets#config#security