Red Hat Service Interconnect
What is Red Hat Service Interconnect?
Red Hat® Service Interconnect allows applications and services to communicate with each other regardless of the environment or platform.
Unlike traditional means of interconnecting, such as VPNs combined with complex firewall rules, interconnections can be created by anyone on the development team without elevated privileges and delivered with a protected link without compromising the organization's infrastructure or data.
Get a developer’s perspective
Want a more technical overview of Red Hat Service Interconnect? Visit developers.redhat.com to take a closer look at features and functionality from a practitioner's perspective, and access hands-on resources and learning paths created by—and for—developers.
Product details
Dynamic routing
If the application needs to move to a different environment, the connectivity follows along–while avoiding lock-in to provider-specific networking.
Command line interface
Using a simple command line interface, interconnections are created in a matter of minutes, avoiding extensive networking planning and configuration.
Transport layer security
All interconnections between applications use mutual transport layer security (TLS) to encrypt and help protect your organization's infrastructure and data.
Benefits
Frequently asked questions
Is Red Hat Service Interconnect really just a VPN for applications?
No, Red Hat Service Interconnect works at the application level, creating access without having to reconfigure underlying networking, VPN, or firewalls between on-premises, or cloud properties.
Does Red Hat Service Interconnect only work on Red Hat OpenShift?
No. Red Hat Service Interconnect is also supported on any non-Red Hat Kubernetes clusters, virtual machines, or bare-metal hosts in addition to being supported on Red Hat OpenShift and Red Hat Enterprise Linux.
How does Red Hat Service Interconnect help to protect my organization's infrastructure and data?
Red Hat Service Interconnect is equipped with built-in security that scales across clusters and clouds by default. The connections between Red Hat Service Interconnect routers are secured with mutual TLS using a private, dedicated certificate authority (CA). Each router is uniquely identified by its own certificate. This means that the Red Hat Service Interconnect network is isolated from external access, preventing security risks such as lateral attacks, malware infestations, and data exfiltration.
How do developers use Red Hat Service Interconnect?
Red Hat Service Interconnect provides a simple and user-friendly command line interface in order to establish unexposed connections across environments. It also provides a web console to visualize the different connections.