Introduction to Application Interconnect
For Use with Application Interconnect 1.0 LIMITED AVAILABILITY
Making open source more inclusive
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
This Limited Availability release is not available to all customers. Contact Red Hat Sales if you are interested in learning more about Application Interconnect.
Chapter 1. Overview of Application Interconnect
Application Interconnect introduces a service network, linking services across the hybrid cloud.
A service network enables communication between services running in different network locations. It allows geographically distributed services to connect as if they were all running in the same site.
For example, you can deploy your frontend in a public OpenShift cluster and deploy your backend in a private OpenShift cluster, then connect them into a service network.
A service network provides the following features:
- Security by default. All inter-site traffic is protected by mutual TLS using a private, dedicated certificate authority (CA).
- Easy connections between OpenShift clusters, even private clusters.
- A service network supports existing TCP, HTTP1 or HTTP2-based applications without requiring modification.
- Monitor your application traffic spread across multiple OpenShift clusters using the service network console.
You deploy and manage a service network using the
Chapter 2. Application Interconnect documentation
The following titles are available:
- Release Notes
- Configuring Application Interconnect sites using the CLI
- Creating a service network with OpenShift
- Creating a service network with OpenShift and accessing a backend service using a gateway
- Using the Skupper console
- Creating Application Interconnect sites using the operator
- Securing a service network using policies
Revised on 2022-06-24 16:32:53 UTC