// Product / QHx Proxy

The path between workloads.

QHx Proxy provides data-plane intermediation for application traffic and carries it over mutually authenticated, encrypted, workload-bound tunnels.

// Why it matters

Applications should not become security infrastructure.

QHx Proxy lets existing services participate in a secure workload communication fabric without embedding identity, tunnel, and notary logic into every application.

  • Flowspec-drivenService annotations describe which clients can connect and how the path should be realized.
  • Workload-boundTunnels are mutually authenticated against workload identities. A credential without the workload that earned it cannot complete the handshake.
  • Protocol-awareApplication-specific intermediation for HTTP, TCP, and MQTT. HTTP semantics are preserved; TCP streams are tunneled transparently; MQTT broker identity is verified before messages are forwarded.
  • Notary extensionHTTP flows can request workload-only, logged, or signed request notarization.

// Deployment patterns

Where it runs depends on what you have.

The proxy is the same component in either case. The deployment pattern is what changes.

  • SidecarQHx Proxy runs as a sidecar container in the application's pod. Traffic redirects to it via iptables. The application connects to localhost and is otherwise unmodified.
  • Direct proxyWhere sidecar injection is not available — bare metal, VMs, constrained Kubernetes — the proxy runs as a node-level daemon and intercepts traffic for co-located workloads.

The application asks for localhost. The system proves the peer.