Side-by-Side Comparison: 3scale vs Connectivity Link

Now that you have explored both environments, this module consolidates the comparison across all dimensions: authentication, rate limiting, GitOps, developer experience, and observability.

Resource comparison (3D view)

The following chart compares the number of Kubernetes resources required per capability in each platform. Fewer dedicated resources means simpler configuration and easier GitOps management.

3D Resource Comparison - 3scale vs Connectivity Link

Key takeaway: Connectivity Link reduces the total number of CRDs from 14 resources across 2 namespaces (3scale) to 7 resources in a single namespace, all managed via GitOps. The only area where Connectivity Link uses more resources is rate limiting — because PlanPolicy provides more granular tiered control than 3scale Application Plans.

Full comparison table

3scale (neuralbank) CL (neuralbank) 3scale (nfl-wallet) CL (nfl-wallet)

Auth type

OIDC (Product)

OIDC (OIDCPolicy)

API Key (user_key)

API Key (AuthPolicy)

Gateway

APIcast

Istio Gateway

APIcast

Istio Gateway

Routing

MappingRules

HTTPRoute

MappingRules

HTTPRoute

Rate Limit

Application Plan

RateLimitPolicy

Application Plan

RateLimitPolicy

Dev Portal

3scale Portal

APIProduct + Backstage

3scale Portal

APIProduct + Backstage

GitOps

Partial (CRDs)

Full (ArgoCD)

Partial (CRDs)

Full (ArgoCD)

Namespace

neuralbank-3scale

neuralbank-stack

nfl-wallet-3scale

nfl-wallet-prod

OIDC authentication comparison (Neuralbank)

Aspect 3scale (neuralbank-3scale) Connectivity Link (neuralbank-stack)

Resource

Product with oidc auth

OIDCPolicy on HTTPRoute

Issuer

issuerEndpoint in Product spec

provider.issuerURL in OIDCPolicy

Client ID

3scale Application → OIDC client

provider.clientID in OIDCPolicy

Token validation

APIcast validates JWT

Authorino validates JWT

Redirect flow

APIcast → Keycloak → APIcast callback

OIDCPolicy → Keycloak → callback HTTPRoute

Unauthenticated

403 from APIcast

302 redirect to Keycloak login

Config location

3scale Admin UI or Product CRD

Kubernetes CRD in Git (GitOps)

API Key authentication comparison (NFL Wallet)

Aspect 3scale (nfl-wallet-3scale) Connectivity Link (nfl-wallet-prod)

Resource

Product with userkey auth

AuthPolicy with apiKey selector

Credential

user_key query parameter

X-API-Key HTTP header

Storage

3scale database (Application)

Kubernetes Secrets with labels

Validation

APIcast looks up user_key in Redis

Authorino matches labeled Secrets

Unauthenticated

403 from APIcast

401 JSON error from Authorino

Key creation

3scale Admin Portal

oc create secret + labels

Rate limiting comparison

Aspect 3scale Application Plans Kuadrant RateLimitPolicy + PlanPolicy

Definition

Per-metric limits in Plan YAML

Per-route limits in RateLimitPolicy

Tiers

Plans: basic (60/min), premium (300/min)

PlanPolicy: free (10/min), basic (60/min), pro (300/min)

Counter scope

Per-application (user_key or client_id)

Per-identity (CEL expression on auth.identity)

Enforcement

APIcast → 3scale backend (Redis)

Envoy → Limitador (Rust-based, in-cluster)

Exceeded response

429 with rate limit headers

429 with rate limit headers

Daily quotas

Separate daily/monthly limits in Plan

limits.daily in PlanPolicy

GitOps comparison

Aspect 3scale Connectivity Link

Config source

3scale Admin UI, API, or CRDs

Kubernetes CRDs in Git

Sync mechanism

3scale Operator reconciles CRDs

ArgoCD syncs from Git to cluster

Drift detection

Manual or operator-based

ArgoCD auto-detects drift, self-heals

Rollback

Redeploy CRD version

git revert + ArgoCD sync

Multi-environment

Separate 3scale tenants

Separate Git branches/folders + namespaces

Audit trail

3scale admin logs

Git commit history

Developer experience comparison

Aspect 3scale Connectivity Link

API discovery

3scale Developer Portal

Kuadrant APIProduct in Developer Hub

API docs

ActiveDoc (OpenAPI in 3scale portal)

Backstage TechDocs + Swagger UI

Key management

3scale Developer Portal sign-up

Developer Hub Kuadrant plugin

Self-service templates

Not available

Developer Hub Software Templates generate all manifests

Catalog integration

External

Native Backstage catalog entities with kuadrant.io/* annotations

Observability comparison

Aspect 3scale Connectivity Link

Metrics

3scale Analytics dashboard

Prometheus + Grafana (Envoy/Istio metrics)

Tracing

Limited

OpenTelemetry + Jaeger

Service topology

Not available

Kiali (Service Mesh visualization)

Alerting

3scale custom alerts

Prometheus AlertManager

  1. Standards-based: Gateway API (HTTPRoute) is a portable CNCF standard

  2. GitOps-native: All configuration lives in Git — ArgoCD syncs and self-heals

  3. Granular policies: Attach auth and rate limiting at Gateway or individual HTTPRoute level

  4. Integrated DevEx: Kuadrant Backstage plugin surfaces APIs, plans, and key management in Developer Hub

  5. Cloud-native observability: Native Envoy/Istio metrics + OpenTelemetry + Kiali

  6. Kubernetes-native keys: API Keys are standard Kubernetes Secrets, manageable with any K8s tooling