diff --git a/website/source/configuration.html.erb b/website/source/configuration.html.erb index cb373bc60c..7f81157530 100644 --- a/website/source/configuration.html.erb +++ b/website/source/configuration.html.erb @@ -8,8 +8,8 @@ description: |-
Feature rich key/value store lets you easily configure services.
+Feature rich key/value store to easily configure services
Feature rich key/value store for dynamic service configuration data. Use it for feature flagging, maintenance modes, and more.
- Learn more + Learn more
@@ -82,7 +85,7 @@ description: |-The key/value store supports both read and write transactions. This allows multiple keys to be updated or read as an atomic transaction. Changes to service configuration can be done atomically to minimize churn and avoid inconsistencies.
- Learn more + Learn more
@@ -115,7 +118,7 @@ description: |-The Consul API supports blocking queries, allowing edge triggered updates. Clients use this to get notified immediately of any changes. Tools like consul-template allow configuration files to be rendered in real-time to third-party sources when any configuration changes are made.
- Learn more + Learn more
@@ -148,7 +151,7 @@ description: |-Watches use blocking queries monitor for any configuration or health status updates and invoke user specified scripts to handle changes. This makes it easy to build reactive infrastructure.
- Learn more + Learn more
@@ -181,7 +184,7 @@ description: |-The key/value store supports distributed locks and semaphores. This makes it easier for applications to perform leader election or manage access to shared resources.
- Learn more + Learn more
diff --git a/website/source/discovery.html.erb b/website/source/discovery.html.erb index 2d2dbe0ed6..21d020585c 100644 --- a/website/source/discovery.html.erb +++ b/website/source/discovery.html.erb @@ -8,8 +8,9 @@ description: |-Service Registry enables services to register and discover each other in dymanic infrastructure.
+Service registry, integrated health checks, and DNS and HTTP interfaces + enable any service to discover and be discovered by other services
Consul enables service discovery using a built-in DNS server. This allows existing applications to easily integrate, as almost all applications support using DNS to resolve IP addresses. Using DNS instead of a static IP address allows services to scale up/down and route around failures easily.
- Learn more
Consul provides an HTTP API to query the service registry for nodes, services, and health check information. The API also supports blocking queries, or long-polling for any changes. This allows automation tools to react to services being registered or health status changes to change configurations or traffic routing in real time.
- Learn more
Consul supports to multiple datacenters out of the box with no complicated configuration. Look up services in other datacenters or keep the request local. Advanced features like Prepared Queries enable automatic failover to other datacenters.
- Learn more
Pairing service discovery with health checking prevents routing requests to unhealthy hosts and enables services to easily provide circuit breakers.
- Learn more
Distributed service networking layer to connect, secure, and configure services across any runtime platform and public or private cloud
+Consul is a distributed service mesh to connect, secure, and configure services across any runtime platform and public or private cloud
The shift from static to dynamic infrastructure creates a challenge for connectivity and security. Consul is the service-based networking solution to connect, configure, and secure services in dynamic infrastructure.
+The shift from static, on-prem infrastructure to dynamic, cloud + infrastructure changes the approach to networking from host-based to + service-based. Connectivity moves from the use of static IPs to + dynamic service discovery, and security moves from static firewalls to + dynamic service segmentation.
Service Registry enables services to register and discover each other.
Secure service-to-service communication with automatic TLS encryption and identity-based authorization.
Feature rich Key/Value store to easily configure services.
Codify and automate service authorization policy.
+Codify and automate service definitions, health checks, service + authorization policies, failover logic, and more.
Connect services across any runtime platform and public or private cloud. Connect services from Kubernetes to VMs, Containers to Serverless functions.
Secure service-to-service communication with automatic TLS encryption and identity-based authorization.
+Secure service-to-service communication with automatic TLS encryption and identity-based authorization
Service segmentation is a new approach to secure the service itself rather than relying on the network. Consul Connect enables high level rules to codify which services are allowed to communicate directly, without IP based rules or networking middleware.
+Service segmentation is a new approach to secure the service itself + rather than relying on the network. Consul uses service policies to + codify which services are allowed to communicate. These policies + scale across datacenters and large fleets without IP-based rules or + networking middleware.
Define and enforce service to service communication with a simple Intentions configuration. Service based rules, instead of IP based rules, make it easy to manage dynamic infrastructure with frequently changing IPs.
+Define and enforce service to service communication with a simple Intentions configuration. Service based rules, instead of IP-based rules, make it easy to manage dynamic infrastructure with frequently changing machines and service locations.
- Learn more
Secure communication between legacy and modern workloads. Sidecar proxies allow applications to be integrated without code changes and Layer 4 support provides nearly universal protocol compatibility.
- Learn more
TLS certificates are used to identify services and secure communications. Certificates use the SPIFFE format for interoperability with other platforms. Consul can be a certificate authority to simplify deployment, or integrate with external signing authorities like Vault.
- Learn more
All traffic between services is encrypted and authenticated with mutual TLS. Using TLS provides a strong guarantee of the identity of services communicating, and ensure all data in transit is encrypted.
- Learn more