diff --git a/website/source/configuration.html.erb b/website/source/configuration.html.erb index cb373bc60c..7f81157530 100644 --- a/website/source/configuration.html.erb +++ b/website/source/configuration.html.erb @@ -8,8 +8,8 @@ description: |-
-

Service configuration made easy.

-

Feature rich key/value store lets you easily configure services.

+

Service configuration made easy

+

Feature rich key/value store to easily configure services

@@ -46,7 +46,10 @@ description: |-
<%= inline_svg 'consul-connect/svgs/configuration-solution.svg' %>
-

Consul can update service configurations across thousands of services in a globally distributed fleet in real time. Configuration can be stored in a hierarchical key/value store, and efficient edge triggers allow changes to be pushed to applications quickly.

+

Consul can update service configurations across thousands of + services in a globally distributed fleet in real-time. Configuration + is stored in a hierarchical key/value store, and efficient edge + triggers push changes out to applications quickly.

@@ -63,7 +66,7 @@ description: |-

Key/Value Store

Feature rich key/value store for dynamic service configuration data. Use it for feature flagging, maintenance modes, and more.

- Learn more + Learn more

@@ -82,7 +85,7 @@ description: |-

Transaction Support

The key/value store supports both read and write transactions. This allows multiple keys to be updated or read as an atomic transaction. Changes to service configuration can be done atomically to minimize churn and avoid inconsistencies.

- Learn more + Learn more

@@ -115,7 +118,7 @@ description: |-

Blocking Queries / Edge-Triggered Requests

The Consul API supports blocking queries, allowing edge triggered updates. Clients use this to get notified immediately of any changes. Tools like consul-template allow configuration files to be rendered in real-time to third-party sources when any configuration changes are made.

- Learn more + Learn more

@@ -148,7 +151,7 @@ description: |-

Watches

Watches use blocking queries monitor for any configuration or health status updates and invoke user specified scripts to handle changes. This makes it easy to build reactive infrastructure.

- Learn more + Learn more

@@ -181,7 +184,7 @@ description: |-

Distributed Locks and Semaphores

The key/value store supports distributed locks and semaphores. This makes it easier for applications to perform leader election or manage access to shared resources.

- Learn more + Learn more

diff --git a/website/source/discovery.html.erb b/website/source/discovery.html.erb index 2d2dbe0ed6..21d020585c 100644 --- a/website/source/discovery.html.erb +++ b/website/source/discovery.html.erb @@ -8,8 +8,9 @@ description: |-
-

Service discovery made easy.

-

Service Registry enables services to register and discover each other in dymanic infrastructure.

+

Service discovery made easy

+

Service registry, integrated health checks, and DNS and HTTP interfaces + enable any service to discover and be discovered by other services

@@ -63,7 +64,7 @@ description: |-

Service Registry

Consul provides a registry of all the running nodes and services, along with their current health status. This allows operators to understand the environment, and applications and automation tools to interact with dynamic infrastructure using an HTTP API.

- Learn more + Learn more

@@ -82,7 +83,7 @@ description: |-

DNS Query Interface

Consul enables service discovery using a built-in DNS server. This allows existing applications to easily integrate, as almost all applications support using DNS to resolve IP addresses. Using DNS instead of a static IP address allows services to scale up/down and route around failures easily.

- Learn more + Learn more

@@ -115,7 +116,7 @@ description: |-

HTTP API with Edge Triggers

Consul provides an HTTP API to query the service registry for nodes, services, and health check information. The API also supports blocking queries, or long-polling for any changes. This allows automation tools to react to services being registered or health status changes to change configurations or traffic routing in real time.

- Learn more + Learn more

@@ -148,7 +149,7 @@ description: |-

Multi Datacenter

Consul supports to multiple datacenters out of the box with no complicated configuration. Look up services in other datacenters or keep the request local. Advanced features like Prepared Queries enable automatic failover to other datacenters.

- Learn more + Learn more

@@ -181,7 +182,7 @@ description: |-

Health Checks

Pairing service discovery with health checking prevents routing requests to unhealthy hosts and enables services to easily provide circuit breakers.

- Learn more + Learn more

diff --git a/website/source/index.html.erb b/website/source/index.html.erb index 08ebd9a643..8bbed51366 100644 --- a/website/source/index.html.erb +++ b/website/source/index.html.erb @@ -15,7 +15,7 @@ description: |- New Consul 1.0 release. Get the details

Service Mesh Made Easy

-

Distributed service networking layer to connect, secure, and configure services across any runtime platform and public or private cloud

+

Consul is a distributed service mesh to connect, secure, and configure services across any runtime platform and public or private cloud

@@ -72,7 +72,11 @@ description: |-

Service-based networking for dynamic infrastructure

-

The shift from static to dynamic infrastructure creates a challenge for connectivity and security. Consul is the service-based networking solution to connect, configure, and secure services in dynamic infrastructure.

+

The shift from static, on-prem infrastructure to dynamic, cloud + infrastructure changes the approach to networking from host-based to + service-based. Connectivity moves from the use of static IPs to + dynamic service discovery, and security moves from static firewalls to + dynamic service segmentation.

@@ -112,7 +116,7 @@ description: |-

Service Registry enables services to register and discover each other.

- Learn more + Learn more
@@ -122,7 +126,7 @@ description: |-

Secure service-to-service communication with automatic TLS encryption and identity-based authorization.

- Learn more + Learn more
@@ -132,7 +136,7 @@ description: |-

Feature rich Key/Value store to easily configure services.

- Learn more + Learn more
@@ -147,8 +151,9 @@ description: |-
-

Automation through Codification

-

Codify and automate service authorization policy.

+

API-Driven

+

Codify and automate service definitions, health checks, service + authorization policies, failover logic, and more.

@@ -177,7 +182,7 @@ description: |-
-

Workflows, not Technologies

+

Run and Connect Anywhere

Connect services across any runtime platform and public or private cloud. Connect services from Kubernetes to VMs, Containers to Serverless functions.

@@ -193,11 +198,11 @@ description: |-
-

Open and Extensible

+

Extend and Integrate

  • Provision clusters on any infrastructure.
  • Connect to services over TLS via proxy integrations.
  • -
  • Serve TLS certificates pluggable Certificate Authorities.
  • +
  • Serve TLS certificates with pluggable Certificate Authorities.
diff --git a/website/source/segmentation.html.erb b/website/source/segmentation.html.erb index d919691f9a..fbb55583b7 100644 --- a/website/source/segmentation.html.erb +++ b/website/source/segmentation.html.erb @@ -9,8 +9,8 @@ description: |-
New Feature -

Service segmentation made easy.

-

Secure service-to-service communication with automatic TLS encryption and identity-based authorization.

+

Service segmentation made easy

+

Secure service-to-service communication with automatic TLS encryption and identity-based authorization

@@ -38,7 +38,12 @@ description: |-
<%= inline_svg 'consul-connect/svgs/segmentation-challenge.svg' %>
-

East-west firewalls are the main tool for networking security in a static world. They depend on constraining traffic flow and use IP based rules to control ingress and egress traffic. But in a dynamic world where services move across machines and machines are frequently created and destroyed, this perimeter-based approach is difficult to scale as it requires complex network topologies and a large number of short lived firewall rules.

+

East-west firewalls use IP-based rules to secure ingress and + egress traffic. But in a dynamic world where services move across + machines and machines are frequently created and destroyed, this + perimeter-based approach is difficult to scale as it results in + complex network topologies and a sprawl of short-lived + firewall rules.

@@ -47,7 +52,11 @@ description: |-
<%= inline_svg 'consul-connect/svgs/segmentation-solution.svg' %>
-

Service segmentation is a new approach to secure the service itself rather than relying on the network. Consul Connect enables high level rules to codify which services are allowed to communicate directly, without IP based rules or networking middleware.

+

Service segmentation is a new approach to secure the service itself + rather than relying on the network. Consul uses service policies to + codify which services are allowed to communicate. These policies + scale across datacenters and large fleets without IP-based rules or + networking middleware.

@@ -62,9 +71,9 @@ description: |-

Service Access Graph

-

Define and enforce service to service communication with a simple Intentions configuration. Service based rules, instead of IP based rules, make it easy to manage dynamic infrastructure with frequently changing IPs.

+

Define and enforce service to service communication with a simple Intentions configuration. Service based rules, instead of IP-based rules, make it easy to manage dynamic infrastructure with frequently changing machines and service locations.

- Learn more + Learn more

@@ -83,7 +92,7 @@ description: |-

Secure services across any runtime platform

Secure communication between legacy and modern workloads. Sidecar proxies allow applications to be integrated without code changes and Layer 4 support provides nearly universal protocol compatibility.

- Learn more + Learn more

@@ -116,7 +125,7 @@ description: |-

Certificate-Based Service Identity

TLS certificates are used to identify services and secure communications. Certificates use the SPIFFE format for interoperability with other platforms. Consul can be a certificate authority to simplify deployment, or integrate with external signing authorities like Vault.

- Learn more + Learn more

@@ -138,7 +147,7 @@ description: |-

Encrypted communication

All traffic between services is encrypted and authenticated with mutual TLS. Using TLS provides a strong guarantee of the identity of services communicating, and ensure all data in transit is encrypted.

- Learn more + Learn more