mirror of https://github.com/status-im/consul.git
Soften language by replacing utilize with use
This commit is contained in:
parent
8c2f2ca806
commit
e51dbbf529
|
@ -11,8 +11,8 @@ description: >-
|
|||
Consul enables automation of network configurations, service discovery, and secure network connectivity across any
|
||||
cloud or runtime.
|
||||
|
||||
Consul utilizes a lightweight gossip and RPC system which provides various essential features. Both of these systems
|
||||
provide security mechanisms which should be utilized to enable confidentiality, integrity and authentication.
|
||||
Consul uses a lightweight gossip and RPC system which provides various essential features. Both of these systems
|
||||
provide security mechanisms which should be used to enable confidentiality, integrity and authentication.
|
||||
|
||||
Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on
|
||||
your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version.
|
||||
|
@ -157,7 +157,7 @@ environment and adapt these configurations accordingly.
|
|||
environments. Consul OSS clusters always operate within the “default” namespace.
|
||||
|
||||
- **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip
|
||||
communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster utilizing
|
||||
communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster using
|
||||
AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192,
|
||||
or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen`
|
||||
command. This key should be
|
||||
|
|
|
@ -9,7 +9,7 @@ description: >-
|
|||
## Overview
|
||||
|
||||
Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security
|
||||
infrastructure tasks for network, security, and operations teams. NIA utilizes [Terraform](https://www.terraform.io/)
|
||||
infrastructure tasks for network, security, and operations teams. NIA uses [Terraform](https://www.terraform.io/)
|
||||
to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs.
|
||||
|
||||
### Personas
|
||||
|
|
Loading…
Reference in New Issue