mirror of https://github.com/status-im/consul.git
Soften language by replacing utilize with use
This commit is contained in:
parent
8c2f2ca806
commit
e51dbbf529
|
@ -11,8 +11,8 @@ description: >-
|
||||||
Consul enables automation of network configurations, service discovery, and secure network connectivity across any
|
Consul enables automation of network configurations, service discovery, and secure network connectivity across any
|
||||||
cloud or runtime.
|
cloud or runtime.
|
||||||
|
|
||||||
Consul utilizes a lightweight gossip and RPC system which provides various essential features. Both of these systems
|
Consul uses a lightweight gossip and RPC system which provides various essential features. Both of these systems
|
||||||
provide security mechanisms which should be utilized to enable confidentiality, integrity and authentication.
|
provide security mechanisms which should be used to enable confidentiality, integrity and authentication.
|
||||||
|
|
||||||
Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on
|
Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on
|
||||||
your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version.
|
your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version.
|
||||||
|
@ -157,7 +157,7 @@ environment and adapt these configurations accordingly.
|
||||||
environments. Consul OSS clusters always operate within the “default” namespace.
|
environments. Consul OSS clusters always operate within the “default” namespace.
|
||||||
|
|
||||||
- **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip
|
- **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip
|
||||||
communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster utilizing
|
communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster using
|
||||||
AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192,
|
AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192,
|
||||||
or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen`
|
or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen`
|
||||||
command. This key should be
|
command. This key should be
|
||||||
|
|
|
@ -9,7 +9,7 @@ description: >-
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security
|
Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security
|
||||||
infrastructure tasks for network, security, and operations teams. NIA utilizes [Terraform](https://www.terraform.io/)
|
infrastructure tasks for network, security, and operations teams. NIA uses [Terraform](https://www.terraform.io/)
|
||||||
to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs.
|
to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs.
|
||||||
|
|
||||||
### Personas
|
### Personas
|
||||||
|
|
Loading…
Reference in New Issue