Soften language by replacing utilize with use

This commit is contained in:
Kent 'picat' Gruber 2020-11-05 15:59:53 -05:00
parent 8c2f2ca806
commit e51dbbf529
2 changed files with 4 additions and 4 deletions

View File

@ -11,8 +11,8 @@ description: >-
Consul enables automation of network configurations, service discovery, and secure network connectivity across any Consul enables automation of network configurations, service discovery, and secure network connectivity across any
cloud or runtime. cloud or runtime.
Consul utilizes a lightweight gossip and RPC system which provides various essential features. Both of these systems Consul uses a lightweight gossip and RPC system which provides various essential features. Both of these systems
provide security mechanisms which should be utilized to enable confidentiality, integrity and authentication. provide security mechanisms which should be used to enable confidentiality, integrity and authentication.
Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on Using defense in depth is crucial for Consul security, and deployment requirements may differ drastically depending on
your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version. your use case. Some security features for multi-tenant deployments are offered exclusively in the enterprise version.
@ -157,7 +157,7 @@ environment and adapt these configurations accordingly.
environments. Consul OSS clusters always operate within the “default” namespace. environments. Consul OSS clusters always operate within the “default” namespace.
- **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip - **Gossip Encryption** - A shared, base64-encoded 32-byte symmetric key is required to [encrypt Serf gossip
communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster utilizing communication](https://learn.hashicorp.com/tutorials/consul/gossip-encryption-secure) within a cluster using
AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192, AES GCM. The key size determines which AES encryption types to use; 16, 24, or 32 bytes to select AES-128, AES-192,
or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen` or AES-256 respectively. 32-byte keys are ultimately preferable and is the default size generated by the `keygen`
command. This key should be command. This key should be

View File

@ -9,7 +9,7 @@ description: >-
## Overview ## Overview
Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security Consul Network Infrastructure Automation (NIA) enables declarative workflows to handle Day-2 network security
infrastructure tasks for network, security, and operations teams. NIA utilizes [Terraform](https://www.terraform.io/) infrastructure tasks for network, security, and operations teams. NIA uses [Terraform](https://www.terraform.io/)
to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs. to propagate Consul catalog changes, and relevant configuration to network appliances, or network APIs.
### Personas ### Personas