mirror of
https://github.com/fosrl/docs-v2.git
synced 2026-03-06 18:56:45 +00:00
Rename to nodes
This commit is contained in:
@@ -3,7 +3,7 @@ title: "Pangolin vs. Reverse Proxy"
|
||||
description: "Learn how Pangolin's distributed architecture eliminates single points of failure and provides authenticated access to your applications"
|
||||
---
|
||||
|
||||
Pangolin builds upon traditional reverse proxy principles but adds distributed architecture, tunneling, and identity-aware access control. While traditional reverse proxies are typically single-server solutions, Pangolin operates as a distributed network of points of presence that provide highly-available access to your applications.
|
||||
Pangolin builds upon traditional reverse proxy principles but adds distributed architecture, tunneling, and identity-aware access control. While traditional reverse proxies are typically single-server solutions, Pangolin operates as a distributed network of nodes that provide highly-available access to your applications.
|
||||
|
||||
## Traditional Reverse Proxy Limitations
|
||||
|
||||
@@ -33,11 +33,11 @@ Pangolin provides high availability at two critical layers: ingress points and b
|
||||
|
||||
<Steps>
|
||||
<Step title="Ingress Routing">
|
||||
Request is routed to the closest available point of presence. If one goes down, there is always another point available.
|
||||
Request is routed to the closest available node. If one goes down, there is always another point available.
|
||||
</Step>
|
||||
|
||||
<Step title="Authentication">
|
||||
User identity is verified at the point of presence before getting routed to your backend.
|
||||
User identity is verified at the node before getting routed to your backend.
|
||||
</Step>
|
||||
|
||||
<Step title="Tunnel Selection">
|
||||
@@ -54,7 +54,7 @@ Pangolin provides high availability at two critical layers: ingress points and b
|
||||
</Steps>
|
||||
|
||||
<Info>
|
||||
This dual-layer approach ensures your applications remain accessible even if individual points of presence or tunnel connections fail.
|
||||
This dual-layer approach ensures your applications remain accessible even if individual nodes or tunnel connections fail.
|
||||
</Info>
|
||||
|
||||
## Key Differences
|
||||
@@ -110,5 +110,5 @@ Unlike traditional reverse proxies, Pangolin authenticates every single request,
|
||||
| **Scalability** | Manual scaling | Automatic regional distribution |
|
||||
|
||||
<Card title="Try Pangolin Cloud" icon="rocket" href="https://pangolin.fossorial.io/auth/signup">
|
||||
Get distributed, authenticated access to your applications with Pangolin's regional network of points of presence.
|
||||
Get distributed, authenticated access to your applications with Pangolin's regional network of nodes.
|
||||
</Card>
|
||||
|
||||
Reference in New Issue
Block a user