mirror of
https://github.com/Unleash/unleash.git
synced 2025-07-31 13:47:02 +02:00
add relevant links to edge section
This commit is contained in:
parent
9506d17534
commit
1fbcb538bc
@ -195,15 +195,15 @@ With Unleash, you can architect your feature flagging solution in a way that all
|
||||
|
||||
### Use Unleash Edge for enterprise-grade data privacy
|
||||
|
||||
To take data privacy, scalability, high performance, and resiliency to the next level for large enterprises, we built Unleash Edge, a lightweight proxy layer between your Unleash API and SDKs. You can deploy Unleash Edge within your own infrastructure so PII and sensitive context data never leave your network boundary.
|
||||
To take data privacy, scalability, high performance, and resiliency to the next level for large enterprises, we built [Unleash Edge](/reference/unleash-edge), a lightweight proxy layer between your Unleash API and SDKs. You can deploy Unleash Edge within your own infrastructure so PII and sensitive context data never leave your network boundary.
|
||||
|
||||
Unleash Edge operates as a local evaluation point for feature flags, meaning that the evaluation of flags and user context data happens within your infrastructure. It takes a copy of your feature flag data locally and by default, it uses an in-memory cache to store the features it fetches from your Unleash instance. Another benefit to Edge functioning as a local evaluation point is preventing performance issues in one part of your system from affecting others and maintaining service level agreements required by compliance frameworks.
|
||||
|
||||
Edge allows you to decide what you expose to the world. You only have to expose one project (or a predefined set of projects) and environments through Edge. Nothing else will be exposed. In our cloud, if this is combined with an IP Allow List for the Unleash instance and Hosted Edge, this means you are reducing the attack surface significantly.
|
||||
Edge allows you to decide what you expose to the world. You only have to expose one project (or a predefined set of projects) and environments through Edge. Nothing else will be exposed. In our cloud, if this is combined with an [IP Allow List](#set-up-ip-allow-lists-for-enhanced-security) for the Unleash instance and Hosted Edge, this means you are reducing the attack surface significantly.
|
||||
|
||||
With Unleash Enterprise Edge, you can keep your core Unleash service hidden from the internet while evaluating feature flags at the edge for better performance and scalability. Each Edge instance can be scoped to specific projects or environments, enforcing the least privileged access and tight network segmentation. Unleash Enterprise Edge cannot access the Unleash Admin API, minimizing the impact of compromised clients or credentials.
|
||||
|
||||
When your regulated environments require continuous service availability, use persistent storage options through Redis or local backup files, ensuring your feature flag system remains operational even if the Unleash server is temporarily unreachable. Refer to our Edge Concepts for more architecture and setup information.
|
||||
When your regulated environments require continuous service availability, use persistent storage options through Redis or local backup files, ensuring your feature flag system remains operational even if the Unleash server is temporarily unreachable. Refer to our [Edge Concepts](/reference/unleash-edge/concepts) for more architecture and setup information.
|
||||
|
||||
The tutorial so far has focused on how you can use the features of Unleash to improve your application's security posture, making sure that feature flags are not the weak link. But what about Unleash itself, as a company and SaaS service? You might be asking…
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user