Add peering incompatibility warning to upgrade docs. (#15319)
This commit is contained in:
parent
8d2ed1999d
commit
d4261c30c5
|
@ -24,7 +24,7 @@ A breaking change was made in Consul 1.14 that:
|
|||
- [Consul Connect is enabled by default.](/docs/connect) To disable, set
|
||||
[`connect.enabled`](/docs/agent/config/config-files#connect_enabled) to `false`.
|
||||
|
||||
##### Changes to gRPC TLS configuration
|
||||
#### Changes to gRPC TLS configuration
|
||||
|
||||
**Make configuration changes** if using sidecar proxies or gateways that include any of the following configuration file values:
|
||||
1. [`ports.https`](/docs/agent/config/config-files#https_port) - Encrypts gRPC in Consul 1.12 and prior
|
||||
|
@ -43,6 +43,14 @@ For most environments, the Envoy communication to Consul is loop-back only and d
|
|||
|
||||
If you already use gRPC encryption, change the existing `ports.grpc` to `ports.grpc_tls` in your configuration to ensure compatibility with future releases.
|
||||
|
||||
#### Changes to peering
|
||||
|
||||
[Cluster peering](/docs/connect/cluster-peering) was released in Consul 1.13 as an experimental feature.
|
||||
In Consul 1.14, cluster peering has been improved and is now considered stable. All experimental peering
|
||||
connections created by 1.13 should be
|
||||
[deleted](/docs/connect/cluster-peering/create-manage-peering#delete-peering-connections)
|
||||
prior to upgrading, as they will no longer be compatible with 1.14.
|
||||
|
||||
## Consul 1.13.x
|
||||
|
||||
### Service Mesh Compatibility
|
||||
|
|
Loading…
Reference in New Issue