Skip to content

Commit 86afd8e

Browse files
pebrceedugon
andauthored
ECK: update istio version (#694)
Recreating a change made to the original ECK asciidocs. elastic/cloud-on-k8s#8476 Co-authored-by: Edu González de la Herrán <[email protected]>
1 parent df02193 commit 86afd8e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

deploy-manage/deploy/cloud-on-k8s/k8s-service-mesh-istio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ mapped_pages:
1010

1111
The instructions in this section describe how to connect the operator and managed resources to the Istio service mesh and assume that Istio is already installed and configured on your Kubernetes cluster. To know more about Istio and how to install it, check the [product documentation](https://istio.io).
1212

13-
These instructions have been tested with Istio 1.6.1. Older or newer versions of Istio might require additional configuration steps not documented here.
13+
These instructions have been tested with Istio 1.24.3. Older or newer versions of Istio might require additional configuration steps not documented here.
1414

1515
::::{warning}
1616
Some Elastic Stack features such as [Kibana alerting and actions](/explore-analyze/alerts-cases.md) rely on the Elasticsearch API keys feature which requires TLS to be enabled at the application level. If you want to use these features, you should not disable the self-signed certificate on the Elasticsearch resource and enable `PERMISSIVE` mode for the Elasticsearch service through a `DestinationRule` or `PeerAuthentication` resource. Strict mTLS mode is currently not compatible with Elastic Stack features requiring TLS to be enabled for the Elasticsearch HTTP layer.

0 commit comments

Comments
 (0)