Skip to content

Commit 164821b

Browse files
authored
Merge pull request kurrent-io#4151 from EventStore/yoeight/remove-pub-tcp-in-docs
[DB-657] Remove mentions of external TCP in the docs.
2 parents 6d4edee + 19263f8 commit 164821b

File tree

5 files changed

+15
-125
lines changed

5 files changed

+15
-125
lines changed

docs/configuration.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -232,24 +232,17 @@ DEFAULT OPTIONS:
232232
ADVERTISE HOST TO CLIENT AS: <empty> (<DEFAULT>)
233233
ADVERTISE HTTP PORT TO CLIENT AS: 0 (<DEFAULT>)
234234
ADVERTISE NODE PORT TO CLIENT AS: 0 (<DEFAULT>)
235-
ADVERTISE TCP PORT TO CLIENT AS: 0 (<DEFAULT>)
236235
CONNECTION PENDING SEND BYTES THRESHOLD: 10485760 (<DEFAULT>)
237236
CONNECTION QUEUE SIZE THRESHOLD: 50000 (<DEFAULT>)
238237
DISABLE ADMIN UI: False (<DEFAULT>)
239-
DISABLE EXTERNAL TCP TLS: False (<DEFAULT>)
240238
DISABLE GOSSIP ON HTTP: False (<DEFAULT>)
241239
DISABLE INTERNAL TCP TLS: False (<DEFAULT>)
242240
DISABLE STATS ON HTTP: False (<DEFAULT>)
243241
ENABLE ATOM PUB OVER HTTP: False (<DEFAULT>)
244-
ENABLE EXTERNAL TCP: False (<DEFAULT>)
245242
ENABLE TRUSTED AUTH: False (<DEFAULT>)
246243
ENABLE UNIX SOCKET: False (<DEFAULT>)
247244
EXT HOST ADVERTISE AS: <empty> (<DEFAULT>)
248245
EXT IP: 127.0.0.1 (<DEFAULT>)
249-
EXT TCP HEARTBEAT INTERVAL: 2000 (<DEFAULT>)
250-
EXT TCP HEARTBEAT TIMEOUT: 1000 (<DEFAULT>)
251-
EXT TCP PORT: 1113 (<DEFAULT>)
252-
EXT TCP PORT ADVERTISE AS: 0 (<DEFAULT>)
253246
GOSSIP ON SINGLE NODE: <empty> (<DEFAULT>)
254247
HTTP PORT: 2113 (<DEFAULT>)
255248
HTTP PORT ADVERTISE AS: 0 (<DEFAULT>)
@@ -265,8 +258,6 @@ DEFAULT OPTIONS:
265258
NODE IP: 127.0.0.1 (<DEFAULT>)
266259
NODE PORT: 2113 (<DEFAULT>)
267260
NODE PORT ADVERTISE AS: 0 (<DEFAULT>)
268-
NODE TCP PORT: 1113 (<DEFAULT>)
269-
NODE TCP PORT ADVERTISE AS: 0 (<DEFAULT>)
270261
REPLICATION HEARTBEAT INTERVAL: 700 (<DEFAULT>)
271262
REPLICATION HEARTBEAT TIMEOUT: 700 (<DEFAULT>)
272263
REPLICATION HOST ADVERTISE AS: <empty> (<DEFAULT>)

docs/installation.md

Lines changed: 10 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -160,27 +160,12 @@ The following command will start the EventStoreDB node using default HTTP port,
160160
connect to it using one of the clients and the `esdb://localhost:2113?tls=false` connection string. You can also access the Admin UI by opening http://localhost:2113 in your browser.
161161

162162
```bash:no-line-numbers
163-
docker run --name esdb-node -it -p 2113:2113 -p 1113:1113 \
163+
docker run --name esdb-node -it -p 2113:2113 \
164164
eventstore/eventstore:latest --insecure --run-projections=All
165165
--enable-atom-pub-over-http
166166
```
167167

168-
If you want to start the node with legacy TCP client protocol enabled, add the following:
169-
170-
```bash:no-line-numbers
171-
docker run --name esdb-node -it -p 2113:2113 -p 1113:1113 \
172-
eventstore/eventstore:latest --insecure --run-projections=All \
173-
--enable-external-tcp --enable-atom-pub-over-http
174-
```
175-
176-
::: warning
177-
The legacy TCP protocol will no longer be available from 24.2.
178-
:::
179-
180-
The command above runs EventStoreDB as a single node without SSL and with the legacy TCP protocol
181-
enabled, so you can try out your existing apps with the latest database version.
182-
183-
Then, you'd be able to connect to EventStoreDB with gRPC and TCP clients. Also, the Stream Browser will work
168+
Then, you'd be able to connect to EventStoreDB with gRPC clients. Also, the Stream Browser will work
184169
in the Admin UI.
185170

186171
In order to sustainably keep the data, we also recommend mapping the database and index volumes.
@@ -241,22 +226,21 @@ docker-compose up
241226

242227
Watching the log messages, you will see that after some time, the elections process completes. Then you're able to connect to each
243228
node using the Admin UI. Nodes should be accessible on the loopback address (`127.0.0.1` or `localhost`) over
244-
HTTP and TCP, using ports specified below:
229+
HTTP, using ports specified below:
245230

246-
| Node | TCP port | HTTP port |
247-
| :---- | :------- | :-------- |
248-
| node1 | 1111 | 2111 |
249-
| node2 | 1112 | 2112 |
250-
| node3 | 1113 | 2113 |
231+
| Node | HTTP port |
232+
| :---- | :-------- |
233+
| node1 | 2111 |
234+
| node2 | 2112 |
235+
| node3 | 2113 |
251236

252-
You have to tell your client to use secure connection for both TCP and gRPC.
237+
You have to tell your client to use secure connection.
253238

254239
| Protocol | Connection string |
255240
| :------- | :---------------------------------------------------------------------------------------------------- |
256-
| TCP | `GossipSeeds=localhost:1111,localhost:1112,localhost:1113;ValidateServer=False;UseSslConnection=True` |
257241
| gRPC | `esdb://localhost:2111,localhost:2112,localhost:2113?tls=true&tlsVerifyCert=false` |
258242

259-
As you might've noticed, both connection strings have a setting to disable the certificate validation (`ValidateServer=False` for `TCP` and `tlsVerifyCert=false` for `gRPC`). It would prevent the invalid certificate error since the cluster uses a private, auto-generated CA.
243+
As you might've noticed, the connection string has a setting to disable the certificate validation (`tlsVerifyCert=false`). It would prevent the invalid certificate error since the cluster uses a private, auto-generated CA.
260244

261245
However, **we do not recommend using this setting in production**. Instead, you can either add the CA certificate to the trusted root CA store or instruct your application to use such a certificate. See the [security section](security.md#certificate-installation-on-a-client-environment) for detailed instructions.
262246

@@ -266,7 +250,6 @@ Depending on how your EventStoreDB instance is configured, some features might n
266250

267251
| Feature | Options impact |
268252
| :---------------------------- | :-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
269-
| Connection for TCP clients | External TCP is disabled by default. You need to enable it explicitly by using the `EnableExternalTcp` option. |
270253
| Connection without SSL or TLS | EventStoreDB 20.6+ is secure by default. Your clients need to establish a secure connection, unless you use the `Insecure` option. |
271254
| Authentication and ACLs | When using the `Insecure` option for the server, all security is disabled. The `Users` menu item is also disabled in the Admin UI. |
272255
| Projections | Running projections is disabled by default and the `Projections` menu item is disabled in the Admin UI. You need to enable projections explicitly by using the `RunProjections` option. |

docs/networking.md

Lines changed: 4 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ title: Networking
66

77
EventStoreDB provides two interfaces:
88
- HTTP(S) for gRPC communication and REST APIs
9-
- TCP for cluster replication (internal) and legacy clients (external)
9+
- TCP for cluster replication (internal)
1010

1111
Nodes in the cluster replicate with each other using the TCP protocol, but use gRPC for [discovering other cluster nodes](cluster.md#discovering-cluster-members).
1212

@@ -136,7 +136,7 @@ This is configured with `Kestrel.Limits.Http2.InitialStreamWindowSize` in the se
136136

137137
## TCP configuration
138138

139-
The TCP protocol is used internally for cluster nodes to replicate with each other. It happens over the [internal](#internal) TCP communication. In addition, you can enable [external](#external) TCP if you use the TCP client library in your applications.
139+
The TCP protocol is used internally for cluster nodes to replicate with each other. It happens over the [internal](#internal) TCP communication.
140140

141141
### Internal
142142

@@ -172,32 +172,6 @@ By default, EventStoreDB uses port `1112` for internal TCP. You can change this
172172
Please note that the `IntTcpPort` parameter has been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `ReplicationPort` parameter instead.
173173
:::
174174

175-
### External
176-
177-
By default, TCP protocol is not exposed externally. If you use a TCP client library in your applications, you need to enable external TCP explicitly using the setting below.
178-
179-
| Format | Syntax |
180-
|:---------------------|:---------------------------------|
181-
| Command line | `--enable-external-tcp` |
182-
| YAML | `EnableExternalTcp` |
183-
| Environment variable | `EVENTSTORE_ENABLE_EXTERNAL_TCP` |
184-
185-
**Default**: `false`, TCP is disabled externally.
186-
187-
When enabled, the external TCP will be exposed on the `NodeIp` address (described [here](#http-configuration)) using port `1113`. You can change the external TCP port using the `NodeTcpPort` setting.
188-
189-
| Format | Syntax |
190-
|:---------------------|:--------------------------|
191-
| Command line | `--node-tcp-port` |
192-
| YAML | `NodeTcpPort` |
193-
| Environment variable | `EVENTSTORE_NODE_TCP_PORT`|
194-
195-
**Default**: `1113`
196-
197-
::: warning
198-
Please note that the `ExtTcpPort` parameter has been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `NodeTcpPort` parameter instead.
199-
:::
200-
201175
### Security
202176

203177
When the node is secured (by default), all the TCP traffic will use TLS. You can disable TLS for TCP internally and externally using the settings described below.
@@ -210,15 +184,7 @@ When the node is secured (by default), all the TCP traffic will use TLS. You can
210184

211185
**Default**: `false`
212186

213-
| Format | Syntax |
214-
|:---------------------|:--------------------------------------|
215-
| Command line | `--disable-external-tcp-tls` |
216-
| YAML | `DisableExternalTcpTls` |
217-
| Environment variable | `EVENTSTORE_DISABLE_EXTERNAL_TCP_TLS` |
218-
219-
**Default**: `false`
220-
221-
If your network setup requires any kind of IP address, DNS name and port translation for internal or external communication, you can use available [address translation](#network-address-translation) settings.
187+
If your network setup requires any kind of IP address, DNS name and port translation for internal communication, you can use available [address translation](#network-address-translation) settings.
222188

223189
## Network address translation
224190

@@ -268,14 +234,8 @@ Both internal and external TCP ports can be advertised using custom values:
268234
| YAML | `ReplicationTcpPortAdvertiseAs` |
269235
| Environment variable | `EVENTSTORE_REPLICATION_TCP_PORT_ADVERTISE_AS`|
270236

271-
| Format | Syntax |
272-
|:---------------------|:---------------------------------------|
273-
| Command line | `--node-tcp-port-advertise-as` |
274-
| YAML | `NodeTcpPortAdvertiseAs` |
275-
| Environment variable | `EVENTSTORE_NODE_TCP_PORT_ADVERTISE_AS`|
276-
277237
::: warning
278-
Please note that the `IntTcpPortAdvertiseAs` and `ExtTcpPortAdvertiseAs` parameters have been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `ReplicationTcpPortAdvertiseAs` and `NodeTcpPortAdvertiseAs` parameters instead, respectively.
238+
Please note that the `IntTcpPortAdvertiseAs` parameter has been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `ReplicationTcpPortAdvertiseAs` and `NodeTcpPortAdvertiseAs` parameters instead, respectively.
279239
:::
280240

281241
If you want to change how the node TCP address is advertised internally, use the `ReplicationHostAdvertiseAs` setting (previously `IntHostAdvertiseAs` setting). You can use an IP address or a hostname.
@@ -290,8 +250,6 @@ If you want to change how the node TCP address is advertised internally, use the
290250
Please note that the `IntHostAdvertiseAs` parameter has been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `ReplicationHostAdvertiseAs` parameter instead.
291251
:::
292252

293-
Externally, TCP is advertised using the address specified in the `NodeIp` or `NodeHostAdvertiseAs` (as for HTTP).
294-
295253
### Advertise to clients
296254

297255
In some cases, the cluster needs to advertise itself to clients using a completely different set of addresses and ports. Usually, you need to do it because addresses and ports configured for the HTTP protocol are not available as-is to the outside world. One of the examples is running a cluster in Docker Compose. In such environment, HTTP uses internal hostnames in the Docker network, which isn't accessible on the host. So, in order to connect to the cluster from the host machine, you need to use `localhost` and translated HTTP ports to reach the cluster nodes.
@@ -318,14 +276,6 @@ Specify the advertised HTTP(S) port (previously `AdvertiseHttpPortToClientAs` se
318276
Please note that the `AdvertiseHttpPortToClientAs` parameter has been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `AdvertiseNodePortToClientAs` parameter instead.
319277
:::
320278

321-
Specify the advertised TCP port (only if external TCP is enabled):
322-
323-
| Format | Syntax |
324-
|:---------------------|:---------------------------------------------|
325-
| Command line | `--advertise-tcp-port-to-client-as` |
326-
| YAML | `AdvertiseTcpPortToClientAs` |
327-
| Environment variable | `EVENTSTORE_ADVERTISE_TCP_PORT_TO_CLIENT_AS` |
328-
329279
## Heartbeat timeouts
330280

331281
EventStoreDB uses heartbeats over all TCP connections to discover dead clients and nodes. Heartbeat timeouts should not be too short, as short timeouts will produce false positives. At the same time, setting too long timeouts will prevent discovering dead nodes and clients in time.
@@ -365,28 +315,6 @@ Replication/Internal TCP heartbeat (between cluster nodes):
365315
Please note that the `IntTcpHeartbeatInterval` and `IntTcpHeartbeatTimeout` parameters have been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `ReplicationHeartbeatInterval` and `ReplicationHeartbeatTimeout` parameters instead, respectively.
366316
:::
367317

368-
Node/External TCP heartbeat (between client and server):
369-
370-
| Format | Syntax |
371-
|:---------------------|:------------------------------------|
372-
| Command line | `--node-heartbeat-interval` |
373-
| YAML | `NodeHeartbeatInterval` |
374-
| Environment variable | `EVENTSTORE_NODE_HEARTBEAT_INTERVAL`|
375-
376-
**Default**: `2000` (ms)
377-
378-
| Format | Syntax |
379-
|:---------------------|:-----------------------------------|
380-
| Command line | `--node-heartbeat-timeout` |
381-
| YAML | `NodeHeartbeatTimeout` |
382-
| Environment variable | `EVENTSTORE_NODE_HEARTBEAT_TIMEOUT`|
383-
384-
**Default**: `1000` (ms)
385-
386-
::: warning
387-
Please note that the `ExtTcpHeartbeatInterval` and `ExtTcpHeartbeatTimeout` parameters have been deprecated as of version 23.10.0 and will be removed in future versions. It is recommended to use the `NodeHeartbeatInterval` and `NodeHeartbeatTimeout` parameters instead, respectively.
388-
:::
389-
390318
### gRPC heartbeats
391319

392320
For the gRPC heartbeats, EventStoreDB and its gRPC clients use the protocol feature called _Keepalive ping_. Read more about it on the [HTTP configuration page](#keep-alive-pings).

docs/security.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -571,14 +571,6 @@ You can, however, disable TLS for both internal and external TCP.
571571

572572
**Default**: `false`
573573

574-
| Format | Syntax |
575-
|:---------------------|:--------------------------------------|
576-
| Command line | `--disable-external-tcp-tls` |
577-
| YAML | `DisableExternalTcpTls` |
578-
| Environment variable | `EVENTSTORE_DISABLE_EXTERNAL_TCP_TLS` |
579-
580-
**Default**: `false`
581-
582574
## Authentication
583575

584576
EventStoreDB supports authentication based on usernames and passwords out of the box. The Enterprise version

docs/upgrade-guide.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -88,19 +88,15 @@ Follow the [upgrade procedure](#upgrade-procedure) and ensure that the Leader no
8888

8989
### Deprecated configuration options
9090

91-
Several options are deprecated and slated for removal in version 24.10 next year. See the table below for guidance.
91+
Several options are deprecated and slated for removal in future releases. See the table below for guidance.
9292

9393
| Deprecated Option | Use Instead |
9494
|:------------------|:-------------|
9595
| ExtIp | NodeIp |
9696
| ExtPort | NodePort |
97-
| ExtTcpPort | NodeTcpPort |
9897
| HttpPortAdvertiseAs | NodePortAdvertiseAs |
9998
| ExtHostAdvertiseAs | NodeHostAdvertiseAs |
100-
| ExtTcpPortAdvertiseAs | NodeTcpPortAdvertiseAs |
10199
| AdvertiseHttpPortToClientAs | AdvertiseNodePortToClientAs |
102-
| ExtTcpHeartbeatTimeout | NodeHeartbeatTimeout |
103-
| ExtTcpHeartbeatInterval | NodeHeartbeatInterval |
104100
| IntIp | ReplicationIp |
105101
| IntTcpPort | ReplicationTcpPort |
106102
| IntTcpPortAdvertiseAs | ReplicationTcpPortAdvertiseAs |

0 commit comments

Comments
 (0)