The server rejected the handshake.
Not because the service was down, but because the TLS configuration was wrong. A single mismatch in protocol settings, a weak cipher still enabled, or a certificate chain not trusted—and the discovery process stalls. This is the silent killer of service mesh connectivity, API gateway routing, and cross-cluster federation. You can’t afford to guess. You need to know exactly how your discovery TLS configuration is set, and you need that answer fast.
What Discovery TLS Configuration Really Means
In every modern system, service-to-service communication is more than just sending packets. Discovery mechanisms—whether DNS-based, control-plane driven, or static registry—rely on TLS to secure the handshake and authenticate both sides. “Discovery TLS configuration” is the exact set of rules, versions, and certificates that glue this together. This includes TLS protocols (1.2, 1.3), cipher suites, server name indications (SNI), trust stores, and mTLS policies. Get it wrong, and your discovery system fails silently or falls back to unsafe defaults.
Why It Breaks
Most problems come from mismatched expectations between the client and server. The client expects TLS 1.3, the server only allows TLS 1.2. The client trusts a root CA that isn’t in the server’s chain. mTLS requirements are flipped on one side. Or worse, weak ciphers creep in during upgrades. Security scanners start screaming, but your discovery requests keep failing without a clear reason—until you decode the logs at 3 a.m.