You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -376,7 +376,7 @@ There are two ways to configure a Hazelcast Node.js client:
376
376
* Programmatically
377
377
* Declaratively (JSON)
378
378
379
-
This section describes some network configuration settings to cover common use cases in connecting the client to a cluster. See the [Configuration Overview section](#configuration-overview)
379
+
This section describes some network configuration settings to cover common use cases in connecting the client to a cluster. See the [Configuration Overview section](#3-configuration-overview)
380
380
and the following sections for information about detailed network configurations and/or additional features of Hazelcast Node.js client configuration.
381
381
382
382
An easy way to configure your Hazelcast Node.js client is to create a `ClientConfig` object and set the appropriate options. Then you can
@@ -1330,7 +1330,7 @@ Its default value is `3000` milliseconds.
1330
1330
You can use TLS/SSL to secure the connection between the clients and members. If you want to enable TLS/SSL
1331
1331
for the client-cluster connection, you should set an SSL configuration. Please see [TLS/SSL section](#61-tlsssl).
1332
1332
1333
-
As explained in the [TLS/SSL section](#61-tlsssl), Hazelcast members have key stores used to identify themselves (to other members) and Hazelcast Node.js clients have certificate authorities used to define which members they can trust. Hazelcast has the mutual authentication feature which allows the Node.js clients also to have their private keys and public certificates, and members to have their certificate authorities so that the members can know which clients they can trust. See the [Mutual Authentication section](#13-mutual-authentication).
1333
+
As explained in the [TLS/SSL section](#61-tlsssl), Hazelcast members have key stores used to identify themselves (to other members) and Hazelcast Node.js clients have certificate authorities used to define which members they can trust. Hazelcast has the mutual authentication feature which allows the Node.js clients also to have their private keys and public certificates, and members to have their certificate authorities so that the members can know which clients they can trust. See the [Mutual Authentication section](#613-mutual-authentication).
The client loads `MyFactory.js` at runtime and creates an instance of `SSLFactory`. It then calls the method `init` with
1532
1532
the properties section in the JSON configuration file. Lastly, the client calls the method `getSSLOptions` of `SSLFactory` to create the `options` object.
1533
1533
1534
-
For information about the path resolution, see the [Loading Objects and Path Resolution section](#3-loading-objects-and-path-resolution).
1534
+
For information about the path resolution, see the [Loading Objects and Path Resolution section](#33-loading-objects-and-path-resolution).
1535
1535
1536
1536
1537
1537
# 7. Using Node.js Client with Hazelcast IMDG
@@ -1546,7 +1546,7 @@ Promises provide a better way of working with callbacks. You can chain asynchron
1546
1546
1547
1547
If you are ready to go, let's start to use Hazelcast Node.js client.
1548
1548
1549
-
The first step is the configuration. You can configure the Node.js client declaratively or programmatically. We will use the programmatic approach throughout this chapter. See the [Programmatic Configuration section](#programmatic-configuration) for details.
1549
+
The first step is the configuration. You can configure the Node.js client declaratively or programmatically. We will use the programmatic approach throughout this chapter. See the [Programmatic Configuration section](#311-programmatic-configuration) for details.
1550
1550
1551
1551
The following is an example on how to create a `ClientConfig` object and configure it programmatically:
1552
1552
@@ -1616,13 +1616,13 @@ There are two main failure cases you should be aware of. Below sections explain
1616
1616
1617
1617
While the client is trying to connect initially to one of the members in the `ClientNetworkConfig.addressList`, all the members might not be available. Instead of giving up, throwing an error and stopping the client, the client will retry as many as `connectionAttemptLimit` times.
1618
1618
1619
-
You can configure `connectionAttemptLimit` for the number of times you want the client to retry connecting. See the [Setting Connection Attempt Limit section](#5-setting-connection-attempt-limit).
1619
+
You can configure `connectionAttemptLimit` for the number of times you want the client to retry connecting. See the [Setting Connection Attempt Limit section](#55-setting-connection-attempt-limit).
1620
1620
1621
1621
The client executes each operation through the already established connection to the cluster. If this connection(s) disconnects or drops, the client will try to reconnect as configured.
1622
1622
1623
1623
### 7.3.2. Handling Retry-able Operation Failure
1624
1624
1625
-
While sending the requests to the related members, the operations can fail due to various reasons. Read-only operations are retried by default. If you want to enable retrying for the other operations, you can set the `redoOperation` to `true`. See the [Enabling Redo Operation section](#3-enabling-redo-operation).
1625
+
While sending the requests to the related members, the operations can fail due to various reasons. Read-only operations are retried by default. If you want to enable retrying for the other operations, you can set the `redoOperation` to `true`. See the [Enabling Redo Operation section](#53-enabling-redo-operation).
1626
1626
1627
1627
You can set a timeout for retrying the operations sent to a member. This can be provided by using the property `hazelcast.client.invocation.timeout.seconds` in `ClientConfig.properties`. The client will retry an operation within this given period, of course, if it is a read-only operation or you enabled the `redoOperation` as stated in the above paragraph. This timeout value is important when there is a failure resulted by either of the following causes:
0 commit comments