Skip to content

Commit 87b5008

Browse files
Fix broken links in documentation (#425)
1 parent 555158e commit 87b5008

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -376,7 +376,7 @@ There are two ways to configure a Hazelcast Node.js client:
376376
* Programmatically
377377
* Declaratively (JSON)
378378

379-
This section describes some network configuration settings to cover common use cases in connecting the client to a cluster. See the [Configuration Overview section](#configuration-overview)
379+
This section describes some network configuration settings to cover common use cases in connecting the client to a cluster. See the [Configuration Overview section](#3-configuration-overview)
380380
and the following sections for information about detailed network configurations and/or additional features of Hazelcast Node.js client configuration.
381381

382382
An easy way to configure your Hazelcast Node.js client is to create a `ClientConfig` object and set the appropriate options. Then you can
@@ -1330,7 +1330,7 @@ Its default value is `3000` milliseconds.
13301330
You can use TLS/SSL to secure the connection between the clients and members. If you want to enable TLS/SSL
13311331
for the client-cluster connection, you should set an SSL configuration. Please see [TLS/SSL section](#61-tlsssl).
13321332

1333-
As explained in the [TLS/SSL section](#61-tlsssl), Hazelcast members have key stores used to identify themselves (to other members) and Hazelcast Node.js clients have certificate authorities used to define which members they can trust. Hazelcast has the mutual authentication feature which allows the Node.js clients also to have their private keys and public certificates, and members to have their certificate authorities so that the members can know which clients they can trust. See the [Mutual Authentication section](#13-mutual-authentication).
1333+
As explained in the [TLS/SSL section](#61-tlsssl), Hazelcast members have key stores used to identify themselves (to other members) and Hazelcast Node.js clients have certificate authorities used to define which members they can trust. Hazelcast has the mutual authentication feature which allows the Node.js clients also to have their private keys and public certificates, and members to have their certificate authorities so that the members can know which clients they can trust. See the [Mutual Authentication section](#613-mutual-authentication).
13341334

13351335
## 5.8. Enabling Hazelcast Cloud Discovery
13361336

@@ -1531,7 +1531,7 @@ exports.SSLFactory = SSLFactory;
15311531
The client loads `MyFactory.js` at runtime and creates an instance of `SSLFactory`. It then calls the method `init` with
15321532
the properties section in the JSON configuration file. Lastly, the client calls the method `getSSLOptions` of `SSLFactory` to create the `options` object.
15331533

1534-
For information about the path resolution, see the [Loading Objects and Path Resolution section](#3-loading-objects-and-path-resolution).
1534+
For information about the path resolution, see the [Loading Objects and Path Resolution section](#33-loading-objects-and-path-resolution).
15351535

15361536

15371537
# 7. Using Node.js Client with Hazelcast IMDG
@@ -1546,7 +1546,7 @@ Promises provide a better way of working with callbacks. You can chain asynchron
15461546

15471547
If you are ready to go, let's start to use Hazelcast Node.js client.
15481548

1549-
The first step is the configuration. You can configure the Node.js client declaratively or programmatically. We will use the programmatic approach throughout this chapter. See the [Programmatic Configuration section](#programmatic-configuration) for details.
1549+
The first step is the configuration. You can configure the Node.js client declaratively or programmatically. We will use the programmatic approach throughout this chapter. See the [Programmatic Configuration section](#311-programmatic-configuration) for details.
15501550

15511551
The following is an example on how to create a `ClientConfig` object and configure it programmatically:
15521552

@@ -1616,13 +1616,13 @@ There are two main failure cases you should be aware of. Below sections explain
16161616

16171617
While the client is trying to connect initially to one of the members in the `ClientNetworkConfig.addressList`, all the members might not be available. Instead of giving up, throwing an error and stopping the client, the client will retry as many as `connectionAttemptLimit` times.
16181618

1619-
You can configure `connectionAttemptLimit` for the number of times you want the client to retry connecting. See the [Setting Connection Attempt Limit section](#5-setting-connection-attempt-limit).
1619+
You can configure `connectionAttemptLimit` for the number of times you want the client to retry connecting. See the [Setting Connection Attempt Limit section](#55-setting-connection-attempt-limit).
16201620

16211621
The client executes each operation through the already established connection to the cluster. If this connection(s) disconnects or drops, the client will try to reconnect as configured.
16221622

16231623
### 7.3.2. Handling Retry-able Operation Failure
16241624

1625-
While sending the requests to the related members, the operations can fail due to various reasons. Read-only operations are retried by default. If you want to enable retrying for the other operations, you can set the `redoOperation` to `true`. See the [Enabling Redo Operation section](#3-enabling-redo-operation).
1625+
While sending the requests to the related members, the operations can fail due to various reasons. Read-only operations are retried by default. If you want to enable retrying for the other operations, you can set the `redoOperation` to `true`. See the [Enabling Redo Operation section](#53-enabling-redo-operation).
16261626

16271627
You can set a timeout for retrying the operations sent to a member. This can be provided by using the property `hazelcast.client.invocation.timeout.seconds` in `ClientConfig.properties`. The client will retry an operation within this given period, of course, if it is a read-only operation or you enabled the `redoOperation` as stated in the above paragraph. This timeout value is important when there is a failure resulted by either of the following causes:
16281628

0 commit comments

Comments
 (0)