aboutsummaryrefslogtreecommitdiff
path: root/doc/src
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2002-11-21 06:36:08 +0000
committerTom Lane <tgl@sss.pgh.pa.us>2002-11-21 06:36:08 +0000
commit8362be35e82574801113a7fe4dfdc3037010fc04 (patch)
treeb5603e45b2956d5dc8b52f9adf2c02f9d42494ed /doc/src
parent02d83d7565bfa306f876c3fecc89a159e28e0e3b (diff)
downloadpostgresql-8362be35e82574801113a7fe4dfdc3037010fc04.tar.gz
postgresql-8362be35e82574801113a7fe4dfdc3037010fc04.zip
Code review for superuser_reserved_connections patch. Don't try to do
database access outside a transaction; revert bogus performance improvement in SIBackendInit(); improve comments; add documentation (this part courtesy Neil Conway).
Diffstat (limited to 'doc/src')
-rw-r--r--doc/src/sgml/runtime.sgml55
1 files changed, 39 insertions, 16 deletions
diff --git a/doc/src/sgml/runtime.sgml b/doc/src/sgml/runtime.sgml
index 70b29118a22..7ecd951a3b9 100644
--- a/doc/src/sgml/runtime.sgml
+++ b/doc/src/sgml/runtime.sgml
@@ -1,5 +1,5 @@
<!--
-$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.157 2002/11/21 00:42:18 tgl Exp $
+$Header: /cvsroot/pgsql/doc/src/sgml/runtime.sgml,v 1.158 2002/11/21 06:36:08 tgl Exp $
-->
<Chapter Id="runtime">
@@ -1903,6 +1903,28 @@ dynamic_library_path = '/usr/local/lib/postgresql:/home/my_project/lib:$libdir'
</varlistentry>
<varlistentry>
+ <term><varname>SUPERUSER_RESERVED_CONNECTIONS</varname>
+ (<type>integer</type>)</term>
+ <listitem>
+ <para>
+ Determines the number of <quote>connection slots</quote> that
+ are reserved for connections by <productname>PostgreSQL</>
+ superusers. At most <varname>max_connections</> connections can
+ ever be active simultaneously. Whenever the number of active
+ concurrent connections is at least <varname>max_connections</> minus
+ <varname>superuser_reserved_connections</varname>, new connections
+ will be accepted only from superuser accounts.
+ </para>
+
+ <para>
+ The default value is 2. The value must be less than the value of
+ <varname>max_connections</varname>. This parameter can only be
+ set at server start.
+ </para>
+ </listitem>
+ </varlistentry>
+
+ <varlistentry>
<term><varname>TCPIP_SOCKET</varname> (<type>boolean</type>)</term>
<listitem>
<para>
@@ -2952,24 +2974,25 @@ $ <userinput>kill -INT `head -1 /usr/local/pgsql/data/postmaster.pid`</userinput
</para>
<para>
- With SSL support compiled in, the <productname>PostgreSQL</> server
- can be started with SSL support by setting the parameter
- <varname>ssl</varname> to on in
- <filename>postgresql.conf</filename>. When starting in SSL mode,
- the server will look for the files <filename>server.key</> and
- <filename>server.crt</> in the data directory. These files should
- contain the server private key and certificate respectively. These
- files must be set up correctly before an SSL-enabled server can
- start. If the private key is protected with a passphrase, the
- server will prompt for the passphrase and will not start until it
- has been entered.
+ With <acronym>SSL</> support compiled in, the
+ <productname>PostgreSQL</> server can be started with
+ <acronym>SSL</> support by setting the parameter
+ <varname>ssl</varname> to on in <filename>postgresql.conf</>. When
+ starting in <acronym>SSL</> mode, the server will look for the
+ files <filename>server.key</> and <filename>server.crt</> in the
+ data directory. These files should contain the server private key
+ and certificate respectively. These files must be set up correctly
+ before an <acronym>SSL</>-enabled server can start. If the private key is
+ protected with a passphrase, the server will prompt for the
+ passphrase and will not start until it has been entered.
</para>
<para>
- The server will listen for both standard and SSL connections on the
- same TCP/IP port, and will negotiate with any connecting client on
- whether to use SSL. See <xref linkend="client-authentication"> about
- how to force the server to only use of SSL for certain connections.
+ The server will listen for both standard and <acronym>SSL</>
+ connections on the same TCP/IP port, and will negotiate with any
+ connecting client on whether to use <acronym>SSL</>. See <xref
+ linkend="client-authentication"> about how to force the server to
+ require use of <acronym>SSL</> for certain connections.
</para>
<para>