-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add proposal for Security Enhanced Mode #23223
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pengfeiwang-cn PTAL as well.
* variable.TiDBSlowQueryFile, | ||
* variable.TiDBSlowLogThreshold, | ||
* variable.TiDBEnableCollectExecutionInfo, | ||
* variable.TiDBMemoryUsageAlarmRatio, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wish to talk about wait_timeout
and interactive_timeout
on the cloud.
-
The TiDB's default
wait_timeout
is unlimited, but MySQL and Aurora MySQL's default are 8 hours. -
Aurora does not follow a too low
wait_timeout
andinteractive_timeout
, to avoid users' misconfiguration.
Aurora evaluates the minimum value of interactive_timeout and wait_timeout, then uses that minimum as the timeout to end all idle sessions, both interactive and noninteractive.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
.. but in Aurora's case I'm sure they let users modify these values? They just don't permit very low values (but use the semantic of ignore instead of error, which I assume is for compatibility reasons).
I think we can lower the defaults, but I don't think it needs to be grouped in with security.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, I can't get it. Cloud you explain why not ignore the very low value?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think ignoring in this context is because some connector or connection pool might set a low value, and Aurora still wants to work with it out of the box.
Unless there is a known compatibility reason (or likely reason), ignore is a risky semantic because users may think they've made a change, but it does not take effect. For example see my comment on temporary tables and read-only transactions.
So ignoring should be the exception and not the rule. In TiDB it has historically been the rule, which is problematic. My comment was about evaluating their decision here, which I think is that it looks like it might have been because of a compatibility issue.
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/lgtm |
[REVIEW NOTIFICATION] This pull request has been approved by:
To complete the pull request process, please ask the reviewers in the list to review by filling The full list of commands accepted by this bot can be found here. Reviewer can indicate their review by writing |
/merge |
This pull request has been accepted and is ready to merge. Commit hash: 0d89b0b
|
/lgtm |
/merge |
This pull request has been accepted and is ready to merge. Commit hash: d6dbc27
|
/merge |
@morgo: Your PR was out of date, I have automatically updated it for you. At the same time I will also trigger all tests for you: /run-all-tests If the CI test fails, you just re-trigger the test that failed and the bot will merge the PR for you after the CI passes. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the ti-community-infra/tichi repository. |
What problem does this PR solve?
Issue Number: Adds markdown doc for #22373
Problem Summary:
This is the design doc for security enhanced mode.
The original PR was closed because the feature was removed from Sprint 2. I have since been advised that we can add features as long as they are disabled by default, so I am reopening this. SEM is always disabled by default.
What is changed and how it works?
What's Changed:
Add a new proposal. Since it was last opened, a section for status variables has been added.
Related changes
pingcap/docs
/pingcap/docs-cn
:Check List
Tests
Side effects
Release note