text stringlengths 0 59.1k |
|---|
# More advanced defaults below: |
# protocol: TLS |
# algorithm: SunX509 |
# store_type: JKS |
# cipher_suites: [TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA] |
# internode_compression controls whether traffic between nodes is |
# compressed. |
# can be: all - all traffic is compressed |
# dc - traffic between different datacenters is compressed |
# none - nothing is compressed. |
internode_compression: all |
# Enable or disable tcp_nodelay for inter-dc communication. |
# Disabling it will result in larger (but fewer) network packets being sent, |
# reducing overhead from the TCP protocol itself, at the cost of increasing |
# latency if you block for cross-datacenter responses. |
inter_dc_tcp_nodelay: false |
# TTL for different trace types used during logging of the repair process. |
tracetype_query_ttl: 86400 |
tracetype_repair_ttl: 604800 |
# GC Pauses greater than gc_warn_threshold_in_ms will be logged at WARN level |
# Adjust the threshold based on your application throughput requirement |
# By default, Cassandra logs GC Pauses greater than 200 ms at INFO level |
gc_warn_threshold_in_ms: 1000 |
# UDFs (user defined functions) are disabled by default. |
# As of Cassandra 3.0 there is a sandbox in place that should prevent execution of evil code. |
enable_user_defined_functions: false |
# Enables scripted UDFs (JavaScript UDFs). |
# Java UDFs are always enabled, if enable_user_defined_functions is true. |
# Enable this option to be able to use UDFs with "language javascript" or any custom JSR-223 provider. |
# This option has no effect, if enable_user_defined_functions is false. |
enable_scripted_user_defined_functions: false |
# The default Windows kernel timer and scheduling resolution is 15.6ms for power conservation. |
# Lowering this value on Windows can provide much tighter latency and better throughput, however |
# some virtualized environments may see a negative performance impact from changing this setting |
# below their system default. The sysinternals 'clockres' tool can confirm your system's default |
# setting. |
windows_timer_interval: 1 |
# Enables encrypting data at-rest (on disk). Different key providers can be plugged in, but the default reads from |
# a JCE-style keystore. A single keystore can hold multiple keys, but the one referenced by |
# the "key_alias" is the only key that will be used for encrypt operations; previously used keys |
# can still (and should!) be in the keystore and will be used on decrypt operations |
# (to handle the case of key rotation). |
# |
# It is strongly recommended to download and install Java Cryptography Extension (JCE) |
# Unlimited Strength Jurisdiction Policy Files for your version of the JDK. |
# (current link: http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html) |
# |
# Currently, only the following file types are supported for transparent data encryption, although |
# more are coming in future cassandra releases: commitlog, hints |
transparent_data_encryption_options: |
enabled: false |
chunk_length_kb: 64 |
cipher: AES/CBC/PKCS5Padding |
key_alias: testing:1 |
# CBC IV length for AES needs to be 16 bytes (which is also the default size) |
# iv_length: 16 |
key_provider: |
- class_name: org.apache.cassandra.security.JKSKeyProvider |
parameters: |
- keystore: conf/.keystore |
keystore_password: cassandra |
store_type: JCEKS |
key_password: cassandra |
<|endoftext|> |
# source: k8s_examples/databases/cassandra/java/README.md type: docs |
# Cassandra on Kubernetes Custom Seed Provider: releases.k8s.io/HEAD |
Within any deployment of Cassandra a Seed Provider is used for node discovery and communication. When a Cassandra node first starts it must discover which nodes, or seeds, for the information about the Cassandra nodes in the ring / rack / datacenter. |
This Java project provides a custom Seed Provider which communicates with the Kubernetes API to discover the required information. This provider is bundled with the Docker provided in this example. |
# Configuring the Seed Provider |
The following environment variables may be used to override the default configurations: |
| ENV VAR | DEFAULT VALUE | NOTES | |
| ------------- |:-------------: |:-------------:| |
| KUBERNETES_PORT_443_TCP_ADDR | kubernetes.default.svc.cluster.local | The hostname of the API server | |
| KUBERNETES_PORT_443_TCP_PORT | 443 | API port number | |
| CASSANDRA_SERVICE | cassandra | Default service name for lookup | |
| POD_NAMESPACE | default | Default pod service namespace | |
| K8S_ACCOUNT_TOKEN | /var/run/secrets/kubernetes.io/serviceaccount/token | Default path to service token | |
# Using |
If no endpoints are discovered from the API the seeds configured in the cassandra.yaml file are used. |
# Provider limitations |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.