2017-05-03 09:13:07 +00:00
|
|
|
|
---
|
2020-01-18 00:18:09 +00:00
|
|
|
|
layout: api
|
|
|
|
|
page_title: Cassandra - Database - Secrets Engines - HTTP API
|
|
|
|
|
description: >-
|
|
|
|
|
The Cassandra plugin for Vault's database secrets engine generates database
|
|
|
|
|
credentials to access Cassandra servers.
|
2017-05-03 09:13:07 +00:00
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
# Cassandra Database Plugin HTTP API
|
|
|
|
|
|
2017-09-20 20:05:00 +00:00
|
|
|
|
The Cassandra database plugin is one of the supported plugins for the database
|
|
|
|
|
secrets engine. This plugin generates database credentials dynamically based on
|
2017-05-03 09:13:07 +00:00
|
|
|
|
configured roles for the Cassandra database.
|
|
|
|
|
|
|
|
|
|
## Configure Connection
|
|
|
|
|
|
|
|
|
|
In addition to the parameters defined by the [Database
|
2020-01-22 20:05:41 +00:00
|
|
|
|
Secrets Engine](/api/secret/databases#configure-connection), this plugin
|
2017-05-03 09:13:07 +00:00
|
|
|
|
has a number of parameters to further configure a connection.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
| Method | Path |
|
|
|
|
|
| :----- | :----------------------- |
|
|
|
|
|
| `POST` | `/database/config/:name` |
|
2017-05-03 09:13:07 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
2019-03-04 15:21:33 +00:00
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
- `hosts` `(string: <required>)` – Specifies a set of comma-delineated Cassandra
|
|
|
|
|
hosts to connect to.
|
|
|
|
|
|
2017-09-08 03:04:40 +00:00
|
|
|
|
- `port` `(int: 9042)` – Specifies the default port to use if none is provided
|
|
|
|
|
as part of the host URI. Defaults to Cassandra's default transport port, 9042.
|
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
- `username` `(string: <required>)` – Specifies the username to use for
|
|
|
|
|
superuser access.
|
|
|
|
|
|
|
|
|
|
- `password` `(string: <required>)` – Specifies the password corresponding to
|
|
|
|
|
the given username.
|
|
|
|
|
|
|
|
|
|
- `tls` `(bool: true)` – Specifies whether to use TLS when connecting to
|
|
|
|
|
Cassandra.
|
|
|
|
|
|
|
|
|
|
- `insecure_tls` `(bool: false)` – Specifies whether to skip verification of the
|
|
|
|
|
server certificate when using TLS.
|
|
|
|
|
|
2021-06-21 17:38:08 +00:00
|
|
|
|
- `tls_server_name` `(string: "")` – Specifies the name to use as the SNI host when
|
2021-06-10 23:06:40 +00:00
|
|
|
|
connecting to the Cassandra server via TLS.
|
2021-06-21 17:38:08 +00:00
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
- `pem_bundle` `(string: "")` – Specifies concatenated PEM blocks containing a
|
|
|
|
|
certificate and private key; a certificate, private key, and issuing CA
|
2021-06-21 17:38:08 +00:00
|
|
|
|
certificate; or just a CA certificate. Only one of `pem_bundle` or `pem_json` can be specified.
|
2021-06-10 23:04:12 +00:00
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
- `pem_json` `(string: "")` – Specifies JSON containing a certificate and
|
|
|
|
|
private key; a certificate, private key, and issuing CA certificate; or just a
|
2021-06-21 17:38:08 +00:00
|
|
|
|
CA certificate. The value in this field must be an encoded JSON object. For convenience format is the
|
|
|
|
|
same as the output of the `issue` command from the `pki` secrets engine; see
|
|
|
|
|
[the pki documentation](/docs/secrets/pki). Only one of `pem_bundle` or `pem_json` can be specified.
|
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
<summary>`pem_json` example</summary>
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"certificate": "<client certificate as a PEM>",
|
|
|
|
|
"private_key": "<private key as a PEM>",
|
|
|
|
|
"ca_chain": ["<CA as a PEM>", "<Additional PEM for the CA chain if needed"]
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
If using the Vault CLI, it's probably easiest to write the JSON to a file and then reference the file:
|
|
|
|
|
```shell
|
|
|
|
|
vault write database/config/cassandra-example <...other fields> pem_json=@/path/to/file.json
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
</details>
|
2017-05-03 09:13:07 +00:00
|
|
|
|
|
2019-10-14 22:36:49 +00:00
|
|
|
|
- `skip_verification` `(bool: false)` - Skip permissions checks when a connection to Cassandra
|
2020-01-18 00:18:09 +00:00
|
|
|
|
is first created. These checks ensure that Vault is able to create roles, but can be resource
|
|
|
|
|
intensive in clusters with many roles.
|
2019-10-14 22:36:49 +00:00
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
- `protocol_version` `(int: 2)` – Specifies the CQL protocol version to use.
|
|
|
|
|
|
|
|
|
|
- `connect_timeout` `(string: "5s")` – Specifies the connection timeout to use.
|
|
|
|
|
|
2020-01-18 00:18:09 +00:00
|
|
|
|
- `local_datacenter` `(string: "")` – If set, enables host selection policy
|
|
|
|
|
which will prioritize and use hosts which are in the local datacenter before
|
|
|
|
|
hosts in all other datacenters (for example "dc-01").
|
2019-03-14 20:37:28 +00:00
|
|
|
|
|
2019-02-10 23:34:50 +00:00
|
|
|
|
- `socket_keep_alive` `(string: "0s")` – the keep-alive period for an active
|
2020-01-18 00:18:09 +00:00
|
|
|
|
network connection. If zero, keep-alives are not enabled.
|
2019-02-10 23:34:50 +00:00
|
|
|
|
|
2021-06-21 17:38:08 +00:00
|
|
|
|
- `consistency` `(string: "")` – Specifies the consistency option to use. See
|
2019-03-04 15:21:33 +00:00
|
|
|
|
the [gocql
|
|
|
|
|
definition](https://github.com/gocql/gocql/blob/master/frame.go#L188) for
|
|
|
|
|
valid options.
|
|
|
|
|
|
2021-02-26 23:04:12 +00:00
|
|
|
|
- `username_template` `(string)` - [Template](/docs/concepts/username-templating) describing how
|
|
|
|
|
dynamic usernames are generated.
|
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
<summary><b>Default Username Template</b></summary>
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
{{ printf "v_%s_%s_%s_%s" (.DisplayName | truncate 15) (.RoleName | truncate 15) (random 20) (unix_time) | truncate 100 | replace "-" "_" | lowercase }}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
<summary><b>Example Usernames:</b></summary>
|
|
|
|
|
|
|
|
|
|
| Example | |
|
|
|
|
|
| ------------- | ---------------------------------------------------- |
|
|
|
|
|
| `DisplayName` | `token` |
|
|
|
|
|
| `RoleName` | `myrolename` |
|
|
|
|
|
| Username | `v_token_myrolename_uszt1n4cyhal4m0xtgx3_1614294836` |
|
|
|
|
|
|
|
|
|
|
| Example | |
|
|
|
|
|
| ------------- | ------------------------------------------------------------------- |
|
|
|
|
|
| `DisplayName` | `amuchlonger_dispname` |
|
|
|
|
|
| `RoleName` | `role-name-with-dashes` |
|
|
|
|
|
| Username | `v_amuchlonger_dis_role_name_with__s0t9xb0jsab9nqz7yj40_1614294836` |
|
|
|
|
|
|
|
|
|
|
</details>
|
|
|
|
|
</details>
|
|
|
|
|
|
2017-05-03 09:13:07 +00:00
|
|
|
|
TLS works as follows:
|
|
|
|
|
|
|
|
|
|
- If `tls` is set to true, the connection will use TLS; this happens
|
|
|
|
|
automatically if `pem_bundle`, `pem_json`, or `insecure_tls` is set
|
|
|
|
|
|
|
|
|
|
- If `insecure_tls` is set to true, the connection will not perform verification
|
|
|
|
|
of the server certificate; this also sets `tls` to true
|
|
|
|
|
|
|
|
|
|
- If only `issuing_ca` is set in `pem_json`, or the only certificate in
|
|
|
|
|
`pem_bundle` is a CA certificate, the given CA certificate will be used for
|
|
|
|
|
server certificate verification; otherwise the system CA certificates will be
|
|
|
|
|
used
|
|
|
|
|
|
|
|
|
|
- If `certificate` and `private_key` are set in `pem_bundle` or `pem_json`,
|
|
|
|
|
client auth will be turned on for the connection
|
|
|
|
|
|
|
|
|
|
`pem_bundle` should be a PEM-concatenated bundle of a private key + client
|
|
|
|
|
certificate, an issuing CA certificate, or both. `pem_json` should contain the
|
|
|
|
|
same information; for convenience, the JSON format is the same as that output by
|
2017-09-20 20:05:00 +00:00
|
|
|
|
the issue command from the PKI secrets engine.
|
2017-05-03 09:13:07 +00:00
|
|
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
|
|
```json
|
|
|
|
|
{
|
|
|
|
|
"plugin_name": "cassandra-database-plugin",
|
|
|
|
|
"allowed_roles": "readonly",
|
|
|
|
|
"hosts": "cassandra1.local",
|
|
|
|
|
"username": "user",
|
|
|
|
|
"password": "pass"
|
|
|
|
|
}
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
|
2020-05-21 17:18:17 +00:00
|
|
|
|
```shell-session
|
2017-05-03 09:13:07 +00:00
|
|
|
|
$ curl \
|
|
|
|
|
--header "X-Vault-Token: ..." \
|
|
|
|
|
--request POST \
|
|
|
|
|
--data @payload.json \
|
2018-03-23 15:41:51 +00:00
|
|
|
|
http://127.0.0.1:8200/v1/cassandra/config/connection
|
2017-05-03 09:13:07 +00:00
|
|
|
|
```
|
2017-05-11 18:59:58 +00:00
|
|
|
|
|
|
|
|
|
## Statements
|
|
|
|
|
|
|
|
|
|
Statements are configured during role creation and are used by the plugin to
|
2018-03-20 18:54:10 +00:00
|
|
|
|
determine what is sent to the database on user creation, renewing, and
|
2017-05-11 18:59:58 +00:00
|
|
|
|
revocation. For more information on configuring roles see the [Role
|
2020-01-22 20:05:41 +00:00
|
|
|
|
API](/api/secret/databases#create-role) in the database secrets engine docs.
|
2017-05-11 18:59:58 +00:00
|
|
|
|
|
|
|
|
|
### Parameters
|
|
|
|
|
|
|
|
|
|
The following are the statements used by this plugin. If not mentioned in this
|
|
|
|
|
list the plugin does not support that statement type.
|
|
|
|
|
|
2018-04-09 16:20:29 +00:00
|
|
|
|
- `creation_statements` `(list: [])` – Specifies the database
|
2017-05-11 18:59:58 +00:00
|
|
|
|
statements executed to create and configure a user. Must be a
|
|
|
|
|
semicolon-separated string, a base64-encoded semicolon-separated string, a
|
|
|
|
|
serialized JSON string array, or a base64-encoded serialized JSON string
|
2018-12-04 18:14:00 +00:00
|
|
|
|
array. The '{{username}}' and '{{password}}' values will be substituted. If not
|
2017-05-11 18:59:58 +00:00
|
|
|
|
provided, defaults to a generic create user statements that creates a
|
|
|
|
|
non-superuser.
|
|
|
|
|
|
2018-04-09 16:20:29 +00:00
|
|
|
|
- `revocation_statements` `(list: [])` – Specifies the database statements to
|
2017-05-11 18:59:58 +00:00
|
|
|
|
be executed to revoke a user. Must be a semicolon-separated string, a
|
|
|
|
|
base64-encoded semicolon-separated string, a serialized JSON string array, or
|
2018-12-04 18:14:00 +00:00
|
|
|
|
a base64-encoded serialized JSON string array. The '{{username}}' value will be
|
2017-05-11 18:59:58 +00:00
|
|
|
|
substituted. If not provided defaults to a generic drop user statement.
|
|
|
|
|
|
2018-04-09 16:20:29 +00:00
|
|
|
|
- `rollback_statements` `(list: [])` – Specifies the database statements to be
|
2017-05-11 18:59:58 +00:00
|
|
|
|
executed to rollback a create operation in the event of an error. Must be a
|
|
|
|
|
semicolon-separated string, a base64-encoded semicolon-separated string, a
|
|
|
|
|
serialized JSON string array, or a base64-encoded serialized JSON string
|
2018-12-04 18:14:00 +00:00
|
|
|
|
array. The '{{username}}' value will be substituted. If not provided, defaults to
|
2017-09-20 20:05:00 +00:00
|
|
|
|
a generic drop user statement
|
2021-04-21 19:58:48 +00:00
|
|
|
|
|
|
|
|
|
- `root_rotation_statements` `(list: [])` - Specifies the database statements
|
|
|
|
|
to be executed when rotating the root user's password. Must be a
|
|
|
|
|
semicolon-separated string, a base64-encoded semicolon-separated string, a
|
|
|
|
|
serialized JSON string array, or a base64-encoded serialized JSON string
|
|
|
|
|
array. The '{{username}}' value will be substituted. If not provided, defaults to
|
|
|
|
|
a reasonable default alter user statement.
|
|
|
|
|
|
|
|
|
|
~> Prior to Vault 1.7.1 and 1.6.4 the default `root_rotation_statements` does not
|
|
|
|
|
allow for usernames with special characters in them due to missing quotes
|
|
|
|
|
around the username. To fix this issue in versions prior to Vault 1.7.1/1.6.4,
|
|
|
|
|
specify the following `root_rotation_statements`:<br/>
|
|
|
|
|
`ALTER USER '{{username}}' WITH PASSWORD '{{password}}';`
|