-
Notifications
You must be signed in to change notification settings - Fork 1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: completed write up for dynamic secret cassandra
- Loading branch information
Showing
5 changed files
with
154 additions
and
9 deletions.
There are no files selected for viewing
127 changes: 127 additions & 0 deletions
127
docs/documentation/platform/dynamic-secrets/cassandra.mdx
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,127 @@ | ||
--- | ||
title: "Cassandra" | ||
description: "How to dynamically generate Cassandra database users" | ||
--- | ||
|
||
The Infisical Cassandra dynamic secret allows you to generate Cassandra database credentials on demand based on configured role. | ||
|
||
## Prerequisite | ||
|
||
Infisical requires a Cassandra user in your instance with the necessary permissions. This user will facilitate the creation of new accounts as needed. | ||
Ensure the user possesses privileges for Creating, Dropping, and Granting permissions to roles. | ||
|
||
In your Cassandra configuration file cassandra.yaml, make sure you have the following settings: | ||
|
||
```yaml | ||
authenticator: PasswordAuthenticator | ||
authorizer: CassandraAuthorizer | ||
``` | ||
The above configuration allows user creation and granting permissions. | ||
## Set up Dynamic Secrets with Cassandra | ||
<Steps> | ||
<Step title="Open Secret Overview Dashboard"> | ||
Open the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret. | ||
</Step> | ||
<Step title="Click on the 'Add Dynamic Secret' button"> | ||
![Add Dynamic Secret Button](../../../images/platform/dynamic-secrets/add-dynamic-secret-button.png) | ||
</Step> | ||
<Step title="Select Cassandra"> | ||
![Dynamic Secret Modal](../../../images/platform/dynamic-secrets/dynamic-secret-modal-cassandra.png) | ||
</Step> | ||
<Step title="Provide the inputs for dynamic secret parameters"> | ||
<ParamField path="Secret Name" type="string" required> | ||
Name by which you want the secret to be referenced | ||
</ParamField> | ||
<ParamField path="Default TTL" type="string" required> | ||
Default time-to-live for a generated secret (it is possible to modify this value when a secret is generate) | ||
</ParamField> | ||
<ParamField path="Max TTL" type="string" required> | ||
Maximum time-to-live for a generated secret | ||
</ParamField> | ||
<ParamField path="Host" type="string" required> | ||
Cassandra Host. You can specify multiple Cassandra hosts by separating them with commas. | ||
</ParamField> | ||
<ParamField path="Port" type="number" required> | ||
Cassandra port | ||
</ParamField> | ||
<ParamField path="User" type="string" required> | ||
Username that will be used to create dynamic secrets | ||
</ParamField> | ||
<ParamField path="Password" type="string" required> | ||
Password that will be used to create dynamic secrets | ||
</ParamField> | ||
<ParamField path="Local Data Center" type="string" required> | ||
Specify the local data center in Cassandra that you want to use. This choice should align with your Cassandra cluster setup. | ||
</ParamField> | ||
<ParamField path="Keyspace" type="string"> | ||
Keyspace name where you want to create dynamic secrets. This ensures that the user is limited to that keyspace. | ||
</ParamField> | ||
<ParamField path="CA(SSL)" type="string"> | ||
A CA may be required if your cassandra requires it for incoming connections. | ||
</ParamField> | ||
![Dynamic Secret Setup Modal](../../../images/platform/dynamic-secrets/dynamic-secret-setup-modal-cassandra.png) | ||
</Step> | ||
<Step title="(Optional) Modify CQL Statements"> | ||
If you want to provide specific privileges for the generated dynamic credentials, you can modify the CQL statement to your needs. This is useful if you want to only give access to a specific table(s). | ||
![Modify CQL Statements Modal](../../../images/platform/dynamic-secrets/modify-cql-statements.png) | ||
</Step> | ||
<Step title="Click 'Submit'"> | ||
After submitting the form, you will see a dynamic secret created in the dashboard. | ||
<Note> | ||
If this step fails, you may have to add the CA certficate. | ||
</Note> | ||
![Dynamic Secret](../../../images/platform/dynamic-secrets/dynamic-secret.png) | ||
</Step> | ||
<Step title="Generate dynamic secrets"> | ||
Once you've successfully configured the dynamic secret, you're ready to generate on-demand credentials. | ||
To do this, simply click on the 'Generate' button which appears when hovering over the dynamic secret item. | ||
Alternatively, you can initiate the creation of a new lease by selecting 'New Lease' from the dynamic secret lease list section. | ||
![Dynamic Secret](/images/platform/dynamic-secrets/dynamic-secret-generate.png) | ||
![Dynamic Secret](/images/platform/dynamic-secrets/dynamic-secret-lease-empty.png) | ||
When generating these secrets, it's important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for. | ||
![Provision Lease](/images/platform/dynamic-secrets/provision-lease.png) | ||
<Tip> | ||
Ensure that the TTL for the lease fall within the maximum TTL defined when configuring the dynamic secret. | ||
</Tip> | ||
Once you click the `Submit` button, a new secret lease will be generated and the credentials for it will be shown to you. | ||
|
||
![Provision Lease](/images/platform/dynamic-secrets/lease-values.png) | ||
</Step> | ||
</Steps> | ||
|
||
## Audit or Revoke Leases | ||
Once you have created one or more leases, you will be able to access them by clicking on the respective dynamic secret item on the dashboard. | ||
This will allow you see the expiration time of the lease or delete the lease before it's set time to live. | ||
|
||
![Provision Lease](/images/platform/dynamic-secrets/lease-data.png) | ||
|
||
## Renew Leases | ||
To extend the life of the generated dynamic secret leases past its initial time to live, simply click on the **Renew** as illustrated below. | ||
![Provision Lease](/images/platform/dynamic-secrets/dynamic-secret-lease-renew.png) | ||
|
||
<Warning> | ||
Lease renewals cannot exceed the maximum TTL set when configuring the dynamic secret | ||
</Warning> |
Binary file added
BIN
+27.5 KB
docs/images/platform/dynamic-secrets/dynamic-secret-modal-cassandra.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+59.8 KB
docs/images/platform/dynamic-secrets/dynamic-secret-setup-modal-cassandra.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters