About the dse advrep command
The command line tool provides commands and options for configuring and using DSE Advanced Replication.
Synopsis
dse advrep [connection_options] [command] [sub_command] [sub_command_options]
The default port for DSE Advanced Replication is 9042
.
Syntax legend
Syntax conventions | Description |
---|---|
UPPERCASE |
Literal keyword. |
Lowercase |
Not literal. |
|
Variable value. Replace with a valid option or user-defined value. |
|
Optional.
Square brackets ( |
|
Group.
Parentheses ( |
|
Or.
A vertical bar ( |
|
Repeatable.
An ellipsis ( |
|
Single quotation ( |
|
Map collection.
Braces ( |
|
Set, list, map, or tuple.
Angle brackets ( |
|
End CQL statement.
A semicolon ( |
|
Separate the command line options from the command arguments with two hyphens ( |
|
Search CQL only: Single quotation marks ( |
|
Search CQL only: Identify the entity and literal value to overwrite the XML element in the schema and |
Using dse advrep
command line help
To view a listing of dse advrep
commands:
dse advrep help
To view help for a specific command:
dse advrep help command [ sub_command ]
Connection options
JMX authentication is supported by some dse commands. Other dse commands authenticate with the user name and password of the configured user. The connection option short form and long form are comma separated.
You can provide authentication credentials in several ways, see Credentials for authentication. |
General connection options:
--separator field_separator
-
The field separator for use with the
--no-pretty-print
command. --verbose
-
Print verbose messages for command.
--verbose
-
Displays which arguments are recognized as Spark configuration options and which arguments are forwarded to the Spark shell.
--no-pretty-print
-
If not specified, data is printed using tabular output. If specified, data is printed as a comma separated list unless a separator is specified.
--cipher-suites ssl_cipher_suites
-
Comma-separated list of SSL cipher suites for connection to DSE when SSL is enabled. For example,
--cipher-suites c1,c2,c3
. --host hostname
-
The DSE node hostname or IP address.
--jmx-port jmx_port
-
The remote JMX agent port number. Default:
7199
. --jmx-pwd jmx_password
-
The password for authenticating with secure local JMX. If you do not provide a password, you are prompted to enter one.
--jmx-user jmx_username
-
The user name for authenticating with secure local JMX.
--kerberos-enabled true|false
-
Whether Kerberos authentication is enabled for connections to DSE. For example,
--kerberos-enabled true
. --keystore-password keystore_password
-
Keystore password for connection to DSE when SSL client authentication is enabled.
--keystore-path ssl_keystore_path
-
Path to the keystore for connection to DSE when SSL client authentication is enabled.
--keystore-type ssl_keystore_type
-
Keystore type for connection to DSE when SSL client authentication is enabled. JKS is the type for keys generated by the Java keytool binary, but other types are possible, depending on user environment.
-p password
-
The password to authenticate for database access. Can use the DSE_PASSWORD environment variable.
--ssl
-
Whether SSL is enabled for connection to DSE.
--ssl-enabled true
is the same as--ssl
. --ssl-protocol ssl_protocol
-
SSL protocol for connection to DSE when SSL is enabled. For example,
--ssl-protocol ssl4
. -t delegation_token
-
The delegation token to use at login. Alternatively, use the
DSE_TOKEN
environment variable. --truststore-password ssl_truststore_password
-
Truststore password to use for connection to DSE when SSL is enabled.
--truststore-path ssl_truststore_path
-
Path to the truststore to use for connection to DSE when SSL is enabled. For example,
--truststore-path /path/to/ts
. --truststore-type ssl_truststore_type
-
Truststore type for connection to DSE when SSL is enabled. JKS is the type for keys generated by the Java keytool binary, but other types are possible, depending on user environment. For example,
--truststore-type jks2
. -u username
-
User name of a DSE authentication account. Can use the
DSE_USERNAME
environment variable.
Examples
This connection example specifies that Kerberos is enabled and lists the replication channels:
dse advrep --host ip-10-200-300-138.example.lan --kerberos-enabled=true conf list
To use the server YAML files:
dse advrep --use-server-config conf list
To list output without pretty-print
with a specified separator:
dse advrep --no-pretty-print --separator "|" destination list-conf
This output results:
destination|name|value
mydest|addresses|192.168.200.100
mydest|transmission-enabled|true
mydest|driver-ssl-cipher-suites|TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_RC4_128_MD5,TLS_EMPTY_RENEGOTIATION_INFO_SCSV
mydest|driver-ssl-enabled|false
mydest|driver-ssl-protocol|TLS
mydest|name|mydest
mydest|driver-connect-timeout|15000
mydest|driver-max-requests-per-connection|1024
mydest|driver-connections-max|8
mydest|driver-connections|1
mydest|driver-compression|lz4
mydest|driver-consistency-level|ONE
mydest|driver-allow-remote-dcs-for-local-cl|false
mydest|driver-used-hosts-per-remote-dc|0
mydest|driver-read-timeout|15000