Encrypting Configuration File Properties
Configure DataStax Enterprise (DSE) to use a local encryption key to decrypt properties in the configuration file. Use passwords encrypted with the local key.
-
dse.yamlLDAP values:ldap_options.search_password ldap_options.truststore_passwordUse plain text for the KMIP keystore and truststore passwords.
-
cassandra.yamlSSL values:server_encryption_options.keystore_password server_encryption_options.truststore_password client_encryption_options.keystore_password client_encryption_options.truststore_password-
Complete the key setup described in Setting up local encryption keys.
When using a local encryption key file, set the location
system_key_directory, and ensure that the key file is owned by the account running DSE. -
For each property, replace plain text passwords with encrypted passwords returned by running the
dsetool encryptconfigvaluecommand:-
Encrypt the password:
dsetool encryptconfigvalueResult
Using system key system_key Enter value to encrypt: Enter again to confirm: Your encrypted value is: +Vj5oHCR/jqfA+OJE2m8zA== -
Replace the old value with the new value in the configuration file. For example, if the old value was the SSL truststore password in the
cassandra.yamlfile:truststore_password: +Vj5oHCR/jqfA+OJE2m8zA==After the configuration file property encryption is enabled, DSE startup fails if any of the protected properties are not encrypted.
-
-
Locate the
dse.yamlandcassandra.yamlconfiguration files. The location of these files depends on the type of installation:- dse.yaml
-
-
Package installations:
/etc/dse/dse.yaml -
Tarball installations:
<installation_location>/resources/dse/conf/dse.yaml- cassandra.yaml
-
Package installations:
/etc/dse/cassandra/cassandra.yaml -
Tarball installations:
<installation_location>/resources/cassandra/conf/cassandra.yaml-
In
dse.yaml, enable configuration file property encryption:-
Set config_encryption_active to
true:config_encryption_active: trueWhen set to
true, the configuration values must be encrypted or commented out.Lifecycle Manager (LCM) isn’t compatible when
config_encryption_activeistruein DSE and OpsCenter. See Lifecycle Manager configuration known issues and limitations. -
Set the local key encryption filename:
config_encryption_key_name: <key_filename>
-
-
Update the
dse.yamlandcassandra.yamlon all nodes in the cluster. -
Set up encryption for system resources, see Encrypting system resources.
-