Re: Securing Cassandra database

2017-11-13 Thread DuyHai Doan
You can pass in login/password from the client side and encrypt the client
/ cassandra connection...

Le 13 nov. 2017 12:16, "Mokkapati, Bhargav (Nokia - IN/Chennai)" <
bhargav.mokkap...@nokia.com> a écrit :

Hi Team,



We are using Apache Cassandra 3.0.13 version.



As part of Cassandra database security, we have created database super user
authentication, but from driver side we have default cql connection syntax
as “cqlsh ” not like “cqlsh  -u username and -p
password”. So cqlsh connection failing from application side.



So we have choosen a firewall method to limit the access to Cassandra
database with system IP address ranges.



Suggest us If any other better method than IP address firewall to create a
security  for Cassandra.



Thanks,

Bhargav


Securing Cassandra database

2017-11-13 Thread Mokkapati, Bhargav (Nokia - IN/Chennai)
Hi Team,

We are using Apache Cassandra 3.0.13 version.

As part of Cassandra database security, we have created database super user 
authentication, but from driver side we have default cql connection syntax as 
"cqlsh " not like "cqlsh  -u username and -p password". 
So cqlsh connection failing from application side.

So we have choosen a firewall method to limit the access to Cassandra database 
with system IP address ranges.

Suggest us If any other better method than IP address firewall to create a 
security  for Cassandra.

Thanks,
Bhargav


Re: Securing Cassandra database

2014-04-06 Thread Jack Krupansky
Take a look at the DataStax Enterprise Security Management.

http://www.datastax.com/documentation/datastax_enterprise/4.0/datastax_enterprise/sec/secDSE.html

-- Jack Krupansky

From: Check Peck 
Sent: Friday, April 4, 2014 11:54 PM
To: user 
Subject: Securing Cassandra database

Hi All,



We would like to secure our Cassandra database. We don’t want anybody to 
read/write on our Cassandra database leaving our team members only.



We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra 
cluster. 12 in each colo as we have three datacenters.




But we would like to have OPSCENTER working as it is working currently.



Is this possible to do anyhow? Is there any settings in yaml file which we can 
enforce? 





Raihan Jamal




Re: Securing Cassandra database

2014-04-05 Thread Mark Reddy
Hi,

If you want to just secure OpsCenter itself take a look here:
http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html


If you want to enable internal authentication and still allow OpsCenter
access, you can create an OpsCenter user and once you have auth turned
within the cluster update the cluster config with the user name and
password for the OpsCenter user.

Depending on your installation type you will find the cluster config in one
of the following locations:
Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
Binary installs: install_location/conf/clusters/cluster_specific.conf
Windows installs: Program Files (x86)\DataStax
Community\opscenter\conf\clusters\cluster_specific.conf

Open the file and update the username and password values under the
[cassandra] section:

[cassandra]
username =
seed_hosts =
api_port =
password =

After changing properties in this file, restart OpsCenter for the changes
to take effect.


Mark


On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.com wrote:

 Hi All,

 We would like to secure our Cassandra database. We don't want anybody to
 read/write on our Cassandra database leaving our team members only.



 We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra
 cluster. 12 in each colo as we have three datacenters.


 But we would like to have OPSCENTER working as it is working currently.



 Is this possible to do anyhow? Is there any settings in yaml file which we
 can enforce?





 *Raihan Jamal*





Re: Securing Cassandra database

2014-04-05 Thread Check Peck
Thanks Mark. But what about Cassandra database? I don't want anybody to
read and write into our Cassandra database through any API only just our
team should be able to do that.

We are using CQL based tables so data doesn't get shown on the OPSCENTER.

In our case, we would like to secure database itself. Is this possible to
do as well anyhow?




On Fri, Apr 4, 2014 at 11:24 PM, Mark Reddy mark.re...@boxever.com wrote:

 Hi,

 If you want to just secure OpsCenter itself take a look here:
 http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html


 If you want to enable internal authentication and still allow OpsCenter
 access, you can create an OpsCenter user and once you have auth turned
 within the cluster update the cluster config with the user name and
 password for the OpsCenter user.

 Depending on your installation type you will find the cluster config in
 one of the following locations:
 Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
 Binary installs: install_location/conf/clusters/cluster_specific.conf
 Windows installs: Program Files (x86)\DataStax
 Community\opscenter\conf\clusters\cluster_specific.conf

 Open the file and update the username and password values under the
 [cassandra] section:

 [cassandra]
 username =
 seed_hosts =
 api_port =
 password =

 After changing properties in this file, restart OpsCenter for the changes
 to take effect.


 Mark


 On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.comwrote:

 Hi All,

 We would like to secure our Cassandra database. We don't want anybody to
 read/write on our Cassandra database leaving our team members only.



 We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra
 cluster. 12 in each colo as we have three datacenters.


 But we would like to have OPSCENTER working as it is working currently.



 Is this possible to do anyhow? Is there any settings in yaml file which
 we can enforce?








Re: Securing Cassandra database

2014-04-05 Thread Check Peck
Just to add, nobody should be able to read and write into our Cassandra
database through any API *or any CQL client as well *only our team should
be able to do that.


On Fri, Apr 4, 2014 at 11:29 PM, Check Peck comptechge...@gmail.com wrote:

 Thanks Mark. But what about Cassandra database? I don't want anybody to
 read and write into our Cassandra database through any API only just our
 team should be able to do that.

 We are using CQL based tables so data doesn't get shown on the OPSCENTER.

 In our case, we would like to secure database itself. Is this possible to
 do as well anyhow?





 On Fri, Apr 4, 2014 at 11:24 PM, Mark Reddy mark.re...@boxever.comwrote:

 Hi,

 If you want to just secure OpsCenter itself take a look here:
 http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html


 If you want to enable internal authentication and still allow OpsCenter
 access, you can create an OpsCenter user and once you have auth turned
 within the cluster update the cluster config with the user name and
 password for the OpsCenter user.

 Depending on your installation type you will find the cluster config in
 one of the following locations:
 Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
 Binary installs: install_location/conf/clusters/cluster_specific.conf
 Windows installs: Program Files (x86)\DataStax
 Community\opscenter\conf\clusters\cluster_specific.conf

 Open the file and update the username and password values under the
 [cassandra] section:

 [cassandra]
 username =
 seed_hosts =
 api_port =
 password =

 After changing properties in this file, restart OpsCenter for the changes
 to take effect.


 Mark


 On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.comwrote:

 Hi All,

 We would like to secure our Cassandra database. We don't want anybody to
 read/write on our Cassandra database leaving our team members only.



 We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra
 cluster. 12 in each colo as we have three datacenters.


 But we would like to have OPSCENTER working as it is working currently.



 Is this possible to do anyhow? Is there any settings in yaml file which
 we can enforce?









Re: Securing Cassandra database

2014-04-05 Thread Mark Reddy
Ok so you want to enable auth on Cassandra itself. You will want to look
into the authentication and authorisation functionality then.

Here is a quick overview:
http://www.datastax.com/dev/blog/a-quick-tour-of-internal-authentication-and-authorization-security-in-datastax-enterprise-and-apache-cassandra

This section of the docs should give you the technical details needed to
move forward on this:
http://www.datastax.com/documentation/cassandra/1.2/cassandra/security/securityTOC.html


Mark


On Sat, Apr 5, 2014 at 7:31 AM, Check Peck comptechge...@gmail.com wrote:

 Just to add, nobody should be able to read and write into our Cassandra
 database through any API *or any CQL client as well *only our team should
 be able to do that.


 On Fri, Apr 4, 2014 at 11:29 PM, Check Peck comptechge...@gmail.comwrote:

 Thanks Mark. But what about Cassandra database? I don't want anybody to
 read and write into our Cassandra database through any API only just our
 team should be able to do that.

 We are using CQL based tables so data doesn't get shown on the OPSCENTER.

 In our case, we would like to secure database itself. Is this possible to
 do as well anyhow?





 On Fri, Apr 4, 2014 at 11:24 PM, Mark Reddy mark.re...@boxever.comwrote:

 Hi,

 If you want to just secure OpsCenter itself take a look here:
 http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html


 If you want to enable internal authentication and still allow OpsCenter
 access, you can create an OpsCenter user and once you have auth turned
 within the cluster update the cluster config with the user name and
 password for the OpsCenter user.

 Depending on your installation type you will find the cluster config in
 one of the following locations:
 Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
 Binary installs: install_location/conf/clusters/cluster_specific.conf
 Windows installs: Program Files (x86)\DataStax
 Community\opscenter\conf\clusters\cluster_specific.conf

 Open the file and update the username and password values under the
 [cassandra] section:

 [cassandra]
 username =
 seed_hosts =
 api_port =
 password =

 After changing properties in this file, restart OpsCenter for the
 changes to take effect.


 Mark


 On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.comwrote:

 Hi All,

 We would like to secure our Cassandra database. We don't want anybody
 to read/write on our Cassandra database leaving our team members only.



 We are using Cassandra 1.2.9 in Production and we have 36 node
 Cassandra cluster. 12 in each colo as we have three datacenters.


 But we would like to have OPSCENTER working as it is working currently.



 Is this possible to do anyhow? Is there any settings in yaml file which
 we can enforce?










Re: Securing Cassandra database

2014-04-05 Thread Robert Wille
Password protection doesn¹t protect against an engineer accidentally running
test cases using the live config file instead of the test config file. To
protect against that, our RDBMS system will only accept connections from
certain IP addresses. Is there an equivalent thing in Cassandra, or should
we configure firewall software for that?

From:  Mark Reddy mark.re...@boxever.com
Reply-To:  user@cassandra.apache.org
Date:  Saturday, April 5, 2014 at 12:38 AM
To:  user@cassandra.apache.org
Subject:  Re: Securing Cassandra database

Ok so you want to enable auth on Cassandra itself. You will want to look
into the authentication and authorisation functionality then.

Here is a quick overview:
http://www.datastax.com/dev/blog/a-quick-tour-of-internal-authentication-and
-authorization-security-in-datastax-enterprise-and-apache-cassandra

This section of the docs should give you the technical details needed to
move forward on this:
http://www.datastax.com/documentation/cassandra/1.2/cassandra/security/secur
ityTOC.html


Mark 


On Sat, Apr 5, 2014 at 7:31 AM, Check Peck comptechge...@gmail.com wrote:
 Just to add, nobody should be able to read and write into our Cassandra
 database through any API or any CQL client as well only our team should be
 able to do that.
 
 
 On Fri, Apr 4, 2014 at 11:29 PM, Check Peck comptechge...@gmail.com wrote:
 Thanks Mark. But what about Cassandra database? I don't want anybody to read
 and write into our Cassandra database through any API only just our team
 should be able to do that.
 
 We are using CQL based tables so data doesn't get shown on the OPSCENTER.
 
 In our case, we would like to secure database itself. Is this possible to do
 as well anyhow?
 
 
 
 
 
 On Fri, Apr 4, 2014 at 11:24 PM, Mark Reddy mark.re...@boxever.com wrote:
 Hi, 
 
 If you want to just secure OpsCenter itself take a look here:
 http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssig
 ningAccessRoles_t.html
 
 
 If you want to enable internal authentication and still allow OpsCenter
 access, you can create an OpsCenter user and once you have auth turned
 within the cluster update the cluster config with the user name and password
 for the OpsCenter user.
 
 Depending on your installation type you will find the cluster config in one
 of the following locations:
 Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
 Binary installs: install_location/conf/clusters/cluster_specific.conf
 Windows installs: Program Files (x86)\DataStax
 Community\opscenter\conf\clusters\cluster_specific.conf
 
 Open the file and update the username and password values under the
 [cassandra] section:
 
 [cassandra]
 username = 
 seed_hosts = 
 api_port =
 password = 
 
 After changing properties in this file, restart OpsCenter for the changes to
 take effect.
 
 
 Mark
 
 
 On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.com wrote:
 Hi All,
 
 
 We would like to secure our Cassandra database. We don¹t want anybody to
 read/write on our Cassandra database leaving our team members only.
  
 We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra
 cluster. 12 in each colo as we have three datacenters.
 
 
 
 But we would like to have OPSCENTER working as it is working currently.
  
 Is this possible to do anyhow? Is there any settings in yaml file which we
 can enforce? 
 
 
  
 
 
 





Re: Securing Cassandra database

2014-04-05 Thread Jon Haddad
This isn’t Cassandra specific, but this is why I hate including db 
configuration with the main codebase instead of making it the responsibility of 
ops.  This case you described shouldn’t even be possible.  The production db 
configs should be provided by the team maintaining the production environment, 
and not even accessible outside it.

On Apr 5, 2014, at 6:45 AM, Robert Wille rwi...@fold3.com wrote:

 Password protection doesn’t protect against an engineer accidentally running 
 test cases using the live config file instead of the test config file. To 
 protect against that, our RDBMS system will only accept connections from 
 certain IP addresses. Is there an equivalent thing in Cassandra, or should we 
 configure firewall software for that?
 
 From: Mark Reddy mark.re...@boxever.com
 Reply-To: user@cassandra.apache.org
 Date: Saturday, April 5, 2014 at 12:38 AM
 To: user@cassandra.apache.org
 Subject: Re: Securing Cassandra database
 
 Ok so you want to enable auth on Cassandra itself. You will want to look into 
 the authentication and authorisation functionality then. 
 
 Here is a quick overview: 
 http://www.datastax.com/dev/blog/a-quick-tour-of-internal-authentication-and-authorization-security-in-datastax-enterprise-and-apache-cassandra
 
 This section of the docs should give you the technical details needed to move 
 forward on this: 
 http://www.datastax.com/documentation/cassandra/1.2/cassandra/security/securityTOC.html
 
 
 Mark 
 
 
 On Sat, Apr 5, 2014 at 7:31 AM, Check Peck comptechge...@gmail.com wrote:
 Just to add, nobody should be able to read and write into our Cassandra 
 database through any API or any CQL client as well only our team should be 
 able to do that.
 
 
 On Fri, Apr 4, 2014 at 11:29 PM, Check Peck comptechge...@gmail.com wrote:
 Thanks Mark. But what about Cassandra database? I don't want anybody to 
 read and write into our Cassandra database through any API only just our 
 team should be able to do that.
 
 We are using CQL based tables so data doesn't get shown on the OPSCENTER.
 
 In our case, we would like to secure database itself. Is this possible to 
 do as well anyhow?
 
 
 
 
 
 On Fri, Apr 4, 2014 at 11:24 PM, Mark Reddy mark.re...@boxever.com wrote:
 Hi, 
 
 If you want to just secure OpsCenter itself take a look here: 
 http://www.datastax.com/documentation/opscenter/4.1/opsc/configure/opscAssigningAccessRoles_t.html
 
 
 If you want to enable internal authentication and still allow OpsCenter 
 access, you can create an OpsCenter user and once you have auth turned 
 within the cluster update the cluster config with the user name and 
 password for the OpsCenter user.
 
 Depending on your installation type you will find the cluster config in 
 one of the following locations:
 Packaged installs: /etc/opscenter/clusters/cluster_specific.conf
 Binary installs: install_location/conf/clusters/cluster_specific.conf
 Windows installs: Program Files (x86)\DataStax 
 Community\opscenter\conf\clusters\cluster_specific.conf
 
 Open the file and update the username and password values under the 
 [cassandra] section:
 
 [cassandra]
 username = 
 seed_hosts = 
 api_port =
 password = 
 
 After changing properties in this file, restart OpsCenter for the changes 
 to take effect.
 
 
 Mark
 
 
 On Sat, Apr 5, 2014 at 6:54 AM, Check Peck comptechge...@gmail.com wrote:
 Hi All,
 
 We would like to secure our Cassandra database. We don’t want anybody to 
 read/write on our Cassandra database leaving our team members only.
  
 We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra 
 cluster. 12 in each colo as we have three datacenters.
 
 But we would like to have OPSCENTER working as it is working currently.
  
 Is this possible to do anyhow? Is there any settings in yaml file which 
 we can enforce?
 
  
 
 
 
 



Securing Cassandra database

2014-04-04 Thread Check Peck
Hi All,

We would like to secure our Cassandra database. We don't want anybody to
read/write on our Cassandra database leaving our team members only.



We are using Cassandra 1.2.9 in Production and we have 36 node Cassandra
cluster. 12 in each colo as we have three datacenters.


But we would like to have OPSCENTER working as it is working currently.



Is this possible to do anyhow? Is there any settings in yaml file which we
can enforce?





*Raihan Jamal*