Database Reference
In-Depth Information
ing these negative scenarios to validate this. While designing schema it is not required
to tweak such exercise with Cassandra, but since we are talking about security, let's see
how secure the system keyspace is!
Read access to the system keyspace is provided by default. Let's try accessing it
with some exercises LocalStrategy .
The system keyspace is configured with LocalStrategy as replication op-
tions.
First, let's try creating a keyspace with a replication strategy as
LocalStrategy :
create keyspace system_test with replication =
{
'class':'localstrategy','replication_factor':3};
create keyspace system_test with replication =
{ 'class':'LocalStrategy'};
Figure 4-2 shows that we cannot create another keyspace with LocalStrategy .
Figure 4-2 . LocalStrategy is not for public use
Now, let's try to modify/drop the system keyspace:
alter keyspace system with replication = {
'class' : 'LocalStrategy'};alter keyspace
system with replication = { 'class' :
'SimpleStrategy', 'replication_factor':3};
Figure 4-3 shows it is not possible to alter the system keyspace for changing
strategy.
 
 
 
 
Search WWH ::




Custom Search