Database Reference
In-Depth Information
ing these negative scenarios to validate this. While designing schema it is not required
to tweak such exercise with Cassandra, but since we are talking about security, let's see
how secure the
system
keyspace is!
Read access to the
system
keyspace is provided by default. Let's try accessing it
with some exercises
LocalStrategy
.
The
system
keyspace is configured with
LocalStrategy
as replication op-
tions.
•
First, let's try creating a keyspace with a replication strategy as
LocalStrategy
:
create keyspace system_test with replication =
{
'class':'localstrategy','replication_factor':3};
create keyspace system_test with replication =
{ 'class':'LocalStrategy'};
Figure 4-2
.
LocalStrategy is not for public use
•
Now, let's try to modify/drop the
system
keyspace:
alter keyspace system with replication = {
'class' : 'LocalStrategy'};alter keyspace
system with replication = { 'class' :
'SimpleStrategy', 'replication_factor':3};
strategy.