Secrets Mount Cassandra Args
Constructors
Properties
A list of roles that are allowed to use this connection.
The number of seconds to use as a connection timeout.
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Supported list of database secrets engines that can be configured:
Whether to skip verification of the server certificate when using TLS.
Specifies the name of the plugin to use.
The CQL protocol version to use.
A list of database statements to be executed to rotate the root user's credentials.
The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
The maximum amount of time in seconds allowed to complete a rotation when a scheduled token rotation occurs. The default rotation window is unbound and the minimum allowable window is 3600
. Requires Vault Enterprise 1.19+.
Skip permissions checks when a connection to Cassandra is first created. These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles.
Whether the connection should be verified on initial configuration or not.