Skip to main content

The cqlsh-expansion utility extends native cqlsh functionality to include cloud native capabilities

Project description

The Amazon Keyspaces (for Apache Cassandra) developer toolkit cqlsh-expansion script

The Amazon Keyspaces toolkit contains common Cassandra tooling and helpers preconfigured for Amazon Keyspaces. The cqlsh-expansion utility extends native cqlsh functionality to include parameters and capabilities specific to Amazon Keyspaces without breaking compatibility with Apache Cassandra. This includes support for the Sigv4 Authentication plugin. Normally, cqlsh is packaged with the full distribution of Apache Cassandra, but since Amazon Keyspaces is a serverless database service, we only require the cqlsh scripts and not the full distribution. This repository provides a lightweight distribution of cqlsh that can be installed on platforms that support python.

Installing cqlsh-expansion

To install the cqlsh-expansion python package you can run the following pip command. The command below executes a “pip install” that will install the cqlsh-expansion scripts. It will also install a requirements file containing a list of dependencies. The --user flag tells pip to use the Python user install directory for your platform. Typically ~/.local/ on unix based systems.

pip install --user cqlsh-expansion 

Alternatively, if you are using python3 as default you may have to use the following command to install the cqlsh-expansion package.

python3 -m pip install --user cqlsh-expansion

Setup cqlsh-expansion to connect to Amazon Keyspaces

To use the cqlsh-expansion with Amazon Keyspaces you can use the following post install script or by following the instructions found in the official Amazon Keyspaces documentation.

By default the cqlsh-expansion is not configured with ssl enabled, but the package includes a post install script helper to quickly setup your environment after installation. The script will place the necessary configuration and SSL certificate in the user’s .cassandra directory. Amazon Keyspaces only accepts secure connections using Transport Layer Security (TLS). Encryption in transit provides an additional layer of data protection by encrypting your data as it travels to and from Amazon Keyspaces. The post install script first will create the .cassandra directory if it does not exist already. Then it will copy a preconfigure a cqlshrc file and the Starfield digital certificate into the .cassandra directory. The .cassandra directory will be created in the user home directory as it is the default location. As best practice, please review the post install scriptbefore executing. Modifications made by this post install script will not be undone if uninstalling the cqlsh-expansion with pip.


cqlsh-expansion.init

Connection to Amazon Keyspaces

Now that you have you cqlsh-expansion installed and have setup up the configuration for SSL communication with Amazon Keyspaces, you can now connect to the Amazon Keyspaces services using your IAM access keys or Service Specific Credentials.

Choose a region and endpoint

To connect to Amazon Keyspaces you will need to choose one of the service endpoints. You can also connect to Amazon Keyspaces using Interface VPC endpoints to enable private communication between your virtual private cloud (VPC) running in Amazon VPC and Amazon Keyspaces. For example, to connect to the Keyspaces service in US East (N. Virginia) (us-east-1) you will want to use the cassandra.us-east-1.amazonaws.com service endpoint. All communication with Amazon Keyspaces will be over port 9142.

Choose authentication method and connect

To provide users and applications with credentials for programmatic access to Amazon Keyspaces resources, you can do either of the following:

Connect with IAM access keys (users,roles, and federated identities)

For enhanced security, we recommend to create IAM access keys for IAM users and roles that are used across all AWS services. To use IAM access keys to connect to Amazon Keyspaces, customers can use the Signature Version 4 Process (SigV4) authentication plugin for Cassandra client drivers. To learn more about how the Amazon Keyspaces SigV4 plugin enables IAM users, roles, and federated identities to authenticate in Amazon Keyspaces API requests, see AWS Signature Version 4 process (SigV4).

After you have the credentials setup with privileges to access Amazon Keyspaces system tables, you can execute the following command to connect to Amazon Keyspaces with CQLSH using the Sigv4 process.

Validate the module name and classname, region_name based on keyspaces endpoint in cqlshrc file.

[auth_provider]
;; you can specify any auth provider found in your python environment
;; module and class will be used to dynamically load the class
;; all other properties found here and in the credentials file under the class name
;; will be passed to the constructor
module = cassandra_sigv4.auth
classname = SigV4AuthProvider
region_name = us-east-1

you can also set region as Environment variable

 export AWS_DEFAULT_REGION=us-east-1 

To connect to Amazon Keyspaces with cqlsh-expansion using Sigv4 authenticator.

cqlsh-expansion cassandra.us-east-1.amazonaws.com 9142 --ssl 

Connect with service-specific credentials

You can create service-specific credentials that are similar to the traditional username and password that Cassandra uses for authentication and access management. AWS service-specific credentials are associated with a specific AWS Identity and Access Management (IAM) user and can only be used for the service they were created for. For more information, see Using IAM with Amazon Keyspaces (for Apache Cassandra) in the IAM User Guide. To connect to Amazon Keyspaces using the cqlsh-expansion and IAM service-specific credentials you can use the command below. In this command we are connecting to us-east-1 region with service specific user *‘Sri-user-99’ and service specific user password ‘user-pass-01’. *You will need to replace these credentials with your own user name and password that were given to you when creating the service specific credentials.

[auth_provider]
;; you can specify any auth provider found in your python environment
;; module and class will be used to dynamically load the class
;; all other properties found here and in the credentials file under the class name
;; will be passed to the constructor
module = cassandra.auth
classname = PlainTextAuthProvider
cqlsh-expansion cassandra.us-east-1.amazonaws.com -u Sri-user-99 -p user-pass-01

Cleanup

To remove the cqlsh-expansion package you can use the pip uninstall api. Additionally, if you executed the post install script cqlsh-expansion.init, you may want to delete the .cassandra directory which contains the cqlshrc file and the ssl certificate. Using pip uninstall will not remove changes made by the post install script.

pip uninstall cqlsh-expansion

New output for TTY

When creating a new cqlsh session with the cqlsh-expansion utility, it will show the default consistency level after establishing a new connection. We find customers using cqlsh may not be aware of the default consistency level of ONE, and additional transparency will lead to better operational excellence.

COPY FROM/TO required Consistency Levels

When executing the COPY FROM import operation from the cqlsh-expansion utility, LOCAL_QUORUM will be strictly enforced. Executing COPY FROM with consistency level other than LOCAL_QUORUM will result in an SyntaxError. This restriction is to provide better experience when using COPY FROM with Amazon Keyspaces. Amazon Keyspaces replicates all write operations three times across multiple Availability Zones for durability and high availability. Writes are durably stored before they are acknowledged using the LOCAL_QUORUM consistency level. When executing the COPY TO export operation from the cqlsh-expansion utility, consistency of ONE, LOCAL_ONE, or LOCAL_QUORUM will be strictly enforced. Executing COPY FROM with consistency level other than these three will result in an SyntaxError. This restriction is to provide better experience when using COPY FROM with Amazon Keyspaces.

Contributing:


# Security

See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.

# License

This library is licensed under the MIT-0 License. See the LICENSE file.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cqlsh-expansion-0.9.6.tar.gz (144.4 kB view details)

Uploaded Source

Built Distribution

cqlsh_expansion-0.9.6-py3-none-any.whl (153.7 kB view details)

Uploaded Python 3

File details

Details for the file cqlsh-expansion-0.9.6.tar.gz.

File metadata

  • Download URL: cqlsh-expansion-0.9.6.tar.gz
  • Upload date:
  • Size: 144.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.2

File hashes

Hashes for cqlsh-expansion-0.9.6.tar.gz
Algorithm Hash digest
SHA256 79ae5ec3b685d7d25c773a0c80baef963d060bfc0b7db22c0012ca471713e834
MD5 5ad2697f28e29c998a398229089e7c23
BLAKE2b-256 8f34a1e5e00e9fa5b40e2b5092188b3ba9919fd3d3fd95a161d19701ad3f1f49

See more details on using hashes here.

File details

Details for the file cqlsh_expansion-0.9.6-py3-none-any.whl.

File metadata

File hashes

Hashes for cqlsh_expansion-0.9.6-py3-none-any.whl
Algorithm Hash digest
SHA256 8071c5781dd32385bad57fd9d05ae2ac7b1ae6ca9a0f5537bba803197cccb508
MD5 d4b0ae71b6184b75e6fcc92d528cab86
BLAKE2b-256 e3e52a0d6b0edd5d14376fee92cf71e553bb94cdd724161f39d9a27daa730713

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page