diff --git a/nixos/modules/services/databases/cassandra.nix b/nixos/modules/services/databases/cassandra.nix
index d6071b6ee67..452691e4232 100644
--- a/nixos/modules/services/databases/cassandra.nix
+++ b/nixos/modules/services/databases/cassandra.nix
@@ -229,11 +229,11 @@ in {
example = literalExample "null";
description = ''
Set the interval how often full repairs are run, i.e.
- `nodetool repair --full` is executed. See
+ nodetool repair --full is executed. See
https://cassandra.apache.org/doc/latest/operating/repair.html
for more information.
- Set to `null` to disable full repairs.
+ Set to null to disable full repairs.
'';
};
fullRepairOptions = mkOption {
@@ -250,11 +250,11 @@ in {
example = literalExample "null";
description = ''
Set the interval how often incremental repairs are run, i.e.
- `nodetool repair` is executed. See
+ nodetool repair is executed. See
https://cassandra.apache.org/doc/latest/operating/repair.html
for more information.
- Set to `null` to disable incremental repairs.
+ Set to null to disable incremental repairs.
'';
};
incrementalRepairOptions = mkOption {
@@ -342,6 +342,8 @@ in {
description = ''
Roles that are allowed to access the JMX (e.g. nodetool)
BEWARE: The passwords will be stored world readable in the nix-store.
+ It's recommended to use your own protected file using
+ jmxRolesFile
Doesn't work in versions older than 3.11 because they don't like that
it's world readable.
@@ -388,7 +390,8 @@ in {
{ assertion = cfg.remoteJmx -> cfg.jmxRolesFile != null;
message = ''
If you want JMX available remotely you need to set a password using
- `jmxRoles` or `jmxRolesFile` if using Cassandra older than v3.11.
+ jmxRoles or jmxRolesFile if
+ using Cassandra older than v3.11.
'';
}
];