diff --git a/nixos/modules/services/databases/cassandra.nix b/nixos/modules/services/databases/cassandra.nix index d6071b6ee67..452691e4232 100644 --- a/nixos/modules/services/databases/cassandra.nix +++ b/nixos/modules/services/databases/cassandra.nix @@ -229,11 +229,11 @@ in { example = literalExample "null"; description = '' Set the interval how often full repairs are run, i.e. - `nodetool repair --full` is executed. See + nodetool repair --full is executed. See https://cassandra.apache.org/doc/latest/operating/repair.html for more information. - Set to `null` to disable full repairs. + Set to null to disable full repairs. ''; }; fullRepairOptions = mkOption { @@ -250,11 +250,11 @@ in { example = literalExample "null"; description = '' Set the interval how often incremental repairs are run, i.e. - `nodetool repair` is executed. See + nodetool repair is executed. See https://cassandra.apache.org/doc/latest/operating/repair.html for more information. - Set to `null` to disable incremental repairs. + Set to null to disable incremental repairs. ''; }; incrementalRepairOptions = mkOption { @@ -342,6 +342,8 @@ in { description = '' Roles that are allowed to access the JMX (e.g. nodetool) BEWARE: The passwords will be stored world readable in the nix-store. + It's recommended to use your own protected file using + jmxRolesFile Doesn't work in versions older than 3.11 because they don't like that it's world readable. @@ -388,7 +390,8 @@ in { { assertion = cfg.remoteJmx -> cfg.jmxRolesFile != null; message = '' If you want JMX available remotely you need to set a password using - `jmxRoles` or `jmxRolesFile` if using Cassandra older than v3.11. + jmxRoles or jmxRolesFile if + using Cassandra older than v3.11. ''; } ];