Skip to main content

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Configuring a Cassandra cluster for internal encryption

Suggest edit Updated on April 5, 2022

This content applies only to On-premises and Client-managed cloud environments

Protect data that is transferred internally between Decision Data Store (DDS) nodes in Pega Platform by using node-to-node encryption.

Note: DDS nodes require node-to-node encryption.
  1. In the prconfig.xml file, enable node-to-node encryption by setting the dnode/cassandra_internode_encryption property to true.
  2. Configure the remaining prconfig.xml settings.
    For more information about the prconfig.xml properties for node-to-node encryption, see Prconfig properties for Cassandra cluster encryption.
  3. Create Java keystores and truststores along with SSL certificates.
    For more information, see Creating Java keystores and truststores for Cassandra encryption.Note: If you do not create separate Java keystores and truststores for external encryption, Cassandra uses the keystores and trustores that you specify for internal encryption.
  4. Copy the keystore.shared and truststore.shared files to the external Cassandra directory.
  5. In the prconfig.xml and cassandra.yaml files, update the configuration with the file paths and passwords to the certificates.
  6. Restart Pega Platform for the changes to take effect.
  • Previous topic Creating Cassandra user roles with limited database access
  • Next topic Prconfig properties for Cassandra cluster encryption
Did you find this content helpful? YesNo

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us