You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
Using Custom Configuration File
KubeDB supports providing custom configuration for Cassandra. This tutorial will show you how to use KubeDB to run a Cassandra with custom configuration.
Before You Begin
At first, you need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. If you do not already have a cluster, you can create one by using kind.
Now, install KubeDB cli on your workstation and KubeDB operator in your cluster following the steps here.
To keep things isolated, this tutorial uses a separate namespace called
demothroughout this tutorial. Run the following command to prepare your cluster for this tutorial:$ kubectl create ns demo namespace/demo created
Note: The yaml files used in this tutorial are stored in docs/examples/cassandra folder in GitHub repository kubedb/docs.
Overview
When spec.configuration.secretName is specified, the KubeDB operator retrieves the referenced Secret and validates the configuration values provided by the user.
The validated configuration is then internally managed and applied by the operator.
To learn available configuration option of Cassandra see Configuration Options.
At first, you have to create a secret with your configuration file contents as the value of this key cassandra.yaml. Then, you have to specify the name of this secret in spec.configuration.secretName section while creating cassandra CRO.
Custom Configuration
At first, create cassandra.yaml file containing required configuration settings.
$ cat cassandra.yaml
read_request_timeout: 6000ms
write_request_timeout: 2500ms
Now, create the secret with this configuration file.
$ kubectl create secret generic -n demo cas-configuration --from-file=./cassandra.yaml
secret/cas-configuration created
Verify the secret has the configuration file.
$ kubectl get secret -n demo cas-configuration -o yaml
apiVersion: v1
data:
cassandra.yaml: cmVhZF9yZXF1ZXN0X3RpbWVvdXQ6IDYwMDBtcwp3cml0ZV9yZXF1ZXN0X3RpbWVvdXQ6IDI1MDBtcwo=
kind: Secret
metadata:
creationTimestamp: "2025-07-15T08:53:26Z"
name: cas-configuration
namespace: demo
resourceVersion: "105786"
uid: 135c819c-fba6-4800-9ae0-fac35312fab2
type: Opaque
$ echo cmVhZF9yZXF1ZXN0X3RpbWVvdXQ6IDYwMDBtcwp3cml0ZV9yZXF1ZXN0X3RpbWVvdXQ6IDI1MDBtcwo= | base64 -d
read_request_timeout: 6000ms
write_request_timeout: 2500ms
Now, create cassandra crd specifying spec.configuration.secretName field.
apiVersion: kubedb.com/v1alpha2
kind: Cassandra
metadata:
name: cas-custom-config
namespace: demo
spec:
version: 5.0.3
configuration:
secretName: cas-configuration
topology:
rack:
- name: r0
replicas: 2
storage:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 1Gi
storageType: Durable
deletionPolicy: WipeOut
$ kubectl create -f https://github.com/kubedb/docs/raw/v2026.2.16-rc.0/docs/examples/cassandra/configuration/cassandra-config-file.yaml
cassandra.kubedb.com/cas-custom-config created
Now, wait a few minutes. KubeDB operator will create necessary petset, services, secret etc. If everything goes well, we will see that a pod with the name cas-custom-config-0 has been created.
Check that the petset’s pod is running
$ kubectl get pod -n demo cas-custom-config-rack-r0-0
NAME READY STATUS RESTARTS AGE
cas-custom-config-rack-r0-0 1/1 Running 0 36s
Now, we will check if the cassandra has started with the custom configuration we have provided.
Now, you can exec into the cassandra pod and find if the custom configuration is there,
$ kubectl exec -it -n demo cas-custom-config-rack-r0-0 -- bash
Defaulted container "cassandra" out of: cassandra, cassandra-init (init), medusa-init (init)
[cassandra@cas-custom-config-rack-r0-0 /]$ cat /etc/cassandra/cassandra.yaml | grep request_timeout
read_request_timeout: 6000ms
range_request_timeout: 10000ms
write_request_timeout: 2500ms
counter_write_request_timeout: 5000ms
truncate_request_timeout: 60000ms
request_timeout: 10000ms
[cassandra@cas-custom-config-rack-r0-0 /]$ exit
exit
As we can see from the configuration of running cassandra, the value of read_request_timeout and write_request_timeout has been set to our desired value successfully.
Cleaning up
To clean up the Kubernetes resources created by this tutorial, run:
kubectl delete -n demo cas/cas-custom-config
kubectl delete -n demo secret cas-configuration
kubectl delete ns demo
Next Steps
- Monitor your cassandra database with KubeDB using out-of-the-box Prometheus operator.
- Monitor your Pgpool database with KubeDB using out-of-the-box builtin-Prometheus.
- Detail concepts of Cassandra object.
- Detail concepts of CassandraVersion object.
- Want to hack on KubeDB? Check our contribution guidelines.































