Hi Everyone, Starting to shift focus now to the NetworkTopology strategy and how it works with Ec2Snitch. .. or how it can be complemented. A few questions have come to mind:
- how can i validate and assure that if RF=3 and the topology is designed such that 2 copies are kept in 1 DC and a 3rd is kept in another DC? Is there a way to query a key to find out where that key physically exists? - In defining the network topology for Ec2 ... has anyone done this, with success? Reading material is a bit sparse in this area Finally, for what it's worth, I circumvented some of the problems I was having with region <- -- -> region communication with Ec2 and cassandra by routing all cassandra traffic through vpn tunnels. This has greatly reduced the latency while still allowing me to utilize the Ec2 snitch to report on where each instance is. -sd -- Sasha Dolgy sasha.do...@gmail.com