Hi Everyone,

Starting to shift focus now to the NetworkTopology strategy and how it
works with Ec2Snitch.  .. or how it can be complemented.  A few
questions have come to mind:

- how can i validate and assure that if RF=3 and the topology is
designed such that 2 copies are kept in 1 DC and a 3rd is kept in
another DC?  Is there a way to query a key to find out where that key
physically exists?
- In defining the network topology for Ec2 ... has anyone done this,
with success?  Reading material is a bit sparse in this area

Finally, for what it's worth, I circumvented some of the problems I
was having with region <- -- -> region communication with Ec2 and
cassandra by routing all cassandra traffic through vpn tunnels.  This
has greatly reduced the latency while still allowing me to utilize the
Ec2 snitch to report on where each instance is.

-sd

-- 
Sasha Dolgy
sasha.do...@gmail.com

Reply via email to