There is a JMX operation to get the endpoints for a token
http://wiki.apache.org/cassandra/JmxInterface#org.apache.cassandra.service.StorageService.Operations.getNaturalEndpoints

You can also specify a key when using bin/sstable2json if you want to grab the 
actual data from a file. 

If you were using vpn for security have you looked at encryption in 0.8 ? 
https://svn.apache.org/viewvc/cassandra/tags/cassandra-0.8.0-beta1/NEWS.txt?view=co


Aaron
 
On 18 Apr 2011, at 19:21, Sasha Dolgy wrote:

> Hi Everyone,
> 
> Starting to shift focus now to the NetworkTopology strategy and how it
> works with Ec2Snitch.  .. or how it can be complemented.  A few
> questions have come to mind:
> 
> - how can i validate and assure that if RF=3 and the topology is
> designed such that 2 copies are kept in 1 DC and a 3rd is kept in
> another DC?  Is there a way to query a key to find out where that key
> physically exists?
> - In defining the network topology for Ec2 ... has anyone done this,
> with success?  Reading material is a bit sparse in this area
> 
> Finally, for what it's worth, I circumvented some of the problems I
> was having with region <- -- -> region communication with Ec2 and
> cassandra by routing all cassandra traffic through vpn tunnels.  This
> has greatly reduced the latency while still allowing me to utilize the
> Ec2 snitch to report on where each instance is.
> 
> -sd
> 
> -- 
> Sasha Dolgy
> sasha.do...@gmail.com

Reply via email to