I had also posted this last month:
http://cassandra-user-incubator-apache-org.3065146.n2.nabble.com/Re-SSL-amp-Streaming-1567-td6196693.html
"I only want to encrypt data from region 1 < -- > region 2 where a vpn
is not possible... data communication in the same rack for example, is
on a private n
Cheers Aaron ...
getNaturalEndpoints is perfect. I can pull a random key and analyze
the results to check our business rules. Automated through monitoring
... Excellent.
As for security, I had looked at the SSL option a month ago maybe ...
For us, this would be a great feature, except, by imp
There is a JMX operation to get the endpoints for a token
http://wiki.apache.org/cassandra/JmxInterface#org.apache.cassandra.service.StorageService.Operations.getNaturalEndpoints
You can also specify a key when using bin/sstable2json if you want to grab the
actual data from a file.
If you were
Hi Everyone,
Starting to shift focus now to the NetworkTopology strategy and how it
works with Ec2Snitch. .. or how it can be complemented. A few
questions have come to mind:
- how can i validate and assure that if RF=3 and the topology is
designed such that 2 copies are kept in 1 DC and a 3rd