Sponsored Content
Operating Systems Linux How to setup Parallel Cluster in Linux Post 302142034 by neel.gurjar on Wednesday 24th of October 2007 03:11:48 AM
Old 10-24-2007
Database is not much big so I didnot seperate db server. Tally is accounting software which eats around 50MB RAM.

But is it possible to get collective output of n number of PCs ?
For example: If my server requirement is 3 GB RAM and 3 Ghz CPU. Then instead of bying one server of that much capacity, can I use 3 PCs each of 1 GB RAM and 1 Ghz CPU ?

Thanks
NeeleshG
 

7 More Discussions You Might Find Interesting

1. Solaris

how to setup the veritas cluster

hi frnz, let me know how to configutre the veritas cluster.... (3 Replies)
Discussion started by: Kbharat20
3 Replies

2. High Performance Computing

cluster setup and nfs

hello, During the cluster installation, we are required to enter a cluster name. When this name is used? I have a shared disk between those 2 nodes. To test NFS failover, what should I do? PS: I am using VCS 5 thanks (5 Replies)
Discussion started by: melanie_pfefer
5 Replies

3. Solaris

Sun cluster setup question

I have 2 sun blade 1500 with Qlogic card and T3 storedge. I can connect to the T3 storedge through my boxes. Now I want to setup cluster, in order to setup I need to buy a Fiber Channel switch. Can I buy any fiber channel switch? Can you recommend some old switches? I can get it from ebay. ... (4 Replies)
Discussion started by: mokkan
4 Replies

4. High Performance Computing

Linux cluster

Hi, I am not sure if the term "cluster" fits my situation or not. I have 5 Linux computers, each has different a host-name, and my users have to remember those the computer names to login and find out which computers have free CPUs, so they can run their jobs on those computers have free CPUs. ... (4 Replies)
Discussion started by: hiepng
4 Replies

5. Shell Programming and Scripting

What is the parallel execution command available in Ubuntu Linux?

Hi, I am using Ubuntu 10.04 LTS 32-bit. I would like to execute a command in two or more servers (multiple remote hosts) in parallel. The commands "shmux" or "on" are not available in Ubuntu. Could anyone tell me what other equivalent commands available in Ubuntu to accomplish this task? (1 Reply)
Discussion started by: royalibrahim
1 Replies

6. Shell Programming and Scripting

linux cluster

Hi all, we have setup one cluster with two nodes. -drbd -corosync -pacemaker -mysql -piranha sometimes, we loose connection between the two nodes (node 1 and node 2). When this happens, the two nodes starts both the services as masters,because they don't see each other. is there any way... (2 Replies)
Discussion started by: arrals_vl
2 Replies

7. UNIX for Dummies Questions & Answers

Linux Cluster or HA

hi guys Back in 2009 and 2010 I configured some clusters using Linux HA Heartbeat version 2.1.4 for suse 10 SP3 now I see Linux HA heartbeat is kind of outdated last release 2011, since I have to configure 2 new clusters I was wondering what do you recommend for cluster tool nowadays? I... (0 Replies)
Discussion started by: karlochacon
0 Replies
SYSTEMD-CRYPTSETUP-GENERATOR(8) 			   systemd-cryptsetup-generator 			   SYSTEMD-CRYPTSETUP-GENERATOR(8)

NAME
systemd-cryptsetup-generator - Unit generator for /etc/crypttab SYNOPSIS
/lib/systemd/system-generators/systemd-cryptsetup-generator DESCRIPTION
systemd-cryptsetup-generator is a generator that translates /etc/crypttab into native systemd units early at boot and when configuration of the system manager is reloaded. This will create systemd-cryptsetup@.service(8) units as necessary. systemd-cryptsetup-generator implements systemd.generator(7). KERNEL COMMAND LINE
systemd-cryptsetup-generator understands the following kernel command line parameters: luks=, rd.luks= Takes a boolean argument. Defaults to "yes". If "no", disables the generator entirely. rd.luks= is honored only by initial RAM disk (initrd) while luks= is honored by both the main system and the initrd. luks.crypttab=, rd.luks.crypttab= Takes a boolean argument. Defaults to "yes". If "no", causes the generator to ignore any devices configured in /etc/crypttab (luks.uuid= will still work however). rd.luks.crypttab= is honored only by initial RAM disk (initrd) while luks.crypttab= is honored by both the main system and the initrd. luks.uuid=, rd.luks.uuid= Takes a LUKS superblock UUID as argument. This will activate the specified device as part of the boot process as if it was listed in /etc/crypttab. This option may be specified more than once in order to set up multiple devices. rd.luks.uuid= is honored only by initial RAM disk (initrd) while luks.uuid= is honored by both the main system and the initrd. If /etc/crypttab contains entries with the same UUID, then the name, keyfile and options specified there will be used. Otherwise, the device will have the name "luks-UUID". If /etc/crypttab exists, only those UUIDs specified on the kernel command line will be activated in the initrd or the real root. luks.name=, rd.luks.name= Takes a LUKS super block UUID followed by an "=" and a name. This implies rd.luks.uuid= or luks.uuid= and will additionally make the LUKS device given by the UUID appear under the provided name. rd.luks.name= is honored only by initial RAM disk (initrd) while luks.name= is honored by both the main system and the initrd. luks.options=, rd.luks.options= Takes a LUKS super block UUID followed by an "=" and a string of options separated by commas as argument. This will override the options for the given UUID. If only a list of options, without an UUID, is specified, they apply to any UUIDs not specified elsewhere, and without an entry in /etc/crypttab. rd.luks.options= is honored only by initial RAM disk (initrd) while luks.options= is honored by both the main system and the initrd. luks.key=, rd.luks.key= Takes a password file name as argument or a LUKS super block UUID followed by a "=" and a password file name. For those entries specified with rd.luks.uuid= or luks.uuid=, the password file will be set to the one specified by rd.luks.key= or luks.key= of the corresponding UUID, or the password file that was specified without a UUID. rd.luks.key= is honored only by initial RAM disk (initrd) while luks.key= is honored by both the main system and the initrd. SEE ALSO
systemd(1), crypttab(5), systemd-cryptsetup@.service(8), cryptsetup(8), systemd-fstab-generator(8) systemd 237 SYSTEMD-CRYPTSETUP-GENERATOR(8)
All times are GMT -4. The time now is 04:42 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy