04-30-2015
How many LPARs do you want to have on it? How many resources should the LPARs have?
Can you write a small table:
LPAR1 0.5 CPU, 8 GB RAM, VLAN 10, SAN Fabric 1, my sandbox
LPAR2 2 CPU, 32GB RAM, VLAN 20, SAN Fabric 1, database
and so on. Don't include VIOSes for now and don't try to use _all_ the CPU/RAM resources in the server.
This is planning. We assume for now, that you've read the documentation.
10 More Discussions You Might Find Interesting
1. AIX
can i get a step b syep explanation in creating LPAR... i have searched for tutorials i couldn't find the right one.... (2 Replies)
Discussion started by: udtyuvaraj
2 Replies
2. AIX
Hi all,
I have the following configuration
2 ds3524 storage disk systems located over 2 locations
2 P720 server located over 2 locations
DS3524 are connected to san switch.
Each vio server has 1 fc adapter attached to a san switch.
per p720 server 2 virtual io servers. Vio 1 has 1 lun... (2 Replies)
Discussion started by: markiemark
2 Replies
3. AIX
hi guys,
i need to develop following setup for a customer:
high availability oracle database on aix7 and linux in 2 different LPAR using dual ps700 blande a ds3400 and HMC.
the question is, it is possible to have automatic vioc failover(aix,linux) when for example 1 vios goes down?
in... (6 Replies)
Discussion started by: gullio23
6 Replies
4. Solaris
Hi,
I am creating "LSOF" solaris package from solaris "source" files. I have compiled the source file and with that i created prototype file also. Then using pkgmk command i can make the package .
In the package i am having (pkginfo pkgmap reloc) two file and one directory respectively
But... (3 Replies)
Discussion started by: Kathirvel G
3 Replies
5. AIX
Hi all please give me a link for IBM PowerVM (4 Replies)
Discussion started by: babinlonston
4 Replies
6. Windows & DOS: Issues & Discussions
Hello everyone,
I've been attempting to make a program which creates user accounts from a file which contains the usernames required. It also checks if the directory of the username exists in the C:\Users directory and then is going to give the option to delete the directory, or rename it, this... (1 Reply)
Discussion started by: charlieabee
1 Replies
7. AIX
Some simple questions about Intellistation 285 and powervm.
I want to learn AIX,so i will buy an used I285 from ebay.
1)Will support aix 7.1?
2)Is powervm avaliable?Where to download or buy it?
Thanks (3 Replies)
Discussion started by: Linusolaradm1
3 Replies
8. AIX
There can be configurations in IBM Server wherein a
standalone partition is created on some supported IBM Server
Or
A VIOS - VIOC LPARs created.
Now in both cases they are lpars. But if I want to differentiate b/w a standalone LPAR vs an VIOC LPAR how can I do..?
On a... (2 Replies)
Discussion started by: Manish00712
2 Replies
9. AIX
Hello,
POWER7 machine.
4 x 1Gbit port ethernet adapter is dedicated to vios. 8023ad etherchannel is created using those 4 ports. Etherchannel adapter is shared to lpars using SEA.
If I test network performance directly from vios partition (using iperf) I'm geting nice 4Gbit throughput. But if... (3 Replies)
Discussion started by: vilius
3 Replies
10. AIX
Hello,
After installing on P6 which is POWERVM IVM VIOS enabled (VET CODE D21C77ACD9229817CA1F00002C10004164 )
i get this message
"I/O hosting requires a hosting partition - boot not permitted".
HMC was connected to the machine
then HMC was removed through ASMI
Searching on... (2 Replies)
Discussion started by: filosophizer
2 Replies
LEARN ABOUT DEBIAN
scrypt
SCRYPT(1) BSD General Commands Manual SCRYPT(1)
NAME
scrypt -- encrypt and decrypt files.
SYNOPSIS
scrypt {enc | dec} [-M maxmem] [-m maxmemfrac] [-t maxtime] infile [outfile]
DESCRIPTION
scrypt enc encrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to
enter a passphrase (twice) to be used to generate a derived encryption key.
scrypt dec decrypts infile and writes the result to outfile if specified, or the standard output otherwise. The user will be prompted to
enter the passphrase used at encryption time to generate the derived encryption key.
OPTIONS
-M maxmem Use at most maxmem bytes of RAM to compute the derived encryption key.
-m maxmemfrac Use at most the fraction maxmemfrac of the available RAM to compute the derived encryption key.
-t maxtime Usr at most maxtime seconds of CPU time to compute the derived encryption key.
In scrypt enc, the memory and CPU time limits are enforced by picking appropriate parameters to the scrypt key derivation function. In
scrypt dec, the memory and CPU time limits are enforced by exiting with an error if decrypting the file would require too much memory or CPU
time.
EXIT STATUS
The scrypt utility exits 0 on success, and >0 if an error occurs.
Note that if the input encrypted file is corrupted, scrypt dec may produce output prior to determining that the input was corrupt and exiting
with a non-zero status; so users should direct the output to a safe location and check the exit status of scrypt before using the decrypted
data.
SEE ALSO
Colin Percival, Stronger Key Derivation via Sequential Memory-Hard Functions, May 2009, Presented at BSDCan'09.
HISTORY
The scrypt utility was written in May 2009 by Colin Percival as a demonstration of the scrypt key derivation function. The scrypt key
derivation function was invented in March 2009 by Colin Percival in order to allow key files from the tarsnap backup system to be passphrase
protected.
BSD
May 24, 2009 BSD