10 More Discussions You Might Find Interesting
1. Ubuntu
Hi All,
I am new user here and a new one to try clustering with Ubuntu nodes, and need help. If I should be in another place please mention.
I have a two nodes with Ubuntu 14.04 installed on them. I need to make a cluster consisting of these two nodes with purpose of experimentation with... (3 Replies)
Discussion started by: IncognitoExpert
3 Replies
2. HP-UX
Hello guys,
I would like to ask for your assistance, since i am new to HP-UX.
Please give me some documentation about clustering in HP-UX. More precisely design,architecture, configuring etc. I am working on my master thesis right now and would like to include some guidance about that.... (1 Reply)
Discussion started by: bazillion
1 Replies
3. Ubuntu
Dear,
Please help me to configure application clustering in linux ubuntu. Application is running apache server.
Please help
Jewel
---------- Post updated at 01:07 PM ---------- Previous update was at 12:48 PM ----------
linuxvirtualserver dot org
in this link i go there's three... (2 Replies)
Discussion started by: Jewel100
2 Replies
4. Linux
Hi,
I have done the OS clustering in linux redhat 5.6, my one node is down and when i am trying to reboot the other node it is not coming up. any pointer to this would be helpful.
the SAN storage luns are not coming as mounted (2 Replies)
Discussion started by: mohitj.engg
2 Replies
5. Solaris
SunOS 5.10 Generic_142900-15 sun4u sparc SUNW,SPARC-Enterprise
How can I tell if "clustering" is being used in my shop?
I have to file systems that are identical. These filesystems are nfs mounted. But how can I tell if they are being kept in sync as a result of clustering or some other... (2 Replies)
Discussion started by: Harleyrci
2 Replies
6. HP-UX
hi,
do u know any link that will get back to me up to speed on hp serviceguard on clustering?
thanks and much appreciated,
itik (2 Replies)
Discussion started by: itik
2 Replies
7. Red Hat
Hello Professionals,
We have high-end HP rack servers. We need to provide application fail-over for business continuity.
We have done benchmarking of the application on RHEL 5.2 on HP servers to estimate the hardware requirement so as to meet next 3-5 years business growth.
Presently we... (1 Reply)
Discussion started by: kgayyar
1 Replies
8. UNIX for Advanced & Expert Users
Can anybody help me how to mirror the solaris 10 step-by-step with veritas. Have two disks. Then how can I cluster with veritas (1 Reply)
Discussion started by: karole
1 Replies
9. UNIX for Dummies Questions & Answers
I woulld like to use the JDE newest version, but I am considering whether using 2 X Wintel server with clustering or 1 Unix server without clustering. Is Unix stable enough to except the clustering? (0 Replies)
Discussion started by: superlouis
0 Replies
10. UNIX for Advanced & Expert Users
Dear All Experts,
Would like to know the maturity/ stability of Redhat Linux AS 3.0 and Solaris.
My organization need to setup cluster solution. We are well-versed with Veritas Cluster on Solaris.
We are thinking of waiting for certification support of the various ISV like Oracle, Veritas... (3 Replies)
Discussion started by: izy100
3 Replies
AUTHKEYS(5) Configuration Files AUTHKEYS(5)
NAME
authkeys - Authentication file for the Heartbeat cluster messaging layer
DESCRIPTION
/etc/ha.d/authkeys is read by heartbeat(8). It enables Heartbeat to securely authenticate cluster nodes.
This file must not be readable or writable by any users other than root.
FILE FORMAT
Two lines are required in the authkeys file:
1. A line which says which key to use in signing outgoing packets
2. One or more lines defining how incoming packets might be being signed.
The file must follow the following format:
auth num
num method secret
num method secret
num method secret
...
num is a numerical identifier, between 1 and 15 inclusive. It must be unique within the file.
method is one of the available authentication signature methods (see below for supported methods).
secret is an alphanumerical shared secret used to identify cluster nodes to each other.
auth num selects the currently active authentication method and secret.
SUPPORTED SIGNATURE METHODS
The following signature methods are supported in authkeys (listed here in alphabetical order):
md5
MD5 hash method. This method requires a shared secret.
sha1
SHA-1 hash method. This method requires a shared secret.
crc
Cyclic Redundancy Check hash method. This method does not require a shared secret and is insecure; it's use is strongly discouraged.
An absolutely up-to-date list of authentication methods supported may be retrieved by running ls /usr/lib/heartbeat/plugins/HBauth/*.so.
AUTHORS
Alan Robertson <alanr@unix.sh>
heartbeat, original Wiki page
Florian Haas <florian.haas@linbit.com>
man page
Heartbeat 3.0.5 24 Nov 2009 AUTHKEYS(5)