Flylib.com
Linux Clustering With Csm and Gpfs
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
Table of Contents
BackCover
Linux Clustering with CSM and GPFS
Notices
Preface
Become a published author
Comments welcome
Summary of Changes
Part 1: Fundamentals
Chapter 1: Clustering Concepts and General Overview
1.2 Cluster types
1.3 Beowulf clusters
1.4 Linux, open source, and clusters
1.5 IBM Linux clusters
1.6 Cluster logical structure
1.7 Other cluster hardware components
1.8 Cluster software
Chapter 2: New Linux Cluster Offering From IBM: Cluster 1350
2.1 Product overview
2.2 Hardware
2.3 Software
2.4 Services
2.5 Summary
Chapter 3: Introducing Cluster Systems Management for Linux
3.1 IBM Cluster Systems Management overview
3.2 CSM architecture
3.3 CSM monitoring
3.4 CSM management components
3.5 CSM hardware requirements
3.6 Software requirements to run CSM
3.7 Quick installation process overview
3.8 CSM futures
3.9 Summary
Chapter 4: Introducing General Parallel File System for Linux
4.2 GPFS architecture
4.3 GPFS requirements
4.4 Summary
Part 2: Implementation and Administration
Chapter 5: Cluster Installation and Configuration with CSM
5.1 Planning the installation
5.2 Configuring the management server
5.3 CSM installation on compute and storage nodes
5.4 Special considerations for storage node installation
5.5 Summary
Chapter 6: Cluster Management with CSM
6.1 Changing the nodes in your cluster
6.2 Remote controlling nodes
6.3 Node groups
6.4 Running commands on the nodes
6.5 Configuration File Manager (CFM)
6.6 Software maintenance system (SMS)
6.7 Event monitoring
6.8 Backing up CSM
6.9 Uninstalling CSM
Chapter 7: GPFS Installation and Configuration
7.1 Basic steps to install GPFS
7.2 GPFS planning
7.3 Preparing the environment
7.4 GPFS installation
7.5 Creating the GPFS cluster
7.6 Creating the GPFS nodeset
7.7 Starting GPFS
7.8 Disk definitions
7.9 Exporting a GPFS file system using NFS
7.10 GPFS shutdown
7.11 Summary
Chapter 8: Managing the GPFS Cluster
8.1 Adding and removing disks from GPFS
8.2 Removing all GPFS file systems and configuration
8.3 Access Control Lists (ACLs)
8.4 GPFS logs and traces
8.5 Troubleshooting: Some possible GPFS problems
8.6 Gather information before contacting Support Center
Chapter 9: Migrating xCat Clusters to CSM
9.1 xCAT overview
9.2 Migrating xCAT clusters to CSM
9.3 xCAT and CSM co-existence
Part 3: Appendixes
Appendix A: SRC and RSCT
System Resource Controller (SRC)
Reliable Scalable Cluster Technology (RSCT)
Appendix B: Common Facilities
DNS server
OpenSSH
Appendix C: Migrating to GPFS 1.3 From Earlier Versions
Appendix D: Planning Worksheets
CSM planning worksheets
GPFS Planning worksheets
Glossary
Abbreviations and Acronyms
Related Publications
Other publications
Online resources
How to get IBM Redbooks
Help from IBM
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_X
Index_Z
List of Figures
List of Tables
List of Examples
Linux Clustering With Csm and Gpfs
ISBN: 073849870X
EAN: 2147483647
Year: 2003
Pages: 123
Authors:
IBM Redbooks
BUY ON AMAZON
CISSP Exam Cram 2
The Role of CIA
Answers to Exam Prep Questions
Database Management
Forensics
Symmetric Encryption
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
Configuration Verification and Audit
Configuration Management and Data Management
Metrics and Configuration Management Reference
Appendix I System Service Request
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Cisco Gateway Concepts
Route Filters
Video Protocols Supported in Cisco CallManager
C++ How to Program (5th Edition)
Wrap-Up
Introduction
Stream Error States
Iterators
F.5. Conditional Compilation
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Java All-In-One Desk Reference For Dummies
Welcome to Java
Book II - Programming Basics
Pulling a Switcheroo
Using Subclasses and Inheritance
Network Programming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies