don't think anyone would tell you differently.  On the
other hand you don't normally place a cluster on an
unprotected network.

can NIS actually preserve shadow-ness of passwords? I would never run a cluster that exposed encrypted passwords.

almost 100% of capacity. There are enough changes
happening this morning that rsyncing, parallel copy,
etc just becomes onerous so I am turning on NIS today
for it.

for small clusters, I would definitely use nfs-root;
for larger ones, probably ldap. having a cron job run rsync frequently isn't a terrible solution, though,
especially if there's one canonical node (a login node)
where the only changes are made.
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to