Solved

kernel tuning parameters--semaphore facility

Posted on 1999-01-11
3
390 Views
Last Modified: 2013-12-27

How do the ipc tuning parameters relate? Specifically, I have an application that suggests I boost semmni up to "a large value". If I boost semmni, what else should I boost?

What is a reasonable figure for "a large value"?

This particular app is IBM MQ Series v5, under Solaris 2.5.1 on an UltraSparc with 256 MB memory, but I have seen similar vague instructions on other OS's/applications.

Thanks,
Kai.
0
Comment
Question by:kai_hintze
3 Comments
 

Expert Comment

by:procguy
ID: 2008679
Kai,

Any excellent series of articles on shared memory and semaphores under Solaris appeared in SunWorld magazine in Sept & Oct '97.

The links are as follows:

http://www.sunworld.com/sunworldonline/swol-09-1997/swol-09-insidesolaris.html

and

http://www.sunworld.com/swol-10-1997/swol-10-insidesolaris.html

Read these and you'll obtain a good understanding of how to tune the OS for an app or apps.

If you have any questions, I'll help the best I can.  I'm betting at tuning for Web servers and databases though, but the principles are the same.

procguy

0
 

Author Comment

by:kai_hintze
ID: 2008680
Bingo. I had found a couple of other SunWorld articles lauding the dynamic memory allocation in Solaris 2.5.1 so that tuning wasn't necessary, but I knew that couldn't be the whole story, or why weren't the programs working. These articles give some useful guidelines.

Thanks!

0
 
LVL 3

Accepted Solution

by:
bluepet earned 200 total points
ID: 2008681
hae you try setting the pt_cnt to higher value.... certain program won't run if the pseudo-ttys is too low

set the pt_cnt to higher value

set pt_cnt=100  

the default value is 48

check your kernel parameter by typing sysdef

however always a good practice to backup your /etc/system before changing anything....
the change to 100 should not do anything bad to your system...  

hope that help
bluepet
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SSH commands for Nas4free 21 425
LINUX ZIP - UNCOMPRESS WINDOWS PATH 3 98
Sed question 2 86
replace content of certain columns in a *.csv file by a defined string 12 69
Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question