Solved

simulating a cluster with vmware

Posted on 2002-03-17
8
599 Views
Last Modified: 2013-11-15
I heard it should be possible on a single PC, but

- is SCSI required?
- do I need the gsx server?
- what else is important?

Would be very nice to test MSCS at home...
0
Comment
Question by:franka
  • 5
  • 2
8 Comments
 
LVL 1

Expert Comment

by:adowns
ID: 6878477
WOW! Thats an interesting idea. Hoping to hear some good responses about this one!
0
 
LVL 7

Author Comment

by:franka
ID: 6878493
you will find some usenet post from guys that already did that on a notebook, so this should prove that it may work without SCSI.
0
 
LVL 7

Author Comment

by:franka
ID: 7017689
still wainting for suggestions.
0
 

Accepted Solution

by:
hms11 earned 300 total points
ID: 7354276
I've successfully created an Exchange 2000 cluster using VMWare and the tips found on this site:

http://www.robbastiaansen.nl/vmware/vmw2kcluster.html

I've got 3 "virtual" servers running on a single WindowsXP workstation - 1 windows 2000 active directory domain controller, and two other windows 2000 servers clustered with Exchange 2000 running in an Active/Active configuration on top of that.

Small tip, you'll want lots of RAM.  And then probably double it.  I've got 512 MB and my machine never stops paging when I have all 3 virtual machines running.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 7

Author Comment

by:franka
ID: 7354398
so at least one SCSI-adapter and disc is mandatory?
0
 
LVL 7

Author Comment

by:franka
ID: 7354407
my 2nd glance will tell me, it's possible without hardware SCSI?
0
 
LVL 7

Author Comment

by:franka
ID: 7359867
hms11: please answer me that single question and you have the points
0
 

Expert Comment

by:hms11
ID: 7424517
No SCSI required.  I'm doing it all with a single IDE drive.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

We planned to use NetApp's SnapManager for Exchange (SME) to make three snapshots a day for quick recovery. Additional we planned to use Symantec NetBackup7 to backup to tape media for disaster recovery. We followed the best practice guide from NetA…
Replication has always been one of those technologies that people run scared from. The main reason is usually cost. When you think of replication, your mind drifts to solutions that replicate from one disk frame to another using block level technolo…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now