Solved

RHEL, RHEL 6.x question

Posted on 2012-04-05
2
562 Views
Last Modified: 2012-08-13
I noticed I needed to increase my nproc on RHEL 6.2 in applications where I did not have to increase nproc on RHEL 5.x.

Does the creation of RHEL 6 threads count against the max number of nproc
0
Comment
Question by:Los Angeles1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 37812170
RHEL 5 and 5 essentially behave the same way,

The difference is in the default value of nproc, which is 1024 in RHEL 6 regardless of the machine size, whereas Red Hat 5.x sets the limit dynamically based on the machine configuration, usually very much higher than just 1024.

I read that an 8-core system would set the limit at 256693, but I'm not aware of the actual calculation formula used.


wmp
0
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 37812190
Hi,

It is not that you'd not needed to increase nproc. Bu  some old versions of 2.6 libs were broken someiimes they did not apply limts and in some other cases there were not a granular process distribution and now they are handled differently with the newer kernel. Another reason is  more systems are 64-bit the probablity of them using larger memory and disk  are imminent hence the minimum values are updateed according to average avaliable hardware.

Cheers,
K.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question