Solved

Centos installation

Posted on 2013-02-06
13
385 Views
Last Modified: 2013-02-13
I have tested the installation of Centos Linux and already installed a HDD with default centos setting. This is the default OS disk

When I use "fdisk" to change the partition, it tells that "Partition 1 does not end on cylinder boundary". Actually, should I need to align the disk first before installing the Centos. How should I do this ? When I boot up the Centos installation disk, it doesn't have the option to install Centos...


I try to install another HDD for data disk. Using fdisk, it ask to create a partition number. What partition number should I use ? Should I use number 1 or 2 ? Does that make any difference ?

Thanks
0
Comment
Question by:AXISHK
  • 7
  • 5
13 Comments
 
LVL 76

Expert Comment

by:arnold
Comment Utility
You have several options.
You can use raw partitions, 1-4 primary, and then you can use extended/logical partitions.
The alternative is to use LVM.

Aligning the partition "improves performance"
You do not need to align.
You can use Druid during the install to partition the two hard drives.
0
 
LVL 16

Expert Comment

by:choward16980
Comment Utility
0
 

Author Comment

by:AXISHK
Comment Utility
Can u drop me the steps (commands), especially on how to add another HDD to the Centos Linux and make it as another logical volme used for data ?

Tks
0
 
LVL 76

Expert Comment

by:arnold
Comment Utility
post your fdisk -l
df -k

you can use pvcreate /dev/sdb for example
vgcreate newvolumegroup /dev/sdb
vgextend oldvolumegroup /dev/sdb

lvcreate -L xG -n logicalvolume volumegroup
http://www.centos.org/docs/5/html/5.2/Cluster_Logical_Volume_Manager/
0
 

Author Comment

by:AXISHK
Comment Utility
Successfully installed another HDD. However, I still have no idea how to align the disk for better performance. Any further advise ?

Tks
fdisk.bmp
0
 
LVL 76

Expert Comment

by:arnold
Comment Utility
Better performance, compared to what.

Alignment is often recommended for high I/O servers I.e. database servers.
Please post the text output rather than images of
df -k
fdisk -l
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:AXISHK
Comment Utility
Sorry, can't copy the output into text as the mouse lost control when I click on the VM guest screen.

The data partition will host mysql database..
df.bmp
0
 
LVL 76

Expert Comment

by:arnold
Comment Utility
Your sda1 ends on 64 which is why it complains.
It is not an issue to worry about,
In the future, you would want to have the partition to end at an 8 multiple minus 1.
63, 71, etc.
0
 

Author Comment

by:AXISHK
Comment Utility
Thanks. again, how can I make it algin when I issue fdisk and format at the very beginning.

Tks
0
 
LVL 76

Expert Comment

by:arnold
Comment Utility
End on 63 or x*64-1 for cylinder count.
0
 

Author Comment

by:AXISHK
Comment Utility
Sorry, I can't get your idea. What should I type when I fdisk the volume / device ?

Tks
0
 
LVL 76

Expert Comment

by:arnold
Comment Utility
How much space do you want for each partition?
At times, when one specified xMB or xGB the tool would adjust to the closer based on the cylinder boundary.
Other than the annoyance of having it displayed when fdisk -l is run.
More recent consensus that it is not as important these days.
0
 
LVL 76

Accepted Solution

by:
arnold earned 500 total points
Comment Utility
When formatting start the first partition at cylinder 63 and you should not get these not at cylinder boundry.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now