<html><body bgcolor="#FFFFFF"><div>Our application vendors dictated version an patches. The system did what it was designed. That was its purpose in life.</div><div><br><br>Sent from my iPhone</div><div><br>On Jan 26, 2011, at 7:51 PM, Mitch Patenaude <<a href="mailto:mitch@rapleaf.com">mitch@rapleaf.com</a>> wrote:<br><br></div><div></div><blockquote type="cite"><div><br><br><div class="gmail_quote">On Wed, Jan 26, 2011 at 5:42 PM, Gene <span dir="ltr"><<a href="mailto:brandtg@bellsouth.net"><a href="mailto:brandtg@bellsouth.net">brandtg@bellsouth.net</a></a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
Can you tell us more about you cluster? Nodes? Purpose? I managed a small 90 node cluster for seismic work.<br></blockquote><div><br></div><div>300+ nodes total, 200 in a hadoop cluster used for mapreduce, the rest in a variety of headless datacenter roles (web, mail, database, backup, etc.). They are somewhat sensitive to version updates, so I was hoping to find a way to find the security updates (patch level) without having to change versions. Upgrading to 5.6 would likely involve upgrading several core packages (mysql, ruby, python, bind, even glibc and the kernel). Is this a pipe dream?</div>
<div><br></div><div> Thanks,</div><div> -- Mitch</div><div><br></div></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>CentOS mailing list</span><br><span><a href="mailto:CentOS@centos.org">CentOS@centos.org</a></span><br><span><a href="http://lists.centos.org/mailman/listinfo/centos">http://lists.centos.org/mailman/listinfo/centos</a></span><br></div></blockquote></body></html>