Distributed Computing Cluster Machines

Each machine in a cluster is listed under the Machines node for that cluster. Clicking the Machines node will display a list of each machine associated with the cluster.

Adding Machines to a Distributed Computing Cluster Cluster

After registering a cluster, it will appear in the list on the left in the Distributed Computing Clusters section of the Web Administration Console.

To add machines to a Distributed Computing Cluster cluster

  1. In the pane on the left, expand the Distributed Computing Cluster cluster that you want to add machines to and click Machines.
  2. All of the machines in the cluster will be shown in a list in the middle of the page. Click the Add button on the toolbar. The Add Machine window will open.
  3. In the Host Name field, enter the name of the machine where the Laserfiche Distributed Computing Cluster Service is installed.
  4. In the Metadata Communication Port field, specify the port that Distributed Computing Cluster will use for metadata communication. By default, the service will use port 8108.
  5. If the Worker should be able to perform tasks, select Allow this machine to perform tasks.
  6. Click OK.

Removing Machines from a Distributed Computing Cluster Cluster

To remove a machine from a cluster

  1. In the pane on the left, expand the cluster that you want to remove a machine from and click Machines.
  2. All of the machines in the cluster will be shown in a list in the middle of the page. Click the Delete button on the toolbar. The Delete Machines window will open.
  3. To remove the machine, click OK. Once removed, the machine will no longer be part of the cluster.

Enabling and Disabling Tasks on Multiple Machines

By default, the machine where the Distributed Computing Cluster Scheduler is installed is not configured to perform tasks.

Individual Machine Information and Settings

Clicking a machine from the list of machines will open its settings. There are four tabs where you can find information and configure settings for a machine.

Next Steps

Learn more about setting up machine security.