Next:
3.1 Introduction
Up:
CondorVersion 7.8.2 Manual
Previous:
2.15 Potential Problems
Contents
Index
3
. Administrators' Manual
Subsections
3
.
1
Introduction
3
.
1
.
1
The Different Roles a Machine Can Play
3
.
1
.
2
The Condor Daemons
3
.
2
Installation
3
.
2
.
1
Obtaining Condor
3
.
2
.
2
Preparation
3
.
2
.
3
Newer Unix Installation Procedure
3
.
2
.
4
Starting Condor Under Unix After Installation
3
.
2
.
5
Installation on Windows
3
.
2
.
6
RPMs
3
.
2
.
7
Debian Packages
3
.
2
.
8
Upgrading - Installing a Newer Version of Condor
3
.
2
.
9
Dynamic Deployment
3
.
3
Configuration
3
.
3
.
1
Introduction to Configuration Files
3
.
3
.
2
Special Macros
3
.
3
.
3
Condor-wide Configuration File Entries
3
.
3
.
4
Daemon Logging Configuration File Entries
3
.
3
.
5
DaemonCore Configuration File Entries
3
.
3
.
6
Network-Related Configuration File Entries
3
.
3
.
7
Shared File System Configuration File Macros
3
.
3
.
8
Checkpoint Server Configuration File Macros
3
.
3
.
9
condor_master Configuration File Macros
3
.
3
.
10
condor_startd Configuration File Macros
3
.
3
.
11
condor_schedd Configuration File Entries
3
.
3
.
12
condor_shadow Configuration File Entries
3
.
3
.
13
condor_starter Configuration File Entries
3
.
3
.
14
condor_submit Configuration File Entries
3
.
3
.
15
condor_preen Configuration File Entries
3
.
3
.
16
condor_collector Configuration File Entries
3
.
3
.
17
condor_negotiator Configuration File Entries
3
.
3
.
18
condor_procd Configuration File Macros
3
.
3
.
19
condor_credd Configuration File Macros
3
.
3
.
20
condor_gridmanager Configuration File Entries
3
.
3
.
21
condor_job_router Configuration File Entries
3
.
3
.
22
condor_lease_manager Configuration File Entries
3
.
3
.
23
Grid Monitor Configuration File Entries
3
.
3
.
24
Configuration File Entries Relating to Grid Usage and Glidein
3
.
3
.
25
Configuration File Entries for DAGMan
3
.
3
.
26
Configuration File Entries Relating to Security
3
.
3
.
27
Configuration File Entries Relating to PrivSep
3
.
3
.
28
Configuration File Entries Relating to Virtual Machines
3
.
3
.
29
Configuration File Entries Relating to High Availability
3
.
3
.
30
MyProxy Configuration File Macros
3
.
3
.
31
Configuration File Macros Affecting APIs
3
.
3
.
32
Configuration File Entries Relating to
condor_ssh_to_job
3
.
3
.
33
condor_rooster
Configuration File Macros
3
.
3
.
34
condor_shared_port
Configuration File Macros
3
.
3
.
35
Configuration File Entries Relating to Hooks
3
.
3
.
36
Configuration File Entries Only for Windows Platforms
3
.
3
.
37
condor_defrag
Configuration File Macros
3
.
4
User Priorities and Negotiation
3
.
4
.
1
Real User Priority (RUP)
3
.
4
.
2
Effective User Priority (EUP)
3
.
4
.
3
Priorities in Negotiation and Preemption
3
.
4
.
4
Priority Calculation
3
.
4
.
5
Negotiation
3
.
4
.
6
The Layperson's Description of the Pie Spin and Pie Slice
3
.
4
.
7
Group Accounting
3
.
4
.
8
Hierarchical Group Quotas
3
.
5
Policy Configuration for the
condor_startd
3
.
5
.
1
Startd ClassAd Attributes
3
.
5
.
2
The
START
expression
3
.
5
.
3
The
IS_VALID_CHECKPOINT_PLATFORM
expression
3
.
5
.
4
The
RANK
expression
3
.
5
.
5
Machine States
3
.
5
.
6
Machine Activities
3
.
5
.
7
State and Activity Transitions
3
.
5
.
8
State/Activity Transition Expression Summary
3
.
5
.
9
Policy Settings
3
.
6
Security
3
.
6
.
1
Condor's Security Model
3
.
6
.
2
Security Negotiation
3
.
6
.
3
Authentication
3
.
6
.
4
The Unified Map File for Authentication
3
.
6
.
5
Encryption
3
.
6
.
6
Integrity
3
.
6
.
7
Authorization
3
.
6
.
8
Security Sessions
3
.
6
.
9
Host-Based Security in Condor
3
.
6
.
10
Examples of Security Configuration
3
.
6
.
11
Changing the Security Configuration
3
.
6
.
12
Using Condor w/ Firewalls, Private Networks, and NATs
3
.
6
.
13
User Accounts in Condor on Unix Platforms
3
.
6
.
14
Privilege Separation
3
.
6
.
15
Support for
glexec
3
.
7
Networking (includes sections on Port Usage and CCB)
3
.
7
.
1
Port Usage in Condor
3
.
7
.
2
Reducing Port Usage with the
condor_shared_port
Daemon
3
.
7
.
3
Configuring Condor for Machines With Multiple Network Interfaces
3
.
7
.
4
Using TCP to Send Updates to the
condor_collector
3
.
7
.
5
Running Condor on an IPV6 network stack
3
.
8
The Checkpoint Server
3
.
8
.
1
Preparing to Install a Checkpoint Server
3
.
8
.
2
Installing the Checkpoint Server Module
3
.
8
.
3
Configuring the Pool to Use Multiple Checkpoint Servers
3
.
8
.
4
Checkpoint Server Domains
3
.
9
DaemonCore
3
.
9
.
1
DaemonCore and Unix signals
3
.
9
.
2
DaemonCore and Command-line Arguments
3
.
10
Pool Management
3
.
10
.
1
Upgrading - Installing a New Version on an Existing Pool
3
.
10
.
2
Shutting Down and Restarting a Condor Pool
3
.
10
.
3
Reconfiguring a Condor Pool
3
.
10
.
4
Absent ClassAds
3
.
11
The High Availability of Daemons
3
.
11
.
1
High Availability of the Job Queue
3
.
11
.
2
High Availability of the Central Manager
3
.
12
Setting Up for Special Environments
3
.
12
.
1
Using Condor with AFS
3
.
12
.
2
Enabling the Transfer of Files Specified by a URL
3
.
12
.
3
Configuring Condor for Multiple Platforms
3
.
12
.
4
Full Installation of condor_compile
3
.
12
.
5
The
condor_kbdd
3
.
12
.
6
Configuring The CondorView Server
3
.
12
.
7
Running Condor Jobs within a Virtual Machine
3
.
12
.
8
Configuring The
condor_startd
for SMP Machines
3
.
12
.
9
Condor's Dedicated Scheduling
3
.
12
.
10
Configuring Condor for Running Backfill Jobs
3
.
12
.
11
Group ID-Based Process Tracking
3
.
12
.
12
Cgroup-Based Process Tracking
3
.
12
.
13
Limiting Resource Usage
3
.
12
.
14
Concurrency Limits
3
.
13
Java Support Installation
3
.
14
Virtual Machines
3
.
14
.
1
Configuration Variables
3
.
15
Power Management
3
.
15
.
1
Entering a Low Power State
3
.
15
.
2
Returning From a Low Power State
3
.
15
.
3
Keeping a ClassAd for a Hibernating Machine
3
.
15
.
4
Linux Platform Details
3
.
15
.
5
Windows Platform Details
condor-admin@cs.wisc.edu