Next:
3.1 Introduction
Up:
HTCondor
TM
Version 8.2.1 Manual
Previous:
2.14 Potential Problems
Contents
Index
3
. Administrators' Manual
Subsections
3
.
1
Introduction
3
.
1
.
1
The Different Roles a Machine Can Play
3
.
1
.
2
The HTCondor Daemons
3
.
2
Installation, Start Up, Shut Down, and Reconfiguration
3
.
2
.
1
Obtaining HTCondor
3
.
2
.
2
Preparation
3
.
2
.
3
Newer Unix Installation Procedure
3
.
2
.
4
Starting HTCondor Under Unix After Installation
3
.
2
.
5
Installation on Windows
3
.
2
.
6
RPMs
3
.
2
.
7
Debian Packages
3
.
2
.
8
Upgrading - Installing a New Version on an Existing Pool
3
.
2
.
9
Shutting Down and Restarting an HTCondor Pool
3
.
2
.
10
Reconfiguring an HTCondor Pool
3
.
3
Configuration
3
.
3
.
1
Introduction to Configuration Files
3
.
3
.
2
Special Macros
3
.
3
.
3
HTCondor-wide Configuration File Entries
3
.
3
.
4
Daemon Logging Configuration File Entries
3
.
3
.
5
DaemonCore Configuration File Entries
3
.
3
.
6
Network-Related Configuration File Entries
3
.
3
.
7
Shared File System Configuration File Macros
3
.
3
.
8
Checkpoint Server Configuration File Macros
3
.
3
.
9
condor_master Configuration File Macros
3
.
3
.
10
condor_startd Configuration File Macros
3
.
3
.
11
condor_schedd Configuration File Entries
3
.
3
.
12
condor_shadow Configuration File Entries
3
.
3
.
13
condor_starter Configuration File Entries
3
.
3
.
14
condor_submit Configuration File Entries
3
.
3
.
15
condor_preen Configuration File Entries
3
.
3
.
16
condor_collector Configuration File Entries
3
.
3
.
17
condor_negotiator Configuration File Entries
3
.
3
.
18
condor_procd Configuration File Macros
3
.
3
.
19
condor_credd Configuration File Macros
3
.
3
.
20
condor_gridmanager Configuration File Entries
3
.
3
.
21
condor_job_router Configuration File Entries
3
.
3
.
22
condor_lease_manager Configuration File Entries
3
.
3
.
23
Grid Monitor Configuration File Entries
3
.
3
.
24
Configuration File Entries Relating to Grid Usage
3
.
3
.
25
Configuration File Entries for DAGMan
3
.
3
.
26
Configuration File Entries Relating to Security
3
.
3
.
27
Configuration File Entries Relating to Virtual Machines
3
.
3
.
28
Configuration File Entries Relating to High Availability
3
.
3
.
29
MyProxy Configuration File Macros
3
.
3
.
30
Configuration File Macros Affecting APIs
3
.
3
.
31
Configuration File Entries Relating to condor_ssh_to_job
3
.
3
.
32
condor_rooster Configuration File Macros
3
.
3
.
33
condor_shared_port Configuration File Macros
3
.
3
.
34
Configuration File Entries Relating to Hooks
3
.
3
.
35
Configuration File Entries Only for Windows Platforms
3
.
3
.
36
condor_defrag Configuration File Macros
3
.
3
.
37
condor_gangliad
Configuration File Macros
3
.
4
User Priorities and Negotiation
3
.
4
.
1
Real User Priority (RUP)
3
.
4
.
2
Effective User Priority (EUP)
3
.
4
.
3
Priorities in Negotiation and Preemption
3
.
4
.
4
Priority Calculation
3
.
4
.
5
Negotiation
3
.
4
.
6
The Layperson's Description of the Pie Spin and Pie Slice
3
.
4
.
7
Group Accounting
3
.
4
.
8
Accounting Groups with Hierarchical Group Quotas
3
.
5
Policy Configuration for the
condor_startd
3
.
5
.
1
Terminology
3
.
5
.
2
The
START
expression
3
.
5
.
3
The
IS_VALID_CHECKPOINT_PLATFORM
expression
3
.
5
.
4
The
RANK
expression
3
.
5
.
5
Machine States
3
.
5
.
6
Machine Activities
3
.
5
.
7
State and Activity Transitions
3
.
5
.
8
State/Activity Transition Expression Summary
3
.
5
.
9
Policy Settings
3
.
5
.
10
Configuring the
condor_startd
for Multi-Core Machines
3
.
6
Security
3
.
6
.
1
HTCondor's Security Model
3
.
6
.
2
Security Negotiation
3
.
6
.
3
Authentication
3
.
6
.
4
The Unified Map File for Authentication
3
.
6
.
5
Encryption
3
.
6
.
6
Integrity
3
.
6
.
7
Authorization
3
.
6
.
8
Security Sessions
3
.
6
.
9
Host-Based Security in HTCondor
3
.
6
.
10
Examples of Security Configuration
3
.
6
.
11
Changing the Security Configuration
3
.
6
.
12
Using HTCondor w/ Firewalls, Private Networks, and NATs
3
.
6
.
13
User Accounts in HTCondor on Unix Platforms
3
.
7
Networking (includes sections on Port Usage and CCB)
3
.
7
.
1
Port Usage in HTCondor
3
.
7
.
2
Reducing Port Usage with the
condor_shared_port
Daemon
3
.
7
.
3
Configuring HTCondor for Machines With Multiple Network Interfaces
3
.
7
.
4
HTCondor Connection Brokering (CCB)
3
.
7
.
5
Using TCP to Send Updates to the
condor_collector
3
.
7
.
6
Running HTCondor on an IPv6 Network Stack
3
.
8
The Checkpoint Server
3
.
8
.
1
Preparing to Install a Checkpoint Server
3
.
8
.
2
Installing the Checkpoint Server Module
3
.
8
.
3
Configuring the Pool to Use Multiple Checkpoint Servers
3
.
8
.
4
Checkpoint Server Domains
3
.
9
DaemonCore
3
.
9
.
1
DaemonCore and Unix signals
3
.
9
.
2
DaemonCore and Command-line Arguments
3
.
10
Monitoring
3
.
10
.
1
Ganglia
3
.
10
.
2
Absent ClassAds
3
.
11
The High Availability of Daemons
3
.
11
.
1
High Availability of the Job Queue
3
.
11
.
2
High Availability of the Central Manager
3
.
12
Setting Up for Special Environments
3
.
12
.
1
Using HTCondor with AFS
3
.
12
.
2
Enabling the Transfer of Files Specified by a URL
3
.
12
.
3
Configuring HTCondor for Multiple Platforms
3
.
12
.
4
Full Installation of condor_compile
3
.
12
.
5
The
condor_kbdd
3
.
12
.
6
Configuring The HTCondorView Server
3
.
12
.
7
Running HTCondor Jobs within a Virtual Machine
3
.
12
.
8
HTCondor's Dedicated Scheduling
3
.
12
.
9
Configuring HTCondor for Running Backfill Jobs
3
.
12
.
10
Per Job PID Namespaces
3
.
12
.
11
Group ID-Based Process Tracking
3
.
12
.
12
Cgroup-Based Process Tracking
3
.
12
.
13
Limiting Resource Usage with a User Job Wrapper
3
.
12
.
14
Limiting Resource Usage Using Cgroups
3
.
12
.
15
Concurrency Limits
3
.
13
Java Support Installation
3
.
14
Virtual Machines
3
.
14
.
1
Configuration Variables
3
.
15
Power Management
3
.
15
.
1
Entering a Low Power State
3
.
15
.
2
Returning From a Low Power State
3
.
15
.
3
Keeping a ClassAd for a Hibernating Machine
3
.
15
.
4
Linux Platform Details
3
.
15
.
5
Windows Platform Details