Next:
3.1 Introduction
Up:
HTCondor
TM
Version 8.4.11 Manual
Previous:
2.15 Potential Problems
Contents
Index
3
. Administrators' Manual
Subsections
3
.
1
Introduction
3
.
1
.
1
The Different Roles a Machine Can Play
3
.
1
.
2
The HTCondor Daemons
3
.
2
Installation, Start Up, Shut Down, and Reconfiguration
3
.
2
.
1
Obtaining the HTCondor Software
3
.
2
.
2
Installation on Unix
3
.
2
.
3
Installation on Windows
3
.
2
.
4
Upgrading - Installing a New Version on an Existing Pool
3
.
2
.
5
Shutting Down and Restarting an HTCondor Pool
3
.
2
.
6
Reconfiguring an HTCondor Pool
3
.
3
Configuration
3
.
3
.
1
Introduction to Configuration Files
3
.
3
.
2
HTCondor-wide Configuration File Entries
3
.
3
.
3
Daemon Logging Configuration File Entries
3
.
3
.
4
DaemonCore Configuration File Entries
3
.
3
.
5
Network-Related Configuration File Entries
3
.
3
.
6
Shared File System Configuration File Macros
3
.
3
.
7
Checkpoint Server Configuration File Macros
3
.
3
.
8
condor_master Configuration File Macros
3
.
3
.
9
condor_startd Configuration File Macros
3
.
3
.
10
condor_schedd Configuration File Entries
3
.
3
.
11
condor_shadow Configuration File Entries
3
.
3
.
12
condor_starter Configuration File Entries
3
.
3
.
13
condor_submit Configuration File Entries
3
.
3
.
14
condor_preen Configuration File Entries
3
.
3
.
15
condor_collector Configuration File Entries
3
.
3
.
16
condor_negotiator Configuration File Entries
3
.
3
.
17
condor_procd Configuration File Macros
3
.
3
.
18
condor_credd Configuration File Macros
3
.
3
.
19
condor_gridmanager Configuration File Entries
3
.
3
.
20
condor_job_router Configuration File Entries
3
.
3
.
21
condor_lease_manager Configuration File Entries
3
.
3
.
22
Grid Monitor Configuration File Entries
3
.
3
.
23
Configuration File Entries Relating to Grid Usage
3
.
3
.
24
Configuration File Entries for DAGMan
3
.
3
.
25
Configuration File Entries Relating to Security
3
.
3
.
26
Configuration File Entries Relating to Virtual Machines
3
.
3
.
27
Configuration File Entries Relating to High Availability
3
.
3
.
28
MyProxy Configuration File Macros
3
.
3
.
29
Configuration File Macros Affecting APIs
3
.
3
.
30
Configuration File Entries Relating to condor_ssh_to_job
3
.
3
.
31
condor_rooster Configuration File Macros
3
.
3
.
32
condor_shared_port Configuration File Macros
3
.
3
.
33
Configuration File Entries Relating to Hooks
3
.
3
.
34
Configuration File Entries Only for Windows Platforms
3
.
3
.
35
condor_defrag Configuration File Macros
3
.
3
.
36
condor_gangliad
Configuration File Macros
3
.
4
User Priorities and Negotiation
3
.
4
.
1
Real User Priority (RUP)
3
.
4
.
2
Effective User Priority (EUP)
3
.
4
.
3
Priorities in Negotiation and Preemption
3
.
4
.
4
Priority Calculation
3
.
4
.
5
Negotiation
3
.
4
.
6
The Layperson's Description of the Pie Spin and Pie Slice
3
.
4
.
7
Group Accounting
3
.
4
.
8
Accounting Groups with Hierarchical Group Quotas
3
.
5
Policy Configuration for Execute Hosts and for Submit Hosts
3
.
5
.
1
condor_startd
Policy Configuration
3
.
5
.
2
condor_schedd
Policy Configuration
3
.
6
Security
3
.
6
.
1
HTCondor's Security Model
3
.
6
.
2
Security Negotiation
3
.
6
.
3
Authentication
3
.
6
.
4
The Unified Map File for Authentication
3
.
6
.
5
Encryption
3
.
6
.
6
Integrity
3
.
6
.
7
Authorization
3
.
6
.
8
Security Sessions
3
.
6
.
9
Host-Based Security in HTCondor
3
.
6
.
10
Examples of Security Configuration
3
.
6
.
11
Changing the Security Configuration
3
.
6
.
12
Using HTCondor w/ Firewalls, Private Networks, and NATs
3
.
6
.
13
User Accounts in HTCondor on Unix Platforms
3
.
7
Networking (includes sections on Port Usage and CCB)
3
.
7
.
1
Port Usage in HTCondor
3
.
7
.
2
Reducing Port Usage with the
condor_shared_port
Daemon
3
.
7
.
3
Configuring HTCondor for Machines With Multiple Network Interfaces
3
.
7
.
4
HTCondor Connection Brokering (CCB)
3
.
7
.
5
Using TCP to Send Updates to the
condor_collector
3
.
7
.
6
Running HTCondor on an IPv6 Network Stack
3
.
8
The Checkpoint Server
3
.
8
.
1
Preparing to Install a Checkpoint Server
3
.
8
.
2
Installing the Checkpoint Server Module
3
.
8
.
3
Configuring the Pool to Use Multiple Checkpoint Servers
3
.
8
.
4
Checkpoint Server Domains
3
.
9
DaemonCore
3
.
9
.
1
DaemonCore and Unix signals
3
.
9
.
2
DaemonCore and Command-line Arguments
3
.
10
Monitoring
3
.
10
.
1
Ganglia
3
.
10
.
2
Absent ClassAds
3
.
11
The High Availability of Daemons
3
.
11
.
1
High Availability of the Job Queue
3
.
11
.
2
High Availability of the Central Manager
3
.
12
Setting Up for Special Environments
3
.
12
.
1
Using HTCondor with AFS
3
.
12
.
2
Enabling the Transfer of Files Specified by a URL
3
.
12
.
3
Configuring HTCondor for Multiple Platforms
3
.
12
.
4
Full Installation of condor_compile
3
.
12
.
5
The
condor_kbdd
3
.
12
.
6
Configuring The HTCondorView Server
3
.
12
.
7
Running HTCondor Jobs within a Virtual Machine
3
.
12
.
8
HTCondor's Dedicated Scheduling
3
.
12
.
9
Configuring HTCondor for Running Backfill Jobs
3
.
12
.
10
Per Job PID Namespaces
3
.
12
.
11
Group ID-Based Process Tracking
3
.
12
.
12
Cgroup-Based Process Tracking
3
.
12
.
13
Limiting Resource Usage with a User Job Wrapper
3
.
12
.
14
Limiting Resource Usage Using Cgroups
3
.
12
.
15
Concurrency Limits
3
.
13
Java Support Installation
3
.
14
Setting Up the VM and Docker Universes
3
.
14
.
1
The VM Universe
3
.
14
.
2
The Docker Universe
3
.
15
Power Management
3
.
15
.
1
Entering a Low Power State
3
.
15
.
2
Returning From a Low Power State
3
.
15
.
3
Keeping a ClassAd for a Hibernating Machine
3
.
15
.
4
Linux Platform Details
3
.
15
.
5
Windows Platform Details