Next:
3.1 Introduction
Up:
CondorVersion 7.7.5 Manual
Previous:
2.15 Potential Problems
Contents
Index
3. Administrators' Manual
Subsections
3.1 Introduction
3.1.1 The Different Roles a Machine Can Play
3.1.2 The Condor Daemons
3.2 Installation
3.2.1 Obtaining Condor
3.2.2 Preparation
3.2.3 Newer Unix Installation Procedure
3.2.4 Starting Condor Under Unix After Installation
3.2.5 Installation on Windows
3.2.6 RPMs
3.2.7 Debian Packages
3.2.8 Upgrading - Installing a Newer Version of Condor
3.2.9 Installing the CondorView Client Contrib Module
3.2.10 Dynamic Deployment
3.3 Configuration
3.3.1 Introduction to Configuration Files
3.3.2 Special Macros
3.3.3 Condor-wide Configuration File Entries
3.3.4 Daemon Logging Configuration File Entries
3.3.5 DaemonCore Configuration File Entries
3.3.6 Network-Related Configuration File Entries
3.3.7 Shared File System Configuration File Macros
3.3.8 Checkpoint Server Configuration File Macros
3.3.9 condor_master Configuration File Macros
3.3.10 condor_startd Configuration File Macros
3.3.11 condor_schedd Configuration File Entries
3.3.12 condor_shadow Configuration File Entries
3.3.13 condor_starter Configuration File Entries
3.3.14 condor_submit Configuration File Entries
3.3.15 condor_preen Configuration File Entries
3.3.16 condor_collector Configuration File Entries
3.3.17 condor_negotiator Configuration File Entries
3.3.18 condor_procd Configuration File Macros
3.3.19 condor_credd Configuration File Macros
3.3.20 condor_gridmanager Configuration File Entries
3.3.21 condor_job_router Configuration File Entries
3.3.22 condor_lease_manager Configuration File Entries
3.3.23 condor_hdfs Configuration File Entries
3.3.24 Grid Monitor Configuration File Entries
3.3.25 Configuration File Entries Relating to Grid Usage and Glidein
3.3.26 Configuration File Entries for DAGMan
3.3.27 Configuration File Entries Relating to Security
3.3.28 Configuration File Entries Relating to PrivSep
3.3.29 Configuration File Entries Relating to Virtual Machines
3.3.30 Configuration File Entries Relating to High Availability
3.3.31 Configuration File Entries Relating to Quill
3.3.32 MyProxy Configuration File Macros
3.3.33 Configuration File Macros Affecting APIs
3.3.34 Configuration File Entries Relating to
condor_ssh_to_job
3.3.35
condor_rooster
Configuration File Macros
3.3.36
condor_shared_port
Configuration File Macros
3.3.37 Configuration File Entries Relating to Hooks
3.3.38 Configuration File Entries Only for Windows Platforms
3.3.39
condor_defrag
Configuration File Macros
3.4 User Priorities and Negotiation
3.4.1 Real User Priority (RUP)
3.4.2 Effective User Priority (EUP)
3.4.3 Priorities in Negotiation and Preemption
3.4.4 Priority Calculation
3.4.5 Negotiation
3.4.6 The Layperson's Description of the Pie Spin and Pie Slice
3.4.7 Group Accounting
3.4.8 Hierarchical Group Quotas
3.5 Policy Configuration for the
condor_startd
3.5.1 Startd ClassAd Attributes
3.5.2 The
START
expression
3.5.3 The
IS_VALID_CHECKPOINT_PLATFORM
expression
3.5.4 The
RANK
expression
3.5.5 Machine States
3.5.6 Machine Activities
3.5.7 State and Activity Transitions
3.5.8 State/Activity Transition Expression Summary
3.5.9 Policy Settings
3.6 Security
3.6.1 Condor's Security Model
3.6.2 Security Negotiation
3.6.3 Authentication
3.6.4 The Unified Map File for Authentication
3.6.5 Encryption
3.6.6 Integrity
3.6.7 Authorization
3.6.8 Security Sessions
3.6.9 Host-Based Security in Condor
3.6.10 Examples of Security Configuration
3.6.11 Changing the Security Configuration
3.6.12 Using Condor w/ Firewalls, Private Networks, and NATs
3.6.13 User Accounts in Condor on Unix Platforms
3.6.14 Privilege Separation
3.6.15 Support for
glexec
3.7 Networking (includes sections on Port Usage, CCB, and GCB)
3.7.1 Port Usage in Condor
3.7.2 Reducing Port Usage with the
condor_shared_port
Daemon
3.7.3 Configuring Condor for Machines With Multiple Network Interfaces
3.7.4 Condor Connection Brokering (CCB)
3.7.5 Generic Connection Brokering (GCB)
3.7.6 Using TCP to Send Updates to the
condor_collector
3.8 The Checkpoint Server
3.8.1 Preparing to Install a Checkpoint Server
3.8.2 Installing the Checkpoint Server Module
3.8.3 Configuring the Pool to Use Multiple Checkpoint Servers
3.8.4 Checkpoint Server Domains
3.9 DaemonCore
3.9.1 DaemonCore and Unix signals
3.9.2 DaemonCore and Command-line Arguments
3.10 Pool Management
3.10.1 Upgrading - Installing a New Version on an Existing Pool
3.10.2 Shutting Down and Restarting a Condor Pool
3.10.3 Reconfiguring a Condor Pool
3.11 The High Availability of Daemons
3.11.1 High Availability of the Job Queue
3.11.2 High Availability of the Central Manager
3.12 Quill
3.12.1 Installation and Configuration
3.12.2 Four Usage Examples
3.12.3 Quill and Security
3.12.4 Quill and Its RDBMS Schema
3.13 Setting Up for Special Environments
3.13.1 Using Condor with AFS
3.13.2 Using Condor with the Hadoop File System
3.13.3 Enabling the Transfer of Files Specified by a URL
3.13.4 Configuring Condor for Multiple Platforms
3.13.5 Full Installation of condor_compile
3.13.6 The
condor_kbdd
3.13.7 Configuring The CondorView Server
3.13.8 Running Condor Jobs within a Virtual Machine
3.13.9 Configuring The
condor_startd
for SMP Machines
3.13.10 Condor's Dedicated Scheduling
3.13.11 Configuring Condor for Running Backfill Jobs
3.13.12 Group ID-Based Process Tracking
3.13.13 Limiting Resource Usage
3.13.14 Concurrency Limits
3.14 Java Support Installation
3.15 Virtual Machines
3.15.1 Configuration Variables
3.16 Power Management
3.16.1 Entering a Low Power State
3.16.2 Returning From a Low Power State
3.16.3 Keeping a ClassAd for a Hibernating Machine
3.16.4 Linux Platform Details
3.16.5 Windows Platform Details
condor-admin@cs.wisc.edu