This is an outdated version of the HTCondor Manual.
You can find current documentation at
http://htcondor.org/manual
.
Next:
3.1 Introduction
Up:
HTCondor
TM
Version 7.9.6 Manual
Previous:
2.14 Potential Problems
Contents
Index
3. Administrators' Manual
Subsections
3.1 Introduction
3.1.1 The Different Roles a Machine Can Play
3.1.2 The HTCondor Daemons
3.2 Installation
3.2.1 Obtaining HTCondor
3.2.2 Preparation
3.2.3 Newer Unix Installation Procedure
3.2.4 Starting HTCondor Under Unix After Installation
3.2.5 Installation on Windows
3.2.6 RPMs
3.2.7 Debian Packages
3.2.8 Upgrading - Installing a Newer Version of HTCondor
3.2.9 Dynamic Deployment
3.3 Configuration
3.3.1 Introduction to Configuration Files
3.3.2 Special Macros
3.3.3 HTCondor-wide Configuration File Entries
3.3.4 Daemon Logging Configuration File Entries
3.3.5 DaemonCore Configuration File Entries
3.3.6 Network-Related Configuration File Entries
3.3.7 Shared File System Configuration File Macros
3.3.8 Checkpoint Server Configuration File Macros
3.3.9 condor_master Configuration File Macros
3.3.10 condor_startd Configuration File Macros
3.3.11 condor_schedd Configuration File Entries
3.3.12 condor_shadow Configuration File Entries
3.3.13 condor_starter Configuration File Entries
3.3.14 condor_submit Configuration File Entries
3.3.15 condor_preen Configuration File Entries
3.3.16 condor_collector Configuration File Entries
3.3.17 condor_negotiator Configuration File Entries
3.3.18 condor_procd Configuration File Macros
3.3.19 condor_credd Configuration File Macros
3.3.20 condor_gridmanager Configuration File Entries
3.3.21 condor_job_router Configuration File Entries
3.3.22 condor_lease_manager Configuration File Entries
3.3.23 Grid Monitor Configuration File Entries
3.3.24 Configuration File Entries Relating to Grid Usage
3.3.25 Configuration File Entries for DAGMan
3.3.26 Configuration File Entries Relating to Security
3.3.27 Configuration File Entries Relating to PrivSep
3.3.28 Configuration File Entries Relating to Virtual Machines
3.3.29 Configuration File Entries Relating to High Availability
3.3.30 MyProxy Configuration File Macros
3.3.31 Configuration File Macros Affecting APIs
3.3.32 Configuration File Entries Relating to
condor_ssh_to_job
3.3.33
condor_rooster
Configuration File Macros
3.3.34
condor_shared_port
Configuration File Macros
3.3.35 Configuration File Entries Relating to Hooks
3.3.36 Configuration File Entries Only for Windows Platforms
3.3.37
condor_defrag
Configuration File Macros
3.4 User Priorities and Negotiation
3.4.1 Real User Priority (RUP)
3.4.2 Effective User Priority (EUP)
3.4.3 Priorities in Negotiation and Preemption
3.4.4 Priority Calculation
3.4.5 Negotiation
3.4.6 The Layperson's Description of the Pie Spin and Pie Slice
3.4.7 Group Accounting
3.4.8 Accounting Groups with Hierarchical Group Quotas
3.5 Policy Configuration for the
condor_startd
3.5.1 Terminology
3.5.2 The
START
expression
3.5.3 The
IS_VALID_CHECKPOINT_PLATFORM
expression
3.5.4 The
RANK
expression
3.5.5 Machine States
3.5.6 Machine Activities
3.5.7 State and Activity Transitions
3.5.8 State/Activity Transition Expression Summary
3.5.9 Policy Settings
3.5.10 Configuring the
condor_startd
for Multi-Core Machines
3.6 Security
3.6.1 HTCondor's Security Model
3.6.2 Security Negotiation
3.6.3 Authentication
3.6.4 The Unified Map File for Authentication
3.6.5 Encryption
3.6.6 Integrity
3.6.7 Authorization
3.6.8 Security Sessions
3.6.9 Host-Based Security in HTCondor
3.6.10 Examples of Security Configuration
3.6.11 Changing the Security Configuration
3.6.12 Using HTCondor w/ Firewalls, Private Networks, and NATs
3.6.13 User Accounts in HTCondor on Unix Platforms
3.6.14 Privilege Separation
3.6.15 Support for
glexec
3.7 Networking (includes sections on Port Usage and CCB)
3.7.1 Port Usage in HTCondor
3.7.2 Reducing Port Usage with the
condor_shared_port
Daemon
3.7.3 Configuring HTCondor for Machines With Multiple Network Interfaces
3.7.4 HTCondor Connection Brokering (CCB)
3.7.5 Using TCP to Send Updates to the
condor_collector
3.7.6 Running HTCondor on an IPv6 Network Stack
3.8 The Checkpoint Server
3.8.1 Preparing to Install a Checkpoint Server
3.8.2 Installing the Checkpoint Server Module
3.8.3 Configuring the Pool to Use Multiple Checkpoint Servers
3.8.4 Checkpoint Server Domains
3.9 DaemonCore
3.9.1 DaemonCore and Unix signals
3.9.2 DaemonCore and Command-line Arguments
3.10 Pool Management
3.10.1 Upgrading - Installing a New Version on an Existing Pool
3.10.2 Shutting Down and Restarting an HTCondor Pool
3.10.3 Reconfiguring an HTCondor Pool
3.10.4 Absent ClassAds
3.11 The High Availability of Daemons
3.11.1 High Availability of the Job Queue
3.11.2 High Availability of the Central Manager
3.12 Setting Up for Special Environments
3.12.1 Using HTCondor with AFS
3.12.2 Enabling the Transfer of Files Specified by a URL
3.12.3 Configuring HTCondor for Multiple Platforms
3.12.4 Full Installation of condor_compile
3.12.5 The
condor_kbdd
3.12.6 Configuring The HTCondorView Server
3.12.7 Running HTCondor Jobs within a Virtual Machine
3.12.8 HTCondor's Dedicated Scheduling
3.12.9 Configuring HTCondor for Running Backfill Jobs
3.12.10 Per Job PID Namespaces
3.12.11 Group ID-Based Process Tracking
3.12.12 Cgroup-Based Process Tracking
3.12.13 Limiting Resource Usage with a User Job Wrapper
3.12.14 Limiting Resource Usage Using Cgroups
3.12.15 Concurrency Limits
3.13 Java Support Installation
3.14 Virtual Machines
3.14.1 Configuration Variables
3.15 Power Management
3.15.1 Entering a Low Power State
3.15.2 Returning From a Low Power State
3.15.3 Keeping a ClassAd for a Hibernating Machine
3.15.4 Linux Platform Details
3.15.5 Windows Platform Details
htcondor-admin@cs.wisc.edu